SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Web Browser)  >   Apple Safari Vendors:   Apple Computer
(Apple Issues Fix for iOS) Apple Safari Bugs Let Remote Users Execute Arbitrary Code or Access Potentially Sensitive Information
SecurityTracker Alert ID:  1024411
SecurityTracker URL:  http://securitytracker.com/id/1024411
CVE Reference:   CVE-2010-1421, CVE-2010-1422, CVE-2010-1764, CVE-2010-1770, CVE-2010-1771   (Links to External Site)
Date:  Sep 9 2010
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Multiple vulnerabilities were reported in Apple Safari. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create specially crafted HTML or other content that, when loaded by the target user, will execute arbitrary code on the target system or disclose potentially sensitive information.

Andrzej Dyjak, Abhishek Arya of Google, Inc., Borja Marcos of Sarenet, Eric Seidel of Google, Inc., Paul Stone of Context Information Security, Masahiro Yamada, Matthieu Bonetti of VUPEN Vulnerability Research Team, Ralf Philipp Weinmann (via TippingPoint's Zero Day Initiative), Eduardo Vela Nava (sirdarckcat) of Google Inc., Gianni "gf3" Chiappetta of Runlevel6, regenrecht (via iDefense), Ojan Vafai of Google Inc., Colin Percival of Tarsnap, Dave Bowker of davebowker.com, Aki Helin of OUSPG, Chris Evans of Google Inc., Sergey Glazunov, kuzzcc, Skylined of Google Chrome Security Team, Mark Dowd of Azimuth Security, Michal Zalewski of Google, Inc., Yaar Schnitman of Google Inc., James Robinson of Google Inc., Eduardo Vela Nava (sirdarckcat) of Google Inc., Marc Worrell of WhatWebWhat, wushi of team509 (via TippingPoint's Zero Day Initiative), and Apple reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system or access information on the target user's system.
Solution:   Apple has issued a fix for iOS for CVE-2010-1421, CVE-2010-1422, CVE-2010-1764, CVE-2010-1770, CVE-2010-1771.

The Apple advisory is available at:

http://support.apple.com/kb/HT4334

Vendor URL:  support.apple.com/kb/HT4196 (Links to External Site)
Cause:   Access control error, Boundary error
Underlying OS:   iOS

Message History:   This archive entry is a follow-up to the message listed below.
Jun 8 2010 Apple Safari Bugs Let Remote Users Execute Arbitrary Code or Access Potentially Sensitive Information



 Source Message Contents

Date:  Thu, 09 Sep 2010 03:02:31 +0000
Subject:  Apple iOS


APPLE-SA-2010-09-08-1 iOS 4.1 for iPhone and iPod touch


WebKit
CVE-ID:  CVE-2010-1770
Available for:  iOS 2.0 through 4.0.2 for iPhone 3G and later,
iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later
Impact:  Visiting a maliciously crafted website may lead to an
unexpected application termination or arbitrary code execution
Description:  A type checking issue exists in WebKit's handling of
text nodes. Visiting a maliciously crafted website may lead to an
unexpected application termination or arbitrary code execution. This
issue is addressed through improved type checking. Credit to wushi of
team509, working with TippingPoint's Zero Day Initiative for
reporting this issue.

WebKit
CVE-ID:  CVE-2010-1421
Available for:  iOS 2.0 through 4.0.2 for iPhone 3G and later,
iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later
Impact:  Visiting a maliciously crafted website may change the
contents of the clipboard
Description:  A design issue exists in the implementation of the
JavaScript execCommand function. A maliciously crafted web page can
modify the contents of the clipboard without user interaction. This
issue is addressed by only allowing clipboard commands to be executed
if initiated by the user. Credit: Apple.

WebKit
CVE-ID:  CVE-2010-1422
Available for:  iOS 2.0 through 4.0.2 for iPhone 3G and later,
iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later
Impact:  Interacting with a maliciously crafted website may result in
unexpected actions on other sites
Description:  An implementation issue exists in WebKit's handling of
keyboard focus. If the keyboard focus changes during the processing
of key presses, WebKit may deliver an event to the newly-focused
frame, instead of the frame that had focus when the key press
occurred. A maliciously crafted website may be able to manipulate a
user into taking an unexpected action, such as initiating a purchase.
This issue is addressed by preventing the delivery of key press
events if the keyboard focus changes during processing. Credit to
Michal Zalewski of Google, Inc. for reporting this issue.

WebKit
CVE-ID:  CVE-2010-1771
Available for:  iOS 2.0 through 4.0.2 for iPhone 3G and later,
iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later
Impact:  Visiting a maliciously crafted website may lead to an
unexpected application termination or arbitrary code execution
Description:  A use after free issue exists in WebKit's handling of
fonts. Visiting a maliciously crafted website may lead to an
unexpected application termination or arbitrary code execution. This
issue is addressed through improved handling of fonts. Credit: Apple.

WebKit
CVE-ID:  CVE-2010-1764
Available for:  iOS 2.0 through 4.0.2 for iPhone 3G and later,
iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later
Impact:  Visiting a website that redirects form submissions may lead
to an information disclosure
Description:  A design issue exists in WebKit's handling of HTTP
redirects. When a form submission is redirected to a website that
also does a redirection, the information contained in the submitted
form may be sent to the third site. This issue is addressed through
improved handling of HTTP redirects. Credit to Marc Worrell of
WhatWebWhat for reporting this issue.


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC