ID

VAR-201006-1237


CVE

CVE-2010-0544


TITLE

Apple Safari of WebKit Vulnerable to cross-site scripting

Trust: 0.8

sources: JVNDB: JVNDB-2010-001576

DESCRIPTION

Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to inject arbitrary web script or HTML via vectors related to a malformed URL. Apple Safari of WebKit Contains a cross-site scripting vulnerability.By any third party Web Script or HTML May be inserted. Safari is prone to multiple security vulnerabilities that have been addressed in Apple security advisory APPLE-SA-2010-06-07-1. Attackers can exploit these issues by enticing an unsuspecting user into visiting a malicious webpage. Successful attacks may result in information-disclosure, remote code-execution, denial-of-service, or other consequences. This BID is being retired. The following individual records exist to better document the issues: 40642 WebKit 'removeChild()' Remote Code Execution Vulnerability 40644 WebKit HTML Button Use After Free Remote Code Execution Vulnerability 40645 WebKit Marquee Event 'SelectionController' Remote Code Execution Vulnerability 40646 WebKit Editable Containers Remote Code Execution Vulnerability 40647 WebKit Option Element 'ContentEditable' Attribute Remote Code Execution Vulnerability 40649 WebKit 'ConditionEventListener' Remote Code Execution Vulnerability 40650 WebKit 'DOCUMENT_POSITION_DISCONNECTED' Attribute Remote Code Execution Vulnerability 40652 WebKit SVG 'RadialGradient' Attribute Remote Code Execution Vulnerability 40653 WebKit IBM1147 Character Set Text Transform Remote Code Execution Vulnerability 40654 WebKit Option Recursive Use Element Remote Code Execution Vulnerability 40655 WebKit 'first-letter' CSS Style Remote Code Execution Vulnerability 40656 WebKit SVG 'use' Element Remote Code Execution Vulnerability 40657 WebKit SVG 'use' Element Remote Code Execution Vulnerability 40658 WebKit Caption Element Handling Remote Code Execution Vulnerability 40659 WebKit Custom Vertical Positioning Remote Code Execution Vulnerability 40660 WebKit Dragging or Pasting Cross Domain Scripting Vulnerability 40661 WebKit Use After Free Remote Code Execution Vulnerability 40662 WebKit Hover Event Handling Remote Code Execution Vulnerability 40663 WebKit DOM Range Objects Remote Code Execution Vulnerability 40665 WebKit 'Node.normalize' Method Remote Code Execution Vulnerability 40665 WebKit 'Node.normalize' Method Remote Code Execution Vulnerability 40666 WebKit 'removeChild' DOM Method Remote Code Execution Vulnerability 40667 WebKit HTML Document Subtrees Remote Code Execution Vulnerability 40668 WebKit 'libxml' Context Handling Remote Code Execution Vulnerability 40669 Webkit UTF-7 Cross-Site Scripting Vulnerability 40670 WebKit Fonts Handling Remote Code Execution Vulnerability 40671 WebKit HTML Tables Remote Code Execution Vulnerability 40672 WebKit CSS-Styled HTML Handling Remote Code Execution Vulnerability 40673 Apple Safari PDF Handling Remote Code Execution Vulnerability 40674 Apple Safari Window Management Remote Code Execution Vulnerability 40675 Webkit HTML Document Fragments Cross Site Scripting Vulnerability 40697 WebKit Integer Truncation TCP Port Information Disclosure Vulnerability 40698 WebKit Keyboard Focus Cross Domain Information Disclosure Vulnerability 40704 Apple Safari Authentication Data URI Spoofing Vulnerability 40705 WebKit IRC Port Blacklist Information Disclosure Vulnerability 40707 Webkit DOM Constructor Object Cross Site Scripting Vulnerability 40710 WebKit 'frame.src' Validation Cross Site Scripting Vulnerability 40714 WebKit SVG Image Pattern Cross Domain Security Bypass Vulnerability 40717 WebKit Empty Hostname URI Handling Cross Site Scripting Vulnerability 40726 Webkit 'textarea' Element Cross-Site Scripting Vulnerability 40727 WebKit Cascading Stylesheets 'HREF' Information Disclosure Vulnerability 40732 WebKit HTTP Redirects Information Disclosure Vulnerability 40733 WebKit NTLM Credentials Information Disclosure Vulnerability 40750 WebKit HTTPS Redirect Information Disclosure Vulnerability 40752 WebKit HTTP URI Clipboard Information Disclosure Vulnerability 40753 WebKit Local Storage and Web SQL Database Directory Traversal Vulnerability 40754 WebKit 'execCommand()' Function Clipboard Overwrite Security Weakness 40756 WebKit ':visited' CSS Pseudo-class Information Disclosure Vulnerability. WebKit is prone to a cross-site scripting vulnerability because it fails to adequately sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of a targeted site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. Remote attackers can inject arbitrary web scripts and HTML with the help of specially crafted URL-related vectors. ---------------------------------------------------------------------- Secunia CSI integrated with Microsoft WSUS and Microsoft SCCM for 3rd party Patch Management Free webinars http://secunia.com/vulnerability_scanning/corporate/webinars/ ---------------------------------------------------------------------- TITLE: Apple Safari Multiple Vulnerabilities SECUNIA ADVISORY ID: SA40105 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/40105/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=40105 RELEASE DATE: 2010-06-09 DISCUSS ADVISORY: http://secunia.com/advisories/40105/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/40105/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=40105 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Some vulnerabilities have been reported in Apple Safari, which can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, conduct spoofing or cross-site scripting attacks, and potentially compromise a user's system. 