VARIoT IoT vulnerabilities database
 
    | VAR-201006-0362 | CVE-2010-2291 | snom VoIP Phone of Web Vulnerability that circumvents interface restrictions | CVSS V2: 3.3 CVSS V3: - Severity: LOW | 
                            Unspecified vulnerability in the web interface in snom VoIP Phone firmware 8 before 8.2.35 allows remote attackers to bypass intended restrictions and modify user credentials via unknown vectors.  NOTE: some of these details are obtained from third party information. 
Attackers can exploit this issue to bypass certain security restrictions and edit user credentials. 
snom VoIP phone firmware versions prior to 8.2.35 are vulnerable. ----------------------------------------------------------------------
Secunia CSI integrated with Microsoft WSUS and Microsoft SCCM for 3rd party Patch Management
Free webinars
http://secunia.com/vulnerability_scanning/corporate/webinars/
----------------------------------------------------------------------
TITLE:
Snom VoIP Phone Firmware User Interface Security Bypass
SECUNIA ADVISORY ID:
SA37635
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/37635/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=37635
RELEASE DATE:
2010-06-11
DISCUSS ADVISORY:
http://secunia.com/advisories/37635/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/37635/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=37635
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in Snom VoIP Phone Firmware, which
can be exploited by malicious people to bypass certain security
restrictions. 
The vulnerability is reported in 8.2 releases prior to 8.2.35. 
SOLUTION:
Update to version 8.2.35. 
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor. 
ORIGINAL ADVISORY:
http://wiki.snom.com/Firmware/V8/Release_Notes/8.2.35
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201006-0270 | CVE-2010-1570 | Cisco UCCX of CTI Service disruption in server components (DoS) Vulnerabilities | CVSS V2: 7.8 CVSS V3: - Severity: HIGH | 
                            The computer telephony integration (CTI) server component in Cisco Unified Contact Center Express (UCCX) 7.0 before 7.0(1)SR4 and 7.0(2), 6.0 before 6.0(1)SR1, and 5.0 before 5.0(2)SR3 allows remote attackers to cause a denial of service (CTI server and Node Manager failure) via a malformed CTI message. 
An attacker can exploit this issue to cause active agents to logout,  denying service to legitimate users. 
This issue is tracked by Cisco Bug ID CSCso89629. These
vulnerabilities are independent of each other. 
Exploitation of these vulnerabilities could result in a DoS condition or an
information disclosure. 
This advisory is posted at:
http://www.cisco.com/warp/public/707/cisco-sa-20100609-uccx.shtml
Affected Products
=================
Cisco UCCX is an integrated "contact center in a box" solution for use in
deployments of up to 300 agents. 
Vulnerable Products
+------------------
The vulnerabilities described in this document affect the following products:
  * Cisco UCCX versions 5.x, 6.x, and 7.x
  * Cisco Customer Response Solution (CRS) versions 5.x, 6.x, and 7.x
  * Cisco Unified IP Interactive Voice Response (Cisco Unified IP IVR) versions
    5.x, 6.x, and 7.x
Products Confirmed Not Vulnerable
+--------------------------------
No other Cisco products are currently known to be affected by these
vulnerabilities. The CTI server is only started when the
Integrated Call Distribution (ICD) license is enabled, Cisco Unified IP
Interactive Voice Response (Cisco Unified IP IVR) deployments are not affected
by the CTI server DoS vulnerability. The CTI server listens by default on TCP
port 42027, although the port number can be changed in the System Port
Parameters screen. 
Directory Traversal Vulnerability
+--------------------------------
A directory traversal vulnerability exists in the bootstrap service of the
Cisco UCCX product that allows read access to any file on the system. This
vulnerability is triggered by bootstrap messages addressed to TCP port 6295. 
The bootstrap service is used to keep the UCCX configuration synchronized
across servers in a high-availability deployment model. All deployment modes
can be affected, such as ICD, ICM and IP-IVR, but only if a second node has
been added to the configuration. (Nodes can be listed using the Cisco UCCX
Administration Web interface with the Server option in the System pull-down
taskbar). A high-availability license is not required for a system to be
vulnerable. 
Vulnerability Scoring Details
=============================
Cisco has provided scores for the vulnerabilities in this advisory based on the
Common Vulnerability Scoring System (CVSS). The CVSS scoring in this Security
Advisory is done in accordance with CVSS version 2.0. 
CVSS is a standards-based scoring method that conveys vulnerability severity
and helps determine urgency and priority of response. 
Cisco has provided a base and temporal score. Customers can then compute
environmental scores to assist in determining the impact of the vulnerability
in individual networks. 
Cisco has provided an FAQ to answer additional questions regarding CVSS at:
http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html
Cisco has also provided a CVSS calculator to help compute the environmental
impact for individual networks at:
http://intellishield.cisco.com/security/alertmanager/cvss
CSCso89629 - CTI Service DoS Vulnerability (UCCX)
CVSS Base Score - 7.8
Access Vector           - Network
Access Complexity       - Low
Authentication          - None
Confidentiality Impact  - None
Integrity Impact        - None
Availability Impact     - Complete
CVSS Temporal Score - 6.4
Exploitability          - Functional
Remediation Level       - Official-Fix
Report Confidence       - Confirmed
CSCsx76165 - Bootstrap Service Directory Traversal Vulnerability (UCCX)
CVSS Base Score - 7.8
Access Vector           - Network
Access Complexity       - Low
Authentication          - None
Confidentiality Impact  - None
Integrity Impact        - None
Availability Impact     - Complete
CVSS Temporal Score - 6.4
Exploitability          - Functional
Remediation Level       - Official-Fix
Report Confidence       - Confirmed
Impact
======
Successful exploitation of the Cisco UCCX CTI server DoS vulnerability will
cause the agents to logout, and the Cisco UCCX server will be temporarily
unavailable to agents until the node manager service and CTI server complete
their automatic restart. Repeated attempts to exploit this vulnerability could
result in a sustained DoS condition. 
Successful exploitation of the Cisco UCCX bootstrap service directory traversal
vulnerability enables an unauthenticated attacker to read any file on the
system. 
