VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
CVE-2010-3811
safari, webkit: Use-after-free vulnerability in WebKit in Apple Saf...
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3811

Original

Use-after-free vulnerability in WebKit in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving element attributes.

Translation   (Show)





About This Analysis Information
Analysis Information Provider:
NIST NVD
First Published:
2010-11-22
Source Information Category:
Advisory, Alert
Last Updated:
2010-11-22




Affected Product Tags
cpe:/a:apple:safari:1.0
cpe:/a:apple:safari:1.0.0
cpe:/a:apple:safari:1.0.0b1
cpe:/a:apple:safari:1.0.0b2
cpe:/a:apple:safari:1.0.1
cpe:/a:apple:safari:1.0.2
cpe:/a:apple:safari:1.0.3
cpe:/a:apple:safari:1.0.3:85.8
cpe:/a:apple:safari:1.0.3:85.8.1
cpe:/a:apple:safari:1.0:beta
cpe:/a:apple:safari:1.0:beta2
cpe:/a:apple:safari:1.1
cpe:/a:apple:safari:1.1.0
cpe:/a:apple:safari:1.1.1
cpe:/a:apple:safari:1.2
cpe:/a:apple:safari:1.2.0
cpe:/a:apple:safari:1.2.1
cpe:/a:apple:safari:1.2.2
cpe:/a:apple:safari:1.2.3
cpe:/a:apple:safari:1.2.4
cpe:/a:apple:safari:1.2.5
cpe:/a:apple:safari:1.3
cpe:/a:apple:safari:1.3.0
cpe:/a:apple:safari:1.3.1
cpe:/a:apple:safari:1.3.2
cpe:/a:apple:safari:1.3.2:312.5
cpe:/a:apple:safari:1.3.2:312.6
cpe:/a:apple:safari:2
cpe:/a:apple:safari:2.0
cpe:/a:apple:safari:2.0.0
cpe:/a:apple:safari:2.0.1
cpe:/a:apple:safari:2.0.2
cpe:/a:apple:safari:2.0.3
cpe:/a:apple:safari:2.0.3:417.8
cpe:/a:apple:safari:2.0.3:417.9
cpe:/a:apple:safari:2.0.3:417.9.2
cpe:/a:apple:safari:2.0.3:417.9.3
cpe:/a:apple:safari:2.0.4
cpe:/a:apple:safari:3
cpe:/a:apple:safari:3.0
cpe:/a:apple:safari:3.0.0
cpe:/a:apple:safari:3.0.0b
cpe:/a:apple:safari:3.0.1
cpe:/a:apple:safari:3.0.1b
cpe:/a:apple:safari:3.0.2
cpe:/a:apple:safari:3.0.2b
cpe:/a:apple:safari:3.0.3
cpe:/a:apple:safari:3.0.3b
cpe:/a:apple:safari:3.0.4
cpe:/a:apple:safari:3.0.4b
cpe:/a:apple:safari:3.1.0
cpe:/a:apple:safari:3.1.0b
cpe:/a:apple:safari:3.1.1
cpe:/a:apple:safari:3.1.2
cpe:/a:apple:safari:3.2.0
cpe:/a:apple:safari:3.2.1
cpe:/a:apple:safari:3.2.2
cpe:/a:apple:safari:4.1
cpe:/a:apple:safari:4.1.1
cpe:/a:apple:safari:4.1.2 and previous versions
cpe:/a:apple:safari:5.0
cpe:/a:apple:safari:5.0.1
cpe:/a:apple:safari:5.0.2 and previous versions
cpe:/a:apple:webkit
cpe:/o:apple:mac_os_x:10.4
cpe:/o:apple:mac_os_x:10.4.0
cpe:/o:apple:mac_os_x:10.4.1
cpe:/o:apple:mac_os_x:10.4.10
cpe:/o:apple:mac_os_x:10.4.11
cpe:/o:apple:mac_os_x:10.4.2
cpe:/o:apple:mac_os_x:10.4.3