1) An error when processing ColorSync profiles embedded in a specially crafted image can be exploited to potentially execute arbitrary code. This is related to vulnerability #2 in: SA36096 2) The browser follows links containing arbitrary user information without warning, which can be exploited to facilitate phishing attacks via specially crafted URLs. 3) A use-after-free error when handling PDF files can be exploited to potentially execute arbitrary code. 4) An error in WebKit when handling clipboard URLs can be exploited to disclose sensitive files if a user is tricked into dragging or pasting links or images to a malicious website. 6) An error in WebKit when handling UTF-7 encoded text can be exploited to leave an HTML quoted string unterminated and facilitate cross-site scripting attacks. 7) An input sanitation error in WebKit when handling Local Storage and Web SQL databases can be exploited to create database files in arbitrary directories via directory traversal attacks. 8) A use-after-free error in WebKit when rendering HTML buttons can be exploited to potentially execute arbitrary code. 9) A use-after-free error in WebKit when handling attribute manipulations can be exploited to potentially execute arbitrary code. 10) An error in WebKit when handling HTML document fragments can be exploited to execute arbitrary JavaScript code in a legitimate context processing foreign HTML fragments. 11) An error in WebKit when handling keyboard focus can be exploited to deliver key press events intended for a different frame. 12) An error in WebKit when handling DOM constructor objects can be exploited to conduct cross-site scripting attacks. 13) A use-after-free error in WebKit when handling the removal of container elements can be exploited to potentially execute arbitrary code. 14) A use-after-free error in WebKit when rendering a selection at the time of a layout change can be exploited to potentially execute arbitrary code. 15) An error in WebKit when handling ordered list insertions can be exploited to corrupt memory and potentially execute arbitrary code. 16) An uninitialised memory access error in WebKit when handling selection changes on form input elements can be exploited to potentially execute arbitrary code. 17) A use-after-free error in WebKit when handling caption elements can be exploited to potentially execute arbitrary code. 18) A use-after-free error in WebKit when handling the ":first-letter" pseudo-element in cascading stylesheets can be exploited to potentially execute arbitrary code. 19) A double-free error in WebKit when handling event listeners in SVG documents can be exploited to potentially execute arbitrary code. 20) An uninitialised memory access error in WebKit when handling "use" elements in SVG documents can be exploited to potentially execute arbitrary code. 21) A use-after-free error in WebKit when handling SVG documents with multiple "use" elements can be exploited to potentially execute arbitrary code. 22) An error in WebKit when handling nested "use" elements in SVG documents can be exploited to corrupt memory and potentially execute arbitrary code. 23) A use-after-free error in WebKit when handling CSS run-ins can be exploited to potentially execute arbitrary code. 24) A use-after-free error in WebKit when handling HTML elements with custom vertical positioning can be exploited to potentially execute arbitrary code. 25) An error exists in WebKit when visiting HTTPS websites redirecting to HTTP websites. This can be exploited to disclose potentially sensitive information contained in the HTTPS URL by reading the "Referer" header. 26) An integer truncation error in WebKit when handling TCP requests can be exploited to pass arbitrary data to arbitrary TCP ports. 27) An error in WebKit when processing connections to IRC ports can be exploited to send arbitrary data to arbitrary IRC servers. 28) A use-after-free error in WebKit when handling hover events can be exploited to potentially execute arbitrary code. 29) An error in WebKit can be exploited to read NTLM credentials that are incorrectly transmitted in plain-text via Man-in-the-Middle (MitM) attacks. 30) A use-after-free error in WebKit when handling the "removeChild" DOM method can be exploited to potentially execute arbitrary code. 31) An error in WebKit when handling libxml contexts can be exploited to potentially execute arbitrary code. 32) An error in WebKit when handling a canvas with an SVG image pattern can be exploited to load and capture an image from another website. 