Software Versions and Fixes
===========================
When considering software upgrades, also consult http://www.cisco.com/go/psirt
and any subsequent advisories to determine exposure and a complete upgrade
solution. 
In all cases, customers should exercise caution to be certain the devices to be
upgraded contain sufficient memory and that current hardware and software
configurations will continue to be supported properly by the new release. If
the information is not clear, contact the Cisco Technical Assistance Center
(TAC) or your contracted maintenance provider for assistance. 
The following tables indicate the versions of Cisco UCCX affected by the
vulnerabilities described in this document. All the vulnerabilities are fixed
in the latest versions of the products. 
CSCso89629 - CTI service DoS vulnerability (Cisco UCCX)
+---------------------------------------------+
| Release |   Vulnerable   |  First Fixed in  |
|---------+----------------+------------------|
| 8.0     | Not vulnerable |                  |
|---------+----------------+------------------|
| 7.0     | Vulnerable     | 7.0(1)SR4, 7.0   |
|         |                | (2)              |
|---------+----------------+------------------|
| 6.0     | Vulnerable     | 6.0(1) SR1       |
|---------+----------------+------------------|
| 5.0     | Vulnerable     | 5.0(2)SR3        |
+---------------------------------------------+
CSCsx76165 - Bootstrap service information disclosure vulnerability (Cisco UCCX)
+---------------------------------------------+
| Release | Vulnerable  |   First Fixed in    |
|---------+-------------+---------------------|
| 8.0     | Not         |                     |
|         | vulnerable  |                     |
|---------+-------------+---------------------|
| 7.0     | Vulnerable  | 7.0(1)SR2, 7.0(2)   |
|---------+-------------+---------------------|
| 6.0     | Vulnerable  | Update to a fixed   |
|         |             | release             |
|---------+-------------+---------------------|
| 5.0     | Vulnerable  | 5.0(2)SR3           |
+---------------------------------------------+
Workarounds
===========
There are no workarounds for these vulnerabilities. 
Additional mitigations that can be deployed on Cisco devices in the network are
available in the Cisco Applied Mitigation Bulletin companion document for this
advisory, which is available at the following link:
http://www.cisco.com/warp/public/707/cisco-amb-20100609-uccx.shtml
Obtaining Fixed Software
========================
Cisco has released free software updates that address these vulnerabilities. 
Prior to deploying software, customers should consult their maintenance
provider or check the software for feature set compatibility and known issues
specific to their environment. 
Customers may only install and expect support for the feature sets they have
purchased. By installing, downloading, accessing or otherwise using such
software upgrades, customers agree to be bound by the terms of Cisco's software
license terms found at:
http://www.cisco.com/en/US/docs/general/warranty/English/EU1KEN_.html
or as otherwise set forth at Cisco.com Downloads at:
http://www.cisco.com/public/sw-center/sw-usingswc.shtml
Do not contact psirt@cisco.com or security-alert@cisco.com for software
upgrades. 
Customers with Service Contracts
+-------------------------------
Customers with contracts should obtain upgraded software through their regular
update channels. For most customers, this means that upgrades should be
obtained through the Software Center on Cisco's worldwide website at:
http://www.cisco.com
Customers using Third Party Support Organizations
+------------------------------------------------
Customers whose Cisco products are provided or maintained through prior or
existing agreements with third-party support organizations, such as Cisco
Partners, authorized resellers, or service providers should contact that
support organization for guidance and assistance with the appropriate course of
action in regards to this advisory. 
The effectiveness of any workaround or fix is dependent on specific customer
situations, such as product mix, network topology, traffic behavior, and
organizational mission. Due to the variety of affected products and releases,
customers should consult with their service provider or support organization to
ensure any applied workaround or fix is the most appropriate for use in the
intended network before it is deployed. 
Customers without Service Contracts
+----------------------------------
Customers who purchase direct from Cisco but do not hold a Cisco service
contract, and customers who purchase through third-party vendors but are
unsuccessful in obtaining fixed software through their point of sale should
acquire upgrades by contacting the Cisco Technical Assistance Center (TAC). TAC
contacts are as follows. 
  * +1 800 553 2447 (toll free from within North America)
  * +1 408 526 7209 (toll call from anywhere in the world)
  * e-mail: tac@cisco.com
Customers should have their product serial number available and be prepared to
give the URL of this notice as evidence of entitlement to a free upgrade. Free
upgrades for non-contract customers must be requested through the TAC. 
Refer to:
http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html
for additional TAC contact information, including localized telephone numbers,
and instructions and e-mail addresses for use in various languages. 
Exploitation and Public Announcements
=====================================
The Cisco PSIRT is not aware of any public announcements or malicious use of
the vulnerabilities described in this advisory. 
The DoS vulnerability was found during Cisco internal testing, and the
bootstrap service directory traversal vulnerability was reported to the Cisco
Technical Assistance Center (TAC) by a customer. 
Status of this Notice: FINAL
============================
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF
GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS
FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS
LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO
CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. 
A stand-alone copy or Paraphrase of the text of this document that omits the
distribution URL in the following section is an uncontrolled copy, and may lack
important information or contain factual errors. 
Distribution
============
This advisory is posted on Cisco's worldwide website at:
http://www.cisco.com/warp/public/707/cisco-sa-20100609-uccx.shtml
In addition to worldwide web posting, a text version of this notice is
clear-signed with the Cisco PSIRT PGP key and is posted to the following e-mail
and Usenet news recipients. 
  * cust-security-announce@cisco.com
  * first-bulletins@lists.first.org
  * bugtraq@securityfocus.com
  * vulnwatch@vulnwatch.org
  * cisco@spot.colorado.edu
  * cisco-nsp@puck.nether.net
  * full-disclosure@lists.grok.org.uk
  * comp.dcom.sys.cisco@newsgate.cisco.com
Future updates of this advisory, if any, will be placed on Cisco's worldwide
website, but may or may not be actively announced on mailing lists or
newsgroups. Users concerned about this problem are encouraged to check the
above URL for any updates. 
