National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2010-0054 Detail

Description

Use-after-free vulnerability in WebKit in Apple Safari before 4.0.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving HTML IMG elements.

Source:  MITRE      Last Modified:  03/15/2010

Evaluator Description

Per: http://lists.apple.com/archives/security-announce/2010/Mar/msg00000.html 'WebKit CVE-ID: CVE-2010-0054 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.1 or later, Mac OS X Server v10.6.1 or later, Windows 7, Vista, XP Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: A use-after-free issue exists in WebKit's handling of HTML image elements. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory reference tracking. Credit: Apple.'

Quick Info

CVE Dictionary Entry:
CVE-2010-0054
Original release date:
03/15/2010
Last revised:
09/18/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
9.3 HIGH
Vector:
(AV:N/AC:M/Au:N/C:C/I:C/A:C) (legend)
Impact Subscore:
10.0
Exploitability Subscore:
8.6
CVSS Version 2 Metrics:
Access Vector:
Network exploitable - Victim must voluntarily interact with attack mechanism
Access Complexity:
Medium
Authentication:
Not required to exploit
Impact Type:
Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service

Evaluator Solution

Per: http://lists.apple.com/archives/security-announce/2010/Mar/msg00000.html 'Safari 4.0.5 is available via the Apple Software Update application, or Apple's Safari download site at: http://www.apple.com/safari/download/'

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html External Source APPLE APPLE-SA-2010-06-21-1
http://lists.apple.com/archives/security-announce/2010/Mar/msg00000.html Vendor Advisory External Source APPLE APPLE-SA-2010-03-11-1
http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041383.html External Source FEDORA FEDORA-2010-8360
http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041432.html External Source FEDORA FEDORA-2010-8379
http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041436.html External Source FEDORA FEDORA-2010-8423
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html External Source SUSE SUSE-SR:2011:002
http://support.apple.com/kb/HT4070 Vendor Advisory External Source CONFIRM http://support.apple.com/kb/HT4070
http://support.apple.com/kb/HT4225 External Source CONFIRM http://support.apple.com/kb/HT4225
http://www.mandriva.com/security/advisories?name=MDVSA-2011:039 External Source MANDRIVA MDVSA-2011:039
http://www.securityfocus.com/bid/38671 Patch External Source BID 38671
http://www.securitytracker.com/id?1023708 External Source SECTRACK 1023708
http://www.ubuntu.com/usn/USN-1006-1 External Source UBUNTU USN-1006-1
http://www.vupen.com/english/advisories/2010/2722 External Source VUPEN ADV-2010-2722
http://www.vupen.com/english/advisories/2011/0212 External Source VUPEN ADV-2011-0212
http://www.vupen.com/english/advisories/2011/0552 External Source VUPEN ADV-2011-0552
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6915 External Source OVAL oval:org.mitre.oval:def:6915

References to Check Content

Identifier:
oval:org.mitre.oval:def:6915
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:6915

Technical Details

Vulnerability Type (View All)

  • Resource Management Errors (CWE-399)

Change History 2 change records found - show changes