33) An error in WebKit when rendering CSS-styled HTML content with multiple ":after" pseudo-selectors can be exploited to corrupt memory and potentially execute arbitrary code. 34) An error in WebKit when handling the "src" attribute of a frame element can be exploited to facilitate cross-site scripting attacks. 35) A use-after-free error in WebKit when handling drag and drop operations can be exploited to potentially execute arbitrary code. 36) An error in the implementation of the JavaScript "execCommand" function can be exploited to modify the contents of the clipboard. 38) A use-after-free error in WebKit when handling DOM "Range" objects can be exploited to potentially execute arbitrary code. 39) A use-after-free error in WebKit when handling the "Node.normalize()" method can be exploited to potentially execute arbitrary code. 40) A use-after-free error in WebKit when rendering HTML document subtrees can be exploited to potentially execute arbitrary code. 42) An error in WebKit when visiting a website which redirects form submissions to a redirecting website can be exploited disclose submitted data. 43) A type checking error in WebKit when handling text nodes can be exploited to potentially execute arbitrary code. 44) A use-after-free error in WebKit when handling fonts can be exploited to potentially execute arbitrary code. 45) An error in WebKit when handling HTML tables can be exploited to trigger an out-of-bounds memory access and potentially execute arbitrary code. 46) An error in WebKit when handling the CSS ":visited" pseudo-class can be exploited to disclose visited websites. SOLUTION: Update to version 4.1 (available only for Mac OS X v10.4 systems) or upgrade to version 5.0. PROVIDED AND/OR DISCOVERED BY: 37) Michal Zalewski The vendor also credits: 1) Chris Evans of the Google Security Team, and Andrzej Dyjak 2) Abhishek Arya of Google 3) Borja Marcos of Sarenet 4) Eric Seidel of Google 5) Paul Stone of Context Information Security 6) Masahiro Yamada 8) Matthieu Bonetti of Vupen 9) Ralf Philipp Weinmann working with TippingPoint's Zero Day Initiative 10, 41) Eduardo Vela Nava (sirdarckcat) of Google 11) Michal Zalewski of Google 12) Gianni "gf3" Chiappetta of Runlevel6 13, 15, 16, 18, 19, 20, 21, 23, 43) wushi of team509, working with TippingPoint's Zero Day Initiative 14) wushi and Z of team509, working with TippingPoint's Zero Day Initiative 17) regenrecht working with iDefense 22, 31) Aki Helin of OUSPG 24) Ojan Vafai of Google 25) Colin Percival of Tarsnap 28) Dave Bowker 30) Mark Dowd of Azimuth Security 32) Chris Evans of Google 33, 45) wushi of team509 34) Sergey Glazunov 35) kuzzcc, and Skylined of Google Chrome Security Team 38) Yaar Schnitman of Google 39) Mark Dowd 40) James Robinson of Google 42) Marc Worrell of WhatWebWhat ORIGINAL ADVISORY: Apple: http://support.apple.com/kb/HT4196 Michal Zalewski: http://lcamtuf.blogspot.com/2010/06/safari-tale-of-betrayal-and-revenge.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . ---------------------------------------------------------------------- Secure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM). For more information: SA40257 SA41328 SA42151 SA42312 SOLUTION: Upgrade to iOS 4.2 (downloadable and installable via iTunes). Belated, but here are some recent bugs that you guys might find interesting: 1) DOM reference fuzzer, originally developed in 2008, crashed every browser on the market back then: http://lcamtuf.blogspot.com/2010/06/announcing-reffuzz-2yo-fuzzer.html Several of the bugs triggered by the fuzzer were rediscovered independently in the two years it took vendors to investigate; most notably, looks like the winning Pwn2own bug is a duplicate of this. The release of Microsoft MS10-035 and Apple APPLE-SA-2010-06-21-1 probably fixes the last of the known exploitable issues triggered by this tool. Probably not a great argument in favor of limited disclosure. 2) Safari SOP bypass (CVE-2010-0544) - the story is amusing by the virtue of spanning more than one decade: http://lcamtuf.blogspot.com/2010/06/safari-tale-of-betrayal-and-revenge.html 3) Address bar spoofing in Firefox (CVE-2010-1206): http://lcamtuf.blogspot.com/2010/06/yeah-about-that-address-bar-thing.html 4) Some more fun with selective mid-keystroke focus redirection in WebKit-based browsers (CVE-2010-1422): http://lcamtuf.blogspot.com/2010/06/curse-of-inverse-strokejacking.html [ Original post on this topic: http://seclists.org/fulldisclosure/2010/Mar/232 ] _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . Some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, or compromise a user's system. For more information: SA37931 SA40105 4) One unspecified vulnerability with an unknown impact has been reported in WebKit included in iTunes. No further information is currently available. 5) Two vulnerabilities in WebKit can be exploited by malicious people to compromise a user's system. For more information see vulnerability #14 and 15 in: SA40257 SOLUTION: Update to version 9.2. PROVIDED AND/OR DISCOVERED BY: 1) The vendor credits Chris Evans of the Google Security Team and Andrzej Dyjak. 2) The vendor credits Kevin Finisterre, digitalmunition.com. 4) Reported by the vendor

