CVE-2010-3812

HIGH

Description

Integer overflow in the Text::wholeText method in dom/Text.cpp in WebKit, as used in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4; webkitgtk before 1.2.6; and possibly other products allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving Text objects.

References

http://lists.apple.com/archives/security-announce/2010//Nov/msg00002.html

http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html

http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052906.html

http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html

http://secunia.com/advisories/42314

http://secunia.com/advisories/43068

http://secunia.com/advisories/43086

http://support.apple.com/kb/HT4455

http://support.apple.com/kb/HT4456

http://trac.webkit.org/changeset/68705

http://www.mandriva.com/security/advisories?name=MDVSA-2011:039

http://www.redhat.com/support/errata/RHSA-2011-0177.html

http://www.securityfocus.com/bid/44960

http://www.vupen.com/english/advisories/2010/3046

http://www.vupen.com/english/advisories/2011/0212

http://www.vupen.com/english/advisories/2011/0216

http://www.vupen.com/english/advisories/2011/0552

http://www.zerodayinitiative.com/advisories/ZDI-10-257/

https://bugs.webkit.org/show_bug.cgi?id=46848

https://bugzilla.redhat.com/show_bug.cgi?id=667022

https://exchange.xforce.ibmcloud.com/vulnerabilities/63350

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11689

Details

Source: MITRE

Published: 2010-11-22

Updated: 2017-09-19

Type: CWE-189

Risk Information

CVSS v2.0

Base Score: 9.3

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 8.6

Severity: HIGH

Vulnerable Software

Configuration 1

AND

OR

cpe:2.3:a:apple:safari:5.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:5.0.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*

cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*

OR

cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.6.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.7:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.6.5:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*

Configuration 2

AND

OR

cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:4.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:4.1.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*

cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*

OR

cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*

Tenable Plugins

View all (15 total)

IDNameProductFamilySeverity
79962GLSA-201412-09 : Multiple packages, Multiple vulnerabilities fixed in 2011NessusGentoo Local Security Checks
critical
75629openSUSE Security Update : libwebkit (openSUSE-SU-2011:0024-1)NessusSuSE Local Security Checks
critical
68187Oracle Linux 6 : webkitgtk (ELSA-2011-0177)NessusOracle Linux Local Security Checks
critical
60943Scientific Linux Security Update : webkitgtk on SL6.x i386/x86_64NessusScientific Linux Local Security Checks
critical
55967Ubuntu 10.04 LTS / 10.10 : webkit vulnerabilities (USN-1195-1)NessusUbuntu Local Security Checks
critical
53764openSUSE Security Update : libwebkit (openSUSE-SU-2011:0024-1)NessusSuSE Local Security Checks
critical
52523Mandriva Linux Security Advisory : webkit (MDVSA-2011:039)NessusMandriva Local Security Checks
critical
51672RHEL 6 : webkitgtk (RHSA-2011:0177)NessusRed Hat Local Security Checks
critical
51444Fedora 13 : webkitgtk-1.2.6-1.fc13 (2011-0121)NessusFedora Local Security Checks
high
51404FreeBSD : webkit-gtk2 -- Multiple vulnerabilities (06a12e26-142e-11e0-bea2-0015f2db7bde)NessusFreeBSD Local Security Checks
high
5715Apple iOS < 4.2 Multiple VulnerabilitiesNessus Network MonitorMobile Devices
critical
50654Safari < 5.0.3 Multiple VulnerabilitiesNessusWindows
high
50653Mac OS X : Apple Safari < 5.0.3 / 4.1.3NessusMacOS X Local Security Checks
high
801005Safari < 4.1.3 / 5.0.3 Multiple VulnerabilitiesLog Correlation EngineWeb Clients
high
5711Safari < 4.1.3 / 5.0.3 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
high