8.8
CVSSv3

CVE-2010-0047

CVSSv4: NA | CVSSv3: 8.8 | CVSSv2: 9.3 | VMScore: 980 | EPSS: 0.06257 | KEV: Not Included
Published: 15/03/2010 Updated: 21/11/2024

Vulnerability Summary

Use-After-Free in WebKit Enables Remote Code Execution in Safari

A use-after-free vulnerability exists in WebKit for Apple Safari versions before 4.0.5. This flaw enables remote attackers to run arbitrary code or cause a denial of service by crashing the application. The issue is linked to "HTML object element fallback content."

Vulnerable Product Search on Vulmon Subscribe to Product

apple safari

apple safari 4.0

apple safari 4.0.0b

apple safari 4.0.1

apple safari 4.0.2

apple safari 4.0.3

Vendor Advisories

Debian Bug report logs - #574064 webkit: CVE-2010-0046 through CVE-2010-0054 (multiple vulnerabilities) Package: src:webkit; Maintainer for src:webkit is (unknown); Reported by: Michael Gilbert <michaelsgilbert@gmailcom> Date: Tue, 16 Mar 2010 02:30:01 UTC Severity: grave Tags: security Found in version webkit/101-4 ...

References

CWE-399https://nvd.nist.govhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=574064https://www.first.org/epsshttp://lists.apple.com/archives/security-announce/2010/Jun/msg00003.htmlhttp://lists.apple.com/archives/security-announce/2010/Mar/msg00000.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2010-May/041383.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2010-May/041432.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2010-May/041436.htmlhttp://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.htmlhttp://secunia.com/advisories/41856http://secunia.com/advisories/43068http://support.apple.com/kb/HT4070http://support.apple.com/kb/HT4225http://www.mandriva.com/security/advisories?name=MDVSA-2011:039http://www.securityfocus.com/bid/38671http://www.securitytracker.com/id?1023708http://www.ubuntu.com/usn/USN-1006-1http://www.vupen.com/english/advisories/2010/2722http://www.vupen.com/english/advisories/2011/0212http://www.vupen.com/english/advisories/2011/0552https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6882http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.htmlhttp://lists.apple.com/archives/security-announce/2010/Mar/msg00000.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2010-May/041383.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2010-May/041432.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2010-May/041436.htmlhttp://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.htmlhttp://secunia.com/advisories/41856http://secunia.com/advisories/43068http://support.apple.com/kb/HT4070http://support.apple.com/kb/HT4225http://www.mandriva.com/security/advisories?name=MDVSA-2011:039http://www.securityfocus.com/bid/38671http://www.securitytracker.com/id?1023708http://www.ubuntu.com/usn/USN-1006-1http://www.vupen.com/english/advisories/2010/2722http://www.vupen.com/english/advisories/2011/0212http://www.vupen.com/english/advisories/2011/0552https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6882