cpe:/o:apple:mac_os_x:10.4.4
cpe:/o:apple:mac_os_x:10.4.5
cpe:/o:apple:mac_os_x:10.4.6
cpe:/o:apple:mac_os_x:10.4.7
cpe:/o:apple:mac_os_x:10.4.8
cpe:/o:apple:mac_os_x:10.4.9
cpe:/o:apple:mac_os_x:10.5
cpe:/o:apple:mac_os_x:10.5.0
cpe:/o:apple:mac_os_x:10.5.1
cpe:/o:apple:mac_os_x:10.5.2
cpe:/o:apple:mac_os_x:10.5.3
cpe:/o:apple:mac_os_x:10.5.4
cpe:/o:apple:mac_os_x:10.5.5
cpe:/o:apple:mac_os_x:10.5.6
cpe:/o:apple:mac_os_x:10.5.7
cpe:/o:apple:mac_os_x:10.5.8
cpe:/o:apple:mac_os_x:10.6.0
cpe:/o:apple:mac_os_x:10.6.1
cpe:/o:apple:mac_os_x:10.6.2
cpe:/o:apple:mac_os_x:10.6.3
cpe:/o:apple:mac_os_x:10.6.4
cpe:/o:apple:mac_os_x:10.6.5
cpe:/o:apple:mac_os_x_server:10.4
cpe:/o:apple:mac_os_x_server:10.4.0
cpe:/o:apple:mac_os_x_server:10.4.1
cpe:/o:apple:mac_os_x_server:10.4.10
cpe:/o:apple:mac_os_x_server:10.4.11
cpe:/o:apple:mac_os_x_server:10.4.2
cpe:/o:apple:mac_os_x_server:10.4.3
cpe:/o:apple:mac_os_x_server:10.4.4
cpe:/o:apple:mac_os_x_server:10.4.5
cpe:/o:apple:mac_os_x_server:10.4.6
cpe:/o:apple:mac_os_x_server:10.4.7
cpe:/o:apple:mac_os_x_server:10.4.8
cpe:/o:apple:mac_os_x_server:10.4.9
cpe:/o:apple:mac_os_x_server:10.5
cpe:/o:apple:mac_os_x_server:10.5.0
cpe:/o:apple:mac_os_x_server:10.5.1
cpe:/o:apple:mac_os_x_server:10.5.2
cpe:/o:apple:mac_os_x_server:10.5.3
cpe:/o:apple:mac_os_x_server:10.5.4
cpe:/o:apple:mac_os_x_server:10.5.5
cpe:/o:apple:mac_os_x_server:10.5.6
cpe:/o:apple:mac_os_x_server:10.5.7
cpe:/o:apple:mac_os_x_server:10.5.8
cpe:/o:apple:mac_os_x_server:10.6.0
cpe:/o:apple:mac_os_x_server:10.6.1
cpe:/o:apple:mac_os_x_server:10.6.2
cpe:/o:apple:mac_os_x_server:10.6.3
cpe:/o:apple:mac_os_x_server:10.6.4
cpe:/o:apple:mac_os_x_server:10.6.5
cpe:/o:microsoft:windows_7
cpe:/o:microsoft:windows_vista
cpe:/o:microsoft:windows_xp::sp2
 


Vulnerability Analysis Results
[Access Vector]  [?]
Undefined [?]

Local [?]
Adjacent Network [?]
X Network [?]

[Access Complexit]  [?]
Undefined [?]

High [?]
X Medium [?]
Low [?]

[Authentication]  [?]
Undefined [?]

Multiple [?]
Single [?]
X None [?]

[Confidentiality Impact]  [?]
Undefined [?]

None [?]
Partial [?]
X Complete [?]

[Integrity Impact]  [?]
Undefined [?]

None [?]
Partial [?]
X Complete [?]

[Availability Impact]  [?]
Undefined [?]

None [?]
Partial [?]
X Complete [?]

Alternatives




References
APPLE APPLE-SA-2010-11-18-1




CONFIRM http://support.apple.com/kb/HT4455




Vulnerability Type Resource Management Errors (CWE-399)





Copyright © 2010 JPCERT/CC All Rights Reserved.