Revision History
================
+---------------------------------------------+
| Revision  | 2010-June-09 | Initial public   |
| 1.0       |              | release.         |
+---------------------------------------------+
Cisco Security Procedures
=========================
Complete information on reporting security vulnerabilities in Cisco products,
obtaining assistance with security incidents, and registering to receive
security information from Cisco, is available on Cisco's worldwide website at:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
This includes instructions for press inquiries regarding Cisco security
notices. All Cisco security advisories are available at:
http://www.cisco.com/go/psirt
-----BEGIN PGP SIGNATURE-----
iD8DBQFMDsr986n/Gc8U/uARAjPCAJoDHkSUpMORQLoL4zxxrQ8QB1QGyACcDk8E
NAOf5ZPRZU4uki85FJsRtzU=
=z7OE
-----END PGP SIGNATURE-----
                        
| VAR-201006-0272 | CVE-2010-1572 | Cisco AXP Vulnerabilities in Administrator Support in the Technical Support Diagnostic Shell | CVSS V2: 9.0 CVSS V3: - Severity: HIGH | 
                            Unspecified vulnerability in the tech support diagnostic shell in Cisco Application Extension Platform (AXP) 1.1 and 1.1.5 allows local users to obtain sensitive configuration information and gain administrator privileges via unspecified API calls. Cisco AXP consists of Linux-based open Cisco ISR hardware modules for application development and hosting. The technical support shell can be accessed using the techsupport support shell command. The authenticated Cisco AXP user can use the API to execute commands on the Cisco ISR. The Cisco AXP 1.5 release requires AXP users to be set up in the ISR configuration before using the API to execute commands. Cisco Application Extension Platform (AXP) is prone to a remote privilege-escalation vulnerability. This issue is tracked by Cisco Bug ID CSCtb65413. 
An authenticated attacker can exploit this issue to gain administrative access to the affected application. This may lead to a full compromise of the affected computer or aid in further attacks. 
The following are vulnerable:
Cisco Application Extension Platform 1.1
Cisco Application Extension Platform 1.1.5 (when upgraded from 1.1). Cisco has released free software updates
that address this vulnerability. There is no workaround for this vulnerability. 
Vulnerability Scoring Details
=============================
Cisco has provided scores for the vulnerability in this advisory based on the
Common Vulnerability Scoring System (CVSS). The CVSS scoring in this Security
Advisory is done in accordance with CVSS version 2.0. 
CVSS is a standards-based scoring method that conveys vulnerability severity
and helps determine urgency and priority of response. 
Cisco has provided a base and temporal score. Customers can then compute
environmental scores to assist in determining the impact of the vulnerability
in individual networks. 
Cisco has provided an FAQ to answer additional questions regarding CVSS at:
http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html
Cisco has also provided a CVSS calculator to help compute the environmental
impact for individual networks at:
http://intellishield.cisco.com/security/alertmanager/cvss
CSCtb65413 - AXP techsupport shell privilege escalation vulnerabilities
CVSS Base Score - 9
Access Vector           - Network
Access Complexity       - Low
Authentication          - Single
Confidentiality Impact  - Complete
Integrity Impact        - Complete
Availability Impact     - Complete
CVSS Temporal Score - 7.4
Exploitability          - Functional
Remediation Level       - Official-Fix
Report Confidence       - Confirmed
Impact
======
Successful exploitation of the vulnerability may allow an authenticated user to
obtain complete administrative access to a vulnerable Cisco Application
Extension Platform module. 
Software Versions and Fixes
===========================
When considering software upgrades, also consult http://www.cisco.com/go/psirt
and any subsequent advisories to determine exposure and a complete upgrade
solution. 
In all cases, customers should exercise caution to be certain the devices to be
upgraded contain sufficient memory and that current hardware and software
configurations will continue to be supported properly by the new release. If
the information is not clear, contact the Cisco Technical Assistance Center
(TAC) or your contracted maintenance provider for assistance. 
Workarounds
===========
There is no workaround for this vulnerability. 
Obtaining Fixed Software
========================
Cisco has released free software updates that address this vulnerability. Prior
to deploying software, customers should consult their maintenance provider or
check the software for feature set compatibility and known issues specific to
their environment. 
Customers may only install and expect support for the feature sets they have
purchased. By installing, downloading, accessing or otherwise using such
software upgrades, customers agree to be bound by the terms of Cisco's software
license terms found at:
http://www.cisco.com/en/US/docs/general/warranty/English/EU1KEN_.html
or as otherwise set forth at Cisco.com Downloads at:
http://www.cisco.com/public/sw-center/sw-usingswc.shtml
Do not contact psirt@cisco.com or security-alert@cisco.com for software
upgrades. Cisco Application Extension
Platform software version 1.1.7 can be downloaded at the following link:
http://tools.cisco.com/support/downloads/go/ImageList.x?relVer=1.1.7&mdfid=282831883&sftType=Application+Extension+Platform+Installation+Packages&optPlat=&nodecount=2&edesignator=null&modelName=Cisco+Application+Extension+Platform+Version+1.1&treeMdfId=268437899&treeName=Routers&modifmdfid=null&imname=&hybrid=Y&imst=N&lr=Y
Customers with Service Contracts
+-------------------------------
Customers with contracts should obtain upgraded software through their regular
update channels. For most customers, this means that upgrades should be
obtained through the Software Center on Cisco's worldwide website at:
http://www.cisco.com
Customers using Third Party Support Organizations
+------------------------------------------------
Customers whose Cisco products are provided or maintained through prior or
existing agreements with third-party support organizations, such as Cisco
Partners, authorized resellers, or service providers should contact that
support organization for guidance and assistance with the appropriate course of
action in regards to this advisory. 
The effectiveness of any workaround or fix is dependent on specific customer
situations, such as product mix, network topology, traffic behavior, and
organizational mission. Due to the variety of affected products and releases,
customers should consult with their service provider or support organization to
ensure any applied workaround or fix is the most appropriate for use in the
intended network before it is deployed. 
