CVE-2010-3813

MEDIUM

Description

The WebCore::HTMLLinkElement::process function in WebCore/html/HTMLLinkElement.cpp in WebKit, as used in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4; webkitgtk before 1.2.6; and possibly other products does not verify whether DNS prefetching is enabled when processing an HTML LINK element, which allows remote attackers to bypass intended access restrictions, as demonstrated by an HTML e-mail message that uses a LINK element for X-Confirm-Reading-To functionality.

References

http://lists.apple.com/archives/security-announce/2010//Nov/msg00002.html

http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html

http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052906.html

http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html

http://secunia.com/advisories/42314

http://secunia.com/advisories/43068

http://secunia.com/advisories/43086

http://support.apple.com/kb/HT4455

http://support.apple.com/kb/HT4456

http://trac.webkit.org/changeset/63622

http://www.mandriva.com/security/advisories?name=MDVSA-2011:039

http://www.redhat.com/support/errata/RHSA-2011-0177.html

http://www.vupen.com/english/advisories/2010/3046

http://www.vupen.com/english/advisories/2011/0212

http://www.vupen.com/english/advisories/2011/0216

http://www.vupen.com/english/advisories/2011/0552

https://bugs.webkit.org/show_bug.cgi?id=42500

https://bugzilla.redhat.com/show_bug.cgi?id=667024

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12293

Details

Source: MITRE

Published: 2010-11-22

Updated: 2017-09-19

Type: CWE-264

Risk Information

CVSS v2.0

Base Score: 5.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Impact Score: 4.9

Exploitability Score: 8.6

Severity: MEDIUM

Vulnerable Software

Configuration 1

AND

OR

cpe:2.3:a:apple:safari:5.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:5.0.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*

cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*

OR

cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.6.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.7:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.6.5:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*

Configuration 2

AND

OR

cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*

cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:4.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:4.1.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*

cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*

OR

cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*

Tenable Plugins

View all (15 total)

IDNameProductFamilySeverity
79962GLSA-201412-09 : Multiple packages, Multiple vulnerabilities fixed in 2011NessusGentoo Local Security Checks
critical
75629openSUSE Security Update : libwebkit (openSUSE-SU-2011:0024-1)NessusSuSE Local Security Checks
critical
68187Oracle Linux 6 : webkitgtk (ELSA-2011-0177)NessusOracle Linux Local Security Checks
critical
60943Scientific Linux Security Update : webkitgtk on SL6.x i386/x86_64NessusScientific Linux Local Security Checks
critical
55967Ubuntu 10.04 LTS / 10.10 : webkit vulnerabilities (USN-1195-1)NessusUbuntu Local Security Checks
critical
53764openSUSE Security Update : libwebkit (openSUSE-SU-2011:0024-1)NessusSuSE Local Security Checks
critical
52523Mandriva Linux Security Advisory : webkit (MDVSA-2011:039)NessusMandriva Local Security Checks
critical
51672RHEL 6 : webkitgtk (RHSA-2011:0177)NessusRed Hat Local Security Checks
critical
51444Fedora 13 : webkitgtk-1.2.6-1.fc13 (2011-0121)NessusFedora Local Security Checks
high
51404FreeBSD : webkit-gtk2 -- Multiple vulnerabilities (06a12e26-142e-11e0-bea2-0015f2db7bde)NessusFreeBSD Local Security Checks
high
5715Apple iOS < 4.2 Multiple VulnerabilitiesNessus Network MonitorMobile Devices
critical
50654Safari < 5.0.3 Multiple VulnerabilitiesNessusWindows
high
50653Mac OS X : Apple Safari < 5.0.3 / 4.1.3NessusMacOS X Local Security Checks
high
801005Safari < 4.1.3 / 5.0.3 Multiple VulnerabilitiesLog Correlation EngineWeb Clients
high
5711Safari < 4.1.3 / 5.0.3 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
high