CVE-2010-1770
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
11/06/2010
Last modified:
11/04/2025
Description
WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, Apple Safari before 4.1 on Mac OS X 10.4, and Google Chrome before 5.0.375.70 does not properly handle a transformation of a text node that has the IBM1147 character set, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document containing a BR element, related to a "type checking issue."
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* | 4.0.5 (including) | |
cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://code.google.com/p/chromium/issues/detail?id=43487
- http://googlechromereleases.blogspot.com/2010/06/stable-channel-update.html
- http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html
- http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
- http://lists.apple.com/archives/security-announce/2010//Sep/msg00002.html
- http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
- http://secunia.com/advisories/40072
- http://secunia.com/advisories/40105
- http://secunia.com/advisories/40196
- http://secunia.com/advisories/41856
- http://secunia.com/advisories/42314
- http://secunia.com/advisories/43068
- http://securitytracker.com/id?1024067=
- http://support.apple.com/kb/HT4196
- http://support.apple.com/kb/HT4220
- http://support.apple.com/kb/HT4334
- http://support.apple.com/kb/HT4456
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A039
- http://www.securityfocus.com/bid/40620
- http://www.ubuntu.com/usn/USN-1006-1
- http://www.vupen.com/english/advisories/2010/1373
- http://www.vupen.com/english/advisories/2010/1512
- http://www.vupen.com/english/advisories/2010/2722
- http://www.vupen.com/english/advisories/2011/0212
- http://www.vupen.com/english/advisories/2011/0552
- http://zerodayinitiative.com/advisories/ZDI-10-093/
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7099
- http://code.google.com/p/chromium/issues/detail?id=43487
- http://googlechromereleases.blogspot.com/2010/06/stable-channel-update.html
- http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html
- http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
- http://lists.apple.com/archives/security-announce/2010//Sep/msg00002.html
- http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
- http://secunia.com/advisories/40072
- http://secunia.com/advisories/40105
- http://secunia.com/advisories/40196
- http://secunia.com/advisories/41856
- http://secunia.com/advisories/42314
- http://secunia.com/advisories/43068
- http://securitytracker.com/id?1024067=
- http://support.apple.com/kb/HT4196
- http://support.apple.com/kb/HT4220
- http://support.apple.com/kb/HT4334
- http://support.apple.com/kb/HT4456
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A039
- http://www.securityfocus.com/bid/40620
- http://www.ubuntu.com/usn/USN-1006-1
- http://www.vupen.com/english/advisories/2010/1373
- http://www.vupen.com/english/advisories/2010/1512
- http://www.vupen.com/english/advisories/2010/2722
- http://www.vupen.com/english/advisories/2011/0212
- http://www.vupen.com/english/advisories/2011/0552
- http://zerodayinitiative.com/advisories/ZDI-10-093/
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7099