Customers without Service Contracts
+----------------------------------
Customers who purchase direct from Cisco but do not hold a Cisco service
contract, and customers who purchase through third-party vendors but are
unsuccessful in obtaining fixed software through their point of sale should
acquire upgrades by contacting the Cisco Technical Assistance Center (TAC). TAC
contacts are as follows. 
  * +1 800 553 2447 (toll free from within North America)
  * +1 408 526 7209 (toll call from anywhere in the world)
  * e-mail: tac@cisco.com
Customers should have their product serial number available and be prepared to
give the URL of this notice as evidence of entitlement to a free upgrade. Free
upgrades for non-contract customers must be requested through the TAC. 
Refer to:
http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html
for additional TAC contact information, including localized telephone numbers,
and instructions and e-mail addresses for use in various languages. 
Exploitation and Public Announcements
=====================================
The Cisco PSIRT is not aware of any public announcements or malicious use of
the vulnerability described in this advisory. This vulnerability was reported
to Cisco by n.runs AG. 
Status of this Notice: FINAL
============================
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF
GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS
FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS
LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO
CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. 
A stand-alone copy or Paraphrase of the text of this document that omits the
distribution URL in the following section is an uncontrolled copy, and may lack
important information or contain factual errors. 
Distribution
============
This advisory is posted on Cisco's worldwide website at:
http://www.cisco.com/warp/public/707/cisco-sa-20100609-axp.shtml
In addition to worldwide web posting, a text version of this notice is
clear-signed with the Cisco PSIRT PGP key and is posted to the following e-mail
and Usenet news recipients. 
  * cust-security-announce@cisco.com
  * first-bulletins@lists.first.org
  * bugtraq@securityfocus.com
  * vulnwatch@vulnwatch.org
  * cisco@spot.colorado.edu
  * cisco-nsp@puck.nether.net
  * full-disclosure@lists.grok.org.uk
  * comp.dcom.sys.cisco@newsgate.cisco.com
Future updates of this advisory, if any, will be placed on Cisco's worldwide
website, but may or may not be actively announced on mailing lists or
newsgroups. Users concerned about this problem are encouraged to check the
above URL for any updates. 
Revision History
================
+---------------------------------------------+
| Revision | 2010-June-09 | Initial puiblic   |
| 1.0      |              | release.          |
+---------------------------------------------+
Cisco Security Procedures
=========================
Complete information on reporting security vulnerabilities in Cisco products,
obtaining assistance with security incidents, and registering to receive
security information from Cisco, is available on Cisco's worldwide website at:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
This includes instructions for press inquiries regarding Cisco security
notices. All Cisco security advisories are available at:
http://www.cisco.com/go/psirt
-----BEGIN PGP SIGNATURE-----
iD4DBQFMDswe86n/Gc8U/uARAsyIAJ9Xy21nCPKCfpqwjQCBD9nDnkeuyACWMBWR
L6wENZxv1+jhhzroz0gEJg==
=y/rh
-----END PGP SIGNATURE-----
                        
| VAR-201006-0258 | CVE-2010-2261 | Linksys WAP54Gv3 Vulnerable to arbitrary command execution | CVSS V2: 10.0 CVSS V3: - Severity: HIGH | 
                            Linksys WAP54Gv3 firmware 3.04.03 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) data2 and (2) data3 parameters to (a) Debug_command_page.asp and (b) debug.cgi. WAP54Gv3 is prone to a remote security vulnerability. Linksys WAP54Gv3 firmware has multiple arbitrary command execution vulnerabilities. These parameters include: data2 parameter and data3 parameter of Debug_command_page.asp and debug.cgi
                        
| VAR-201006-0271 | CVE-2010-1571 | Cisco UCCX of bootstrap Directory traversal vulnerability in services | CVSS V2: 7.8 CVSS V3: - Severity: HIGH | 
                            Directory traversal vulnerability in the bootstrap service in Cisco Unified Contact Center Express (UCCX) 7.0 before 7.0(1)SR4 and 7.0(2), unspecified 6.0 versions, and 5.0 before 5.0(2)SR3 allows remote attackers to read arbitrary files via a crafted bootstrap message to TCP port 6295. Cisco Unified Contact Center Express is prone to a directory-traversal vulnerability. 
An attacker can exploit this issue to  view any file on the computer through the bootstrap service. Successful exploits may lead to other attacks. 
This issue is tracked by Cisco BugID CSCsx76165. These
vulnerabilities are independent of each other. 
Exploitation of these vulnerabilities could result in a DoS condition or an
information disclosure. 
This advisory is posted at:
http://www.cisco.com/warp/public/707/cisco-sa-20100609-uccx.shtml
Affected Products
=================
Cisco UCCX is an integrated "contact center in a box" solution for use in
deployments of up to 300 agents. 
Vulnerable Products
+------------------
The vulnerabilities described in this document affect the following products:
  * Cisco UCCX versions 5.x, 6.x, and 7.x
  * Cisco Customer Response Solution (CRS) versions 5.x, 6.x, and 7.x
  * Cisco Unified IP Interactive Voice Response (Cisco Unified IP IVR) versions
    5.x, 6.x, and 7.x
Products Confirmed Not Vulnerable
+--------------------------------
No other Cisco products are currently known to be affected by these
vulnerabilities. 
Details
=======
Denial of Service Vulnerabilities
+--------------------------------
A DoS vulnerability exists in the computer telephony integration (CTI) server
component of the Cisco UCCX product. The CTI server is only started when the
Integrated Call Distribution (ICD) license is enabled, Cisco Unified IP
Interactive Voice Response (Cisco Unified IP IVR) deployments are not affected
by the CTI server DoS vulnerability. The CTI server listens by default on TCP
port 42027, although the port number can be changed in the System Port
Parameters screen. This vulnerability is triggered by malformed CTI messages
addressed to the vulnerable systems that could cause the CTI server and the
Cisco Unified CCX Node Manager to fail, and all active agents will be logged
out. The DoS condition will be temporal and the Cisco UCCX system will become
operational again once the node manager and the CTI server complete their
automatic restart. 
