CVE-2010-1770

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, Apple Safari before 4.1 on Mac OS X 10.4, and Google Chrome before 5.0.375.70 does not properly handle a transformation of a text node that has the IBM1147 character set, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document containing a BR element, related to a "type checking issue."

References

http://code.google.com/p/chromium/issues/detail?id=43487

http://googlechromereleases.blogspot.com/2010/06/stable-channel-update.html

http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html

http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html

http://lists.apple.com/archives/security-announce/2010//Sep/msg00002.html

http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html

http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html

http://secunia.com/advisories/40072

http://secunia.com/advisories/40105

http://secunia.com/advisories/40196

http://secunia.com/advisories/41856

http://secunia.com/advisories/42314

http://secunia.com/advisories/43068

http://securitytracker.com/id?1024067

http://support.apple.com/kb/HT4196

http://support.apple.com/kb/HT4220

http://support.apple.com/kb/HT4334

http://support.apple.com/kb/HT4456

http://www.mandriva.com/security/advisories?name=MDVSA-2011:039

http://www.securityfocus.com/bid/40620

http://www.ubuntu.com/usn/USN-1006-1

http://www.vupen.com/english/advisories/2010/1373

http://www.vupen.com/english/advisories/2010/1512

http://www.vupen.com/english/advisories/2010/2722

http://www.vupen.com/english/advisories/2011/0212

http://www.vupen.com/english/advisories/2011/0552

http://zerodayinitiative.com/advisories/ZDI-10-093/

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7099

Details

Source: MITRE

Published: 2010-06-11

Updated: 2020-08-07

Type: CWE-94

Risk Information

CVSS v2

Base Score: 9.3

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 8.6

Severity: HIGH

Vulnerable Software

Configuration 1

AND

OR

cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*

cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*

OR

cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.7:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*

Configuration 2

AND

OR

cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*

cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*

OR

cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:10.04.4:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*

cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*

cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp3:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp1:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp3:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp1:*:*:*:*:*:*

Tenable Plugins

View all (14 total)

IDNameProductFamilySeverity
75629openSUSE Security Update : libwebkit (openSUSE-SU-2011:0024-1)NessusSuSE Local Security Checks
critical
75627openSUSE Security Update : libwebkit (openSUSE-SU-2010:0458-1)NessusSuSE Local Security Checks
critical
53764openSUSE Security Update : libwebkit (openSUSE-SU-2011:0024-1)NessusSuSE Local Security Checks
critical
52523Mandriva Linux Security Advisory : webkit (MDVSA-2011:039)NessusMandriva Local Security Checks
critical
5715Apple iOS < 4.2 Multiple VulnerabilitiesNessus Network MonitorMobile Devices
critical
50046Ubuntu 9.10 / 10.04 LTS / 10.10 : webkit vulnerabilities (USN-1006-1)NessusUbuntu Local Security Checks
critical
47751FreeBSD : webkit-gtk2 -- Multiple vulnerabilities (19419b3b-92bd-11df-b140-0015f2db7bde)NessusFreeBSD Local Security Checks
critical
5573iTunes < 9.2 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
medium
47038Apple iTunes < 9.2 Multiple Vulnerabilities (uncredentialed check)NessusPeer-To-Peer File Sharing
high
47037Apple iTunes < 9.2 Multiple Vulnerabilities (credentialed check)NessusWindows
high
801012Safari < 4.1 / 5.0 Multiple VulnerabilitiesLog Correlation EngineWeb Clients
high
5566Safari < 4.1 / 5.0 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
critical
46838Safari < 5.0 Multiple VulnerabilitiesNessusWindows
high
46837Mac OS X : Apple Safari < 5.0 / 4.1NessusMacOS X Local Security Checks
high