Trust: 2.61

sources: NVD: CVE-2010-0544 // JVNDB: JVNDB-2010-001576 // BID: 40620 // BID: 40717 // VULHUB: VHN-43149 // PACKETSTORM: 90456 // PACKETSTORM: 96086 // PACKETSTORM: 91167 // PACKETSTORM: 91028

AFFECTED PRODUCTS

vendor:applemodel:safariscope:eqversion:4.0.4

Trust: 2.2

vendor:applemodel:safariscope:eqversion:4.0.3

Trust: 2.2

vendor:applemodel:safariscope:eqversion:4.0.2

Trust: 2.2

vendor:applemodel:safariscope:eqversion:4.0.1

Trust: 2.2

vendor:applemodel:safariscope:eqversion:4.0.0b

Trust: 1.6

vendor:applemodel:safariscope:eqversion:4.0

Trust: 1.6

vendor:applemodel:safariscope:eqversion:4

Trust: 1.4

vendor:applemodel:safariscope:eqversion:4.0.5

Trust: 1.2

vendor:applemodel:webkitscope:eqversion:*

Trust: 1.0

vendor:applemodel:safariscope:lteversion:4.0.5

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:v10.4.11

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.5.8

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.4.11

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.5.8

Trust: 0.8

vendor:applemodel:iosscope:eqversion:2.0 to 3.1.3

Trust: 0.8

vendor:applemodel:iosscope:eqversion:3.2 to 3.2.2 (ipad for )

Trust: 0.8

vendor:applemodel:ios for ipod touchscope:eqversion:2.1 to 3.1.3

Trust: 0.8

vendor:applemodel:ipadscope: - version: -

Trust: 0.8

vendor:applemodel:iphonescope: - version: -

Trust: 0.8

vendor:applemodel:ipod touchscope: - version: -

Trust: 0.8

vendor:applemodel:itunesscope:eqversion:9

Trust: 0.8

vendor:applemodel:safariscope:eqversion:5

Trust: 0.8

vendor:applemodel:safari for windowsscope:eqversion:4.0.5

Trust: 0.6

vendor:applemodel:safari for windowsscope:eqversion:4.0.4

Trust: 0.6

vendor:applemodel:safari for windowsscope:eqversion:4.0.3

Trust: 0.6

vendor:applemodel:safari for windowsscope:eqversion:4.0.2

Trust: 0.6

vendor:applemodel:safari for windowsscope:eqversion:4

Trust: 0.6

vendor:applemodel:safari betascope:eqversion:4

Trust: 0.6

vendor:applemodel:safari for windowsscope:neversion:5.0

Trust: 0.6

vendor:applemodel:safariscope:neversion:5.0

Trust: 0.6

vendor:applemodel:safariscope:neversion:4.1

Trust: 0.6

vendor:applemodel:webkitscope: - version: -

Trust: 0.6

vendor:webkitmodel:open source project webkit r52833scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkit r52401scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkit r51295scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkit r38566scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.1.8