This vulnerability is documented in Cisco Bug ID CSCso89629 and has been
assigned CVE ID CVE-2010-1570. This
vulnerability is triggered by bootstrap messages addressed to TCP port 6295. 
The bootstrap service is used to keep the UCCX configuration synchronized
across servers in a high-availability deployment model. All deployment modes
can be affected, such as ICD, ICM and IP-IVR, but only if a second node has
been added to the configuration. (Nodes can be listed using the Cisco UCCX
Administration Web interface with the Server option in the System pull-down
taskbar). A high-availability license is not required for a system to be
vulnerable. 
This vulnerability is documented in Cisco Bug ID CSCsx76165 and has been
assigned CVE ID CVE-2010-1571. 
Vulnerability Scoring Details
=============================
Cisco has provided scores for the vulnerabilities in this advisory based on the
Common Vulnerability Scoring System (CVSS). The CVSS scoring in this Security
Advisory is done in accordance with CVSS version 2.0. 
CVSS is a standards-based scoring method that conveys vulnerability severity
and helps determine urgency and priority of response. 
Cisco has provided a base and temporal score. Customers can then compute
environmental scores to assist in determining the impact of the vulnerability
in individual networks. 
Cisco has provided an FAQ to answer additional questions regarding CVSS at:
http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html
Cisco has also provided a CVSS calculator to help compute the environmental
impact for individual networks at:
http://intellishield.cisco.com/security/alertmanager/cvss
CSCso89629 - CTI Service DoS Vulnerability (UCCX)
CVSS Base Score - 7.8
Access Vector           - Network
Access Complexity       - Low
Authentication          - None
Confidentiality Impact  - None
Integrity Impact        - None
Availability Impact     - Complete
CVSS Temporal Score - 6.4
Exploitability          - Functional
Remediation Level       - Official-Fix
Report Confidence       - Confirmed
CSCsx76165 - Bootstrap Service Directory Traversal Vulnerability (UCCX)
CVSS Base Score - 7.8
Access Vector           - Network
Access Complexity       - Low
Authentication          - None
Confidentiality Impact  - None
Integrity Impact        - None
Availability Impact     - Complete
CVSS Temporal Score - 6.4
Exploitability          - Functional
Remediation Level       - Official-Fix
Report Confidence       - Confirmed
Impact
======
Successful exploitation of the Cisco UCCX CTI server DoS vulnerability will
cause the agents to logout, and the Cisco UCCX server will be temporarily
unavailable to agents until the node manager service and CTI server complete
their automatic restart. Repeated attempts to exploit this vulnerability could
result in a sustained DoS condition. 
Software Versions and Fixes
===========================
When considering software upgrades, also consult http://www.cisco.com/go/psirt
and any subsequent advisories to determine exposure and a complete upgrade
solution. 
In all cases, customers should exercise caution to be certain the devices to be
upgraded contain sufficient memory and that current hardware and software
configurations will continue to be supported properly by the new release. If
the information is not clear, contact the Cisco Technical Assistance Center
(TAC) or your contracted maintenance provider for assistance. 
The following tables indicate the versions of Cisco UCCX affected by the
vulnerabilities described in this document. All the vulnerabilities are fixed
in the latest versions of the products. 
CSCso89629 - CTI service DoS vulnerability (Cisco UCCX)
+---------------------------------------------+
| Release |   Vulnerable   |  First Fixed in  |
|---------+----------------+------------------|
| 8.0     | Not vulnerable |                  |
|---------+----------------+------------------|
| 7.0     | Vulnerable     | 7.0(1)SR4, 7.0   |
|         |                | (2)              |
|---------+----------------+------------------|
| 6.0     | Vulnerable     | 6.0(1) SR1       |
|---------+----------------+------------------|
| 5.0     | Vulnerable     | 5.0(2)SR3        |
+---------------------------------------------+
CSCsx76165 - Bootstrap service information disclosure vulnerability (Cisco UCCX)
+---------------------------------------------+
| Release | Vulnerable  |   First Fixed in    |
|---------+-------------+---------------------|
| 8.0     | Not         |                     |
|         | vulnerable  |                     |
|---------+-------------+---------------------|
| 7.0     | Vulnerable  | 7.0(1)SR2, 7.0(2)   |
|---------+-------------+---------------------|
| 6.0     | Vulnerable  | Update to a fixed   |
|         |             | release             |
|---------+-------------+---------------------|
| 5.0     | Vulnerable  | 5.0(2)SR3           |
+---------------------------------------------+
Workarounds
===========
There are no workarounds for these vulnerabilities. 
Additional mitigations that can be deployed on Cisco devices in the network are
available in the Cisco Applied Mitigation Bulletin companion document for this
advisory, which is available at the following link:
http://www.cisco.com/warp/public/707/cisco-amb-20100609-uccx.shtml
Obtaining Fixed Software
========================
Cisco has released free software updates that address these vulnerabilities. 
Prior to deploying software, customers should consult their maintenance
provider or check the software for feature set compatibility and known issues
specific to their environment. 
Customers may only install and expect support for the feature sets they have
purchased. By installing, downloading, accessing or otherwise using such
software upgrades, customers agree to be bound by the terms of Cisco's software
license terms found at:
http://www.cisco.com/en/US/docs/general/warranty/English/EU1KEN_.html
or as otherwise set forth at Cisco.com Downloads at:
http://www.cisco.com/public/sw-center/sw-usingswc.shtml
Do not contact psirt@cisco.com or security-alert@cisco.com for software
upgrades. 
Customers with Service Contracts
+-------------------------------
Customers with contracts should obtain upgraded software through their regular
update channels. For most customers, this means that upgrades should be
obtained through the Software Center on Cisco's worldwide website at:
http://www.cisco.com
Customers using Third Party Support Organizations
+------------------------------------------------
Customers whose Cisco products are provided or maintained through prior or
existing agreements with third-party support organizations, such as Cisco
Partners, authorized resellers, or service providers should contact that
support organization for guidance and assistance with the appropriate course of
action in regards to this advisory. 
The effectiveness of any workaround or fix is dependent on specific customer
situations, such as product mix, network topology, traffic behavior, and
organizational mission. Due to the variety of affected products and releases,
customers should consult with their service provider or support organization to
ensure any applied workaround or fix is the most appropriate for use in the
intended network before it is deployed. 
Customers without Service Contracts
+----------------------------------
Customers who purchase direct from Cisco but do not hold a Cisco service
contract, and customers who purchase through third-party vendors but are
unsuccessful in obtaining fixed software through their point of sale should
acquire upgrades by contacting the Cisco Technical Assistance Center (TAC). TAC
contacts are as follows. 
  * +1 800 553 2447 (toll free from within North America)
  * +1 408 526 7209 (toll call from anywhere in the world)
  * e-mail: tac@cisco.com
Customers should have their product serial number available and be prepared to
give the URL of this notice as evidence of entitlement to a free upgrade. Free
upgrades for non-contract customers must be requested through the TAC. 
Refer to:
http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html
for additional TAC contact information, including localized telephone numbers,
and instructions and e-mail addresses for use in various languages. 
Exploitation and Public Announcements
=====================================
The Cisco PSIRT is not aware of any public announcements or malicious use of
the vulnerabilities described in this advisory. 
Status of this Notice: FINAL
============================
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF
GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS
FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS
LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO
CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. 
A stand-alone copy or Paraphrase of the text of this document that omits the
distribution URL in the following section is an uncontrolled copy, and may lack
important information or contain factual errors. 
Distribution
============
This advisory is posted on Cisco's worldwide website at:
http://www.cisco.com/warp/public/707/cisco-sa-20100609-uccx.shtml
In addition to worldwide web posting, a text version of this notice is
clear-signed with the Cisco PSIRT PGP key and is posted to the following e-mail
and Usenet news recipients. 
  * cust-security-announce@cisco.com
  * first-bulletins@lists.first.org
  * bugtraq@securityfocus.com
  * vulnwatch@vulnwatch.org
  * cisco@spot.colorado.edu
  * cisco-nsp@puck.nether.net
  * full-disclosure@lists.grok.org.uk
  * comp.dcom.sys.cisco@newsgate.cisco.com
Future updates of this advisory, if any, will be placed on Cisco's worldwide
website, but may or may not be actively announced on mailing lists or
newsgroups. Users concerned about this problem are encouraged to check the
above URL for any updates. 
Revision History
================
+---------------------------------------------+
| Revision  | 2010-June-09 | Initial public   |
| 1.0       |              | release.         |
+---------------------------------------------+
Cisco Security Procedures
=========================
Complete information on reporting security vulnerabilities in Cisco products,
obtaining assistance with security incidents, and registering to receive
security information from Cisco, is available on Cisco's worldwide website at:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
This includes instructions for press inquiries regarding Cisco security
notices. All Cisco security advisories are available at:
http://www.cisco.com/go/psirt
-----BEGIN PGP SIGNATURE-----
iD8DBQFMDsr986n/Gc8U/uARAjPCAJoDHkSUpMORQLoL4zxxrQ8QB1QGyACcDk8E
NAOf5ZPRZU4uki85FJsRtzU=
=z7OE
-----END PGP SIGNATURE-----
                        
| VAR-201006-0427 | CVE-2010-2289 | Juniper Networks IVE of dana/home/homepage.cgi Open redirect vulnerability | CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM | 
                            Open redirect vulnerability in dana/home/homepage.cgi in Juniper Networks IVE 6.5R1 (Build 14599) and 6.5R2 (Build 14951) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the Location parameter. Juniper Networks IVE OS is prone to an open-redirection vulnerability because the application fails to properly sanitize user-supplied input. 
A successful exploit may aid in phishing attacks; other attacks are also possible. 
IVE OS 6.5R1.0 and 6.5R2.0 are vulnerable; prior versions may also be affected. ----------------------------------------------------------------------
Secunia CSI integrated with Microsoft WSUS and Microsoft SCCM for 3rd party Patch Management
Free webinars
http://secunia.com/vulnerability_scanning/corporate/webinars/
----------------------------------------------------------------------
TITLE:
Juniper IVE OS Redirection Weakness
SECUNIA ADVISORY ID:
SA40117
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/40117/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=40117
RELEASE DATE:
2010-06-11
DISCUSS ADVISORY:
http://secunia.com/advisories/40117/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/40117/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=40117
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Richard Brain has reported a weakness in Juniper IVE OS, which can be
exploited by malicious people to conduct redirection attacks. 
The weakness is caused due to the homepage.cgi script allowing to
redirect users to a site specified by an attacker. This can be
exploited to e.g. redirect users to an (untrusted) fake site. 
The weakness is reported in version 6.5R1 (Build 14599) and version
6.5R2 (Build 14951) using Model SA-2000. 
SOLUTION:
Update to version 6.5R3.1 (build 15255). 
PROVIDED AND/OR DISCOVERED BY:
Richard Brain, ProCheckUp Ltd
ORIGINAL ADVISORY:
Juniper:
http://www.juniper.net/alerts/viewalert.jsp?actionBtn=Search&txtAlertNumber=PSN-2010-05-751&viewMode=view
ProCheckUp Ltd:
http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr09-17
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201006-0273 | CVE-2010-1573 | Linksys WAP54Gv3 firmware web page debugging interface trust management vulnerability Related entries in the VARIoT exploits database: VAR-E-201006-1691 | CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL | 
                            Linksys WAP54Gv3 firmware 3.04.03 and earlier uses a hard-coded username (Gemtek) and password (gemtekswd) for a debug interface for certain web pages, which allows remote attackers to execute arbitrary commands via the (1) data1, (2) data2, or (3) data3 parameters to (a) Debug_command_page.asp and (b) debug.cgi. (1) Debug_command_page.asp and debug.cgi to data1 parameters (2) Debug_command_page.asp and debug.cgi to data2 parameters (3) Debug_command_page.asp and debug.cgi to data3 parameters. Successful attacks allow an attacker to gain access to the device. Linksys WAP54Gv3 wireless router devices are prone to a security-bypass vulnerability because they allow access to debugging scripts through hard coded credentials. 