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.0.2.20

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.1.3

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.2.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.1.3

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.2.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:ios betascope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:itunesscope:neversion:9.2

Trust: 0.3

vendor:applemodel:iosscope:neversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:neversion:4

Trust: 0.3

sources: BID: 40620 // BID: 40717 // JVNDB: JVNDB-2010-001576 // CNNVD: CNNVD-201006-139 // NVD: CVE-2010-0544

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-0544
value: MEDIUM

Trust: 1.0

NVD: CVE-2010-0544
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201006-139
value: MEDIUM

Trust: 0.6

VULHUB: VHN-43149
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2010-0544
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-43149
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-43149 // JVNDB: JVNDB-2010-001576 // CNNVD: CNNVD-201006-139 // NVD: CVE-2010-0544

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-43149 // JVNDB: JVNDB-2010-001576 // NVD: CVE-2010-0544

THREAT TYPE

network

Trust: 0.6

sources: BID: 40620 // BID: 40717

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-201006-139

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-001576

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-43149

PATCH

title:HT4196url:http://support.apple.com/kb/HT4196

Trust: 0.8

title:HT4220url:http://support.apple.com/kb/HT4220

Trust: 0.8

title:HT4225url:http://support.apple.com/kb/HT4225

Trust: 0.8

title:HT4456url:http://support.apple.com/kb/HT4456

Trust: 0.8

title:HT4196url:http://support.apple.com/kb/HT4196?viewlocale=ja_JP

Trust: 0.8

title:HT4220url:http://support.apple.com/kb/HT4220?viewlocale=ja_JP

Trust: 0.8

title:HT4225url:http://support.apple.com/kb/HT4225?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2010-001576

EXTERNAL IDS

db:NVDid:CVE-2010-0544

Trust: 2.9

db:SECUNIAid:40105

Trust: 2.6

db:VUPENid:ADV-2010-1373

Trust: 2.5

db:SECTRACKid:1024067

Trust: 2.5

db:SECUNIAid:40196

Trust: 2.0

db:BIDid:40620

Trust: 2.0

db:VUPENid:ADV-2010-1512

Trust: 1.9

db:SECUNIAid:42314

Trust: 1.2

db:JVNDBid:JVNDB-2010-001576

Trust: 0.8

db:CNNVDid:CNNVD-201006-139

Trust: 0.7

db:APPLEid:APPLE-SA-2010-06-07-1

Trust: 0.6

db:BIDid:40717

Trust: 0.4

db:PACKETSTORMid:91167

Trust: 0.2

db:VULHUBid:VHN-43149

Trust: 0.1

db:PACKETSTORMid:90456

Trust: 0.1

db:PACKETSTORMid:96086

Trust: 0.1

db:PACKETSTORMid:91028

Trust: 0.1

sources: VULHUB: VHN-43149 // BID: 40620 // BID: 40717 // JVNDB: JVNDB-2010-001576 // PACKETSTORM: 90456 // PACKETSTORM: 96086 // PACKETSTORM: 91167 // PACKETSTORM: 91028 // CNNVD: CNNVD-201006-139 // NVD: CVE-2010-0544