The following firmware versions are vulnerable:
3.05.03 (Europe)
3.04.03 (US)
Other versions or devices may also be affected. ----------------------------------------------------------------------
Secunia CSI integrated with Microsoft WSUS and Microsoft SCCM for 3rd party Patch Management
Free webinars
http://secunia.com/vulnerability_scanning/corporate/webinars/
----------------------------------------------------------------------
TITLE:
Linksys WAP54G Undocumented Debug Interface Vulnerability
SECUNIA ADVISORY ID:
SA40103
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/40103/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=40103
RELEASE DATE:
2010-06-10
DISCUSS ADVISORY:
http://secunia.com/advisories/40103/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/40103/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=40103
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Cristofaro Mune has reported a vulnerability in Linksys WAP54G, which
can be exploited by malicious people to compromise a vulnerable
device. 
The vulnerability is caused due to the device containing the
undocumented "Debug_command_page.asp" and "debug.cgi" debug scripts. 
This can be exploited to e.g. gain root access by accessing the debug
scripts using hard-coded credentials. 
The vulnerability is reported in version 3.05.03 and 3.04.03. 
Note: Reportedly, this only affects devices running a firmware
approved for EMEA (Europe, Middle East, and Africa). 
SOLUTION:
Restrict access using a proxy or firewall. 
PROVIDED AND/OR DISCOVERED BY:
Cristofaro Mune
ORIGINAL ADVISORY:
http://www.icysilence.org/?p=268
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201006-0501 | No CVE | Motorola SB5101 Haxorware Firmware Denial of Service Vulnerability | CVSS V2: - CVSS V3: - Severity: - | 
                            The Motorola SB5101 is a cable modem. Motorola SB5101 Hax0rware has multiple security vulnerabilities that allow remote attackers to perform denial of service attacks on devices. - Unverified attackers can send multiple log reset requests to the eventlog.cgi script to restart the device and cause a denial of service attack. - The unauthenticated attacker sends a GET request with more than 1 byte but no correct request line to the device 80 port, such as [ GET /somepath/file.cgi ], the http daemon crashes. Motorola SB5101 Haxorware Firmware is prone to multiple denial-of-service vulnerabilities. 
An attacker can exploit these issues to cause the application to crash, resulting in a denial-of-service condition. 
Haxorware 1.1 R30, 1.1 R32 and 1.1 R39 are vulnerable; other versions may also be affected
                        
| VAR-201006-0514 | No CVE | Stack-Based Buffer Overflow Vulnerability in Collaboration Common Utility | CVSS V2: 10.0 CVSS V3: - Severity: High | 
                            Collaboration Common Utility, a component of multiple Hitachi products, is vulnerable to stack-based buffer overflow when the Drag and Drop Component for Collaboration feature is also installed.No details available.
                        
| VAR-201006-1162 | CVE-2010-1410 | Apple Safari of WebKit Vulnerable to arbitrary code execution | CVSS V2: 9.3 CVSS V3: - Severity: HIGH | 
                            WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via an SVG document with nested use elements. WebKit is prone to a remote code-execution vulnerability. 
An attacker can exploit this issue by enticing an unsuspecting user into viewing a malicious webpage. 
Successful exploits can allow the attacker to execute arbitrary code in the context of the application. Failed exploit attempts will result in a denial-of-service condition. 
NOTE: This issue was previously covered in BID 40620 (Apple Safari Prior to 5.0 and 4.1 Multiple Security Vulnerabilities) but has been given its own record to better document it. Apple Apple Safari is a web browser developed by Apple (Apple), and is the default browser included with Mac OS X and iOS operating systems. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
 _______________________________________________________________________
 Mandriva Linux Security Advisory                         MDVSA-2011:039
 http://www.mandriva.com/security/
 _______________________________________________________________________
 Package : webkit
 Date    : March 2, 2011
 Affected: 2010.1
 _______________________________________________________________________
 Problem Description:
 Multiple cross-site scripting, denial of service and arbitrary code
 execution security flaws were discovered in webkit. 
 
 Please consult the CVE web links for further information. 
 
 The updated packages have been upgraded to the latest version (1.2.7)
 to correct these issues. 