REFERENCES

url:http://securitytracker.com/id?1024067

Trust: 2.5

url:http://secunia.com/advisories/40105

Trust: 2.5

url:http://www.vupen.com/english/advisories/2010/1373

Trust: 2.5

url:http://secunia.com/advisories/40196

Trust: 1.9

url:http://www.vupen.com/english/advisories/2010/1512

Trust: 1.9

url:http://support.apple.com/kb/ht4196

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2010/jun/msg00000.html

Trust: 1.7

url:http://www.securityfocus.com/bid/40620

Trust: 1.7

url:http://support.apple.com/kb/ht4220

Trust: 1.2

url:http://support.apple.com/kb/ht4456

Trust: 1.2

url:http://lists.apple.com/archives/security-announce/2010//jun/msg00002.html

Trust: 1.1

url:http://lists.apple.com/archives/security-announce/2010/jun/msg00003.html

Trust: 1.1

url:http://lists.apple.com/archives/security-announce/2010//nov/msg00003.html

Trust: 1.1

url:http://support.apple.com/kb/ht4225

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a6656

Trust: 1.1

url:http://secunia.com/advisories/42314

Trust: 1.1

url:http://lcamtuf.blogspot.com/2010/06/safari-tale-of-betrayal-and-revenge.html

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0544

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-0544

Trust: 0.8

url:http://www.apple.com/safari/

Trust: 0.6

url:http://secunia.com/products/corporate/evm/

Trust: 0.3

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.3

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.3

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.3

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.3

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.3

url:http://secunia.com/vulnerability_scanning/corporate/webinars/

Trust: 0.2

url:http://secunia.com/advisories/40105/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=40105

Trust: 0.1

url:http://secunia.com/advisories/40105/

Trust: 0.1

url:http://secunia.com/advisories/42314/

Trust: 0.1

url:http://secunia.com/products/corporate/vim/

Trust: 0.1

url:http://secunia.com/advisories/42314/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=42314

Trust: 0.1

url:http://lcamtuf.blogspot.com/2010/06/yeah-about-that-address-bar-thing.html

Trust: 0.1

url:http://lcamtuf.blogspot.com/2010/06/announcing-reffuzz-2yo-fuzzer.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-1422

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://lcamtuf.blogspot.com/2010/06/curse-of-inverse-strokejacking.html

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0544

Trust: 0.1

url:http://seclists.org/fulldisclosure/2010/mar/232

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-1206

Trust: 0.1

url:http://secunia.com/advisories/40196/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=40196

Trust: 0.1

url:http://secunia.com/advisories/40196/

Trust: 0.1

sources: VULHUB: VHN-43149 // BID: 40620 // BID: 40717 // JVNDB: JVNDB-2010-001576 // PACKETSTORM: 90456 // PACKETSTORM: 96086 // PACKETSTORM: 91167 // PACKETSTORM: 91028 // CNNVD: CNNVD-201006-139 // NVD: CVE-2010-0544

CREDITS

Apple; Abhihek Arya of Google, Inc.; Borja Marcos of Sarenet; Eric Seidel of Google, Inc.; Paul Stone of Context Information Security; Masahiro Yamada; Matthieu Bonetti of VUPEN Vulnerability Research Team; Ralf Philipp Weinmann working with TippingPoint'

Trust: 0.6

sources: CNNVD: CNNVD-201006-139

SOURCES

db:VULHUBid:VHN-43149
db:BIDid:40620
db:BIDid:40717
db:JVNDBid:JVNDB-2010-001576
db:PACKETSTORMid:90456
db:PACKETSTORMid:96086
db:PACKETSTORMid:91167
db:PACKETSTORMid:91028
db:CNNVDid:CNNVD-201006-139
db:NVDid:CVE-2010-0544

LAST UPDATE DATE

2024-11-23T20:15:58.655000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-43149date:2017-09-19T00:00:00
db:BIDid:40620date:2010-06-10T21:19:00
db:BIDid:40717date:2015-03-19T08:39:00
db:JVNDBid:JVNDB-2010-001576date:2010-12-10T00:00:00
db:CNNVDid:CNNVD-201006-139date:2010-06-18T00:00:00
db:NVDid:CVE-2010-0544date:2024-11-21T01:12:24.953

SOURCES RELEASE DATE

db:VULHUBid:VHN-43149date:2010-06-11T00:00:00
db:BIDid:40620date:2010-06-07T00:00:00
db:BIDid:40717date:2010-06-07T00:00:00
db:JVNDBid:JVNDB-2010-001576date:2010-06-29T00:00:00
db:PACKETSTORMid:90456date:2010-06-09T09:04:37
db:PACKETSTORMid:96086date:2010-11-24T11:53:31
db:PACKETSTORMid:91167date:2010-06-29T01:55:12
db:PACKETSTORMid:91028date:2010-06-25T14:14:55
db:CNNVDid:CNNVD-201006-139date:2010-06-18T00:00:00
db:NVDid:CVE-2010-0544date:2010-06-11T19:30:12.253