 _______________________________________________________________________
 References:
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2797
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2841
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0046
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0047
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0048
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0049
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0050
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0051
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0052
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0053
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0054
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0314
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0647
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0650
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0651
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0656
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1386
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1387
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1389
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1390
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1391
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1392
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1393
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1394
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1395
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1396
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1397
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1398
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1400
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1401
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1402
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1403
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1404
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1405
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1406
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1407
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1408
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1409
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1410
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1412
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1414
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1415
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1416
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1417
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1418
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1419
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1421
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1422
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1501
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1664
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1665
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1758
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1759
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1760
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1761
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1762
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1764
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1766
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1767
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1770
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1771
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1772
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1773
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1774
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1780
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1781
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1782
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1783
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1784
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1785
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1786
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1787
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1788
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1790
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1791
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1792
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1793
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1807
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1812
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1814
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1815
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2264
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2647
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2648
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3113
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3114
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3115
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3116
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3119
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3248
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3255
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3257
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3259
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3812
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3813
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4040
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4197
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4198
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4204
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4206
 _______________________________________________________________________
 Updated Packages:
 Mandriva Linux 2010.1:
 141f3cd181b875d1bb40b67a507b6db1  2010.1/i586/libwebkitgtk1.0_2-1.2.7-0.1mdv2010.2.i586.rpm
 054886a3c645b3ce710b9b9daec1d5f9  2010.1/i586/libwebkitgtk1.0-devel-1.2.7-0.1mdv2010.2.i586.rpm
 bef556ca3f281f6ef4086292c3b658d2  2010.1/i586/webkit1.0-1.2.7-0.1mdv2010.2.i586.rpm
 a1ff7ac638646aeb64e3bbdca9bc945d  2010.1/i586/webkit1.0-webinspector-1.2.7-0.1mdv2010.2.i586.rpm
 3f40e3ebc62bad67097a9e102e0e79c2  2010.1/i586/webkit-1.2.7-0.1mdv2010.2.i586.rpm
 50875cf1bc8718cedce1a45dc509b44b  2010.1/i586/webkit-gtklauncher-1.2.7-0.1mdv2010.2.i586.rpm
 625d27780d1cc9edb935d4ac3521ae16  2010.1/i586/webkit-jsc-1.2.7-0.1mdv2010.2.i586.rpm 
 8d02c28d8f21a022130be4c49f9d27be  2010.1/SRPMS/webkit-1.2.7-0.1mdv2010.2.src.rpm
 Mandriva Linux 2010.1/X86_64:
 5ce57cd6ab823f8084030033c7c230d7  2010.1/x86_64/lib64webkitgtk1.0_2-1.2.7-0.1mdv2010.2.x86_64.rpm
 690d8718a97af93f58de3bb2357fbe9b  2010.1/x86_64/lib64webkitgtk1.0-devel-1.2.7-0.1mdv2010.2.x86_64.rpm
 7cc1d4aa77e1901ccc92f27faf85c9ea  2010.1/x86_64/webkit1.0-1.2.7-0.1mdv2010.2.x86_64.rpm
 2b77a77159529c55f64343aba98c15d9  2010.1/x86_64/webkit1.0-webinspector-1.2.7-0.1mdv2010.2.x86_64.rpm
 475cf83c5ddd8f6809c2c73a1f5a71d1  2010.1/x86_64/webkit-1.2.7-0.1mdv2010.2.x86_64.rpm
 b0f1c76107c3d54241daa7e61bfb29a9  2010.1/x86_64/webkit-gtklauncher-1.2.7-0.1mdv2010.2.x86_64.rpm
 97deff5e94a625a79842b4c240b0b00d  2010.1/x86_64/webkit-jsc-1.2.7-0.1mdv2010.2.x86_64.rpm 
 8d02c28d8f21a022130be4c49f9d27be  2010.1/SRPMS/webkit-1.2.7-0.1mdv2010.2.src.rpm
 _______________________________________________________________________
 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you. 
 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:
  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
 You can view other update advisories for Mandriva Linux at:
  http://www.mandriva.com/security/advisories
 If you want to report vulnerabilities, please contact
  security_(at)_mandriva.com
 _______________________________________________________________________
 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFNbgbemqjQ0CJFipgRAs9YAJ92z2WSC2ijj34b/wr42OIYLtv65gCg7XgL
Yv/ButpYAcXsmnJWUG4ayxQ=
=GRM6
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it. 
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
                        
| VAR-201006-1139 | CVE-2010-1408 | Apple Safari of WebKit Vulnerabilities that bypass restrictions | CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM | 
                            WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to bypass intended restrictions on outbound connections to "non-default TCP ports" via a crafted port number, related to an "integer truncation issue." NOTE: this may overlap CVE-2010-1099. This vulnerability CVE-2010-1099 And may be duplicated.Non-default via a crafted port number by a third party TCP Limitations may be avoided when connecting externally to the port. WebKit is prone to an information-disclosure vulnerability. 
An attacker can exploit this issue by enticing an unsuspecting user into viewing a malicious webpage. 
Successful exploits can allow the attacker to gain access to sensitive information. 
NOTE: This issue was previously covered in BID 40620 (Apple Safari Prior to 5.0 and 4.1 Multiple Security Vulnerabilities) but has been given its own record to better document it. Apple Apple Safari is a web browser developed by Apple (Apple), and is the default browser included with Mac OS X and iOS operating systems. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
 _______________________________________________________________________
 Mandriva Linux Security Advisory                         MDVSA-2011:039
 http://www.mandriva.com/security/
 _______________________________________________________________________
 Package : webkit
 Date    : March 2, 2011
 Affected: 2010.1
 _______________________________________________________________________
 Problem Description:
 Multiple cross-site scripting, denial of service and arbitrary code
 execution security flaws were discovered in webkit. 
 
 Please consult the CVE web links for further information. 
 
 The updated packages have been upgraded to the latest version (1.2.7)
 to correct these issues. 
 _______________________________________________________________________
 References:
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2797
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2841
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0046
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0047
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0048
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0049
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0050
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0051
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0052
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0053
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0054
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0314
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0647
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0650
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0651
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0656
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1386
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1387
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1389
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1390
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1391
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1392
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1393
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1394
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1395
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1396
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1397
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1398
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1400
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1401
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1402
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1403
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1404
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1405
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1406
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1407
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1408
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1409
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1410
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1412
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1414
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1415
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1416
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1417
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1418
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1419
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1421
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1422
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1501
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1664
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1665
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1758
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1759
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1760
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1761
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1762
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1764
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1766
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1767
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1770
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1771
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1772
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1773
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1774
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1780
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1781
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1782
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1783
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1784
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1785
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1786
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1787
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1788
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1790
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1791
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1792
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1793
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1807
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1812
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1814
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1815
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2264
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2647
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2648
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3113
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3114
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3115
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3116
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3119
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3248
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3255
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3257
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3259
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3812
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3813
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4040
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4197
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4198
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4204
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4206
 _______________________________________________________________________
 Updated Packages:
 Mandriva Linux 2010.1:
 141f3cd181b875d1bb40b67a507b6db1  2010.1/i586/libwebkitgtk1.0_2-1.2.7-0.1mdv2010.2.i586.rpm
 054886a3c645b3ce710b9b9daec1d5f9  2010.1/i586/libwebkitgtk1.0-devel-1.2.7-0.1mdv2010.2.i586.rpm
 bef556ca3f281f6ef4086292c3b658d2  2010.1/i586/webkit1.0-1.2.7-0.1mdv2010.2.i586.rpm
 a1ff7ac638646aeb64e3bbdca9bc945d  2010.1/i586/webkit1.0-webinspector-1.2.7-0.1mdv2010.2.i586.rpm
 3f40e3ebc62bad67097a9e102e0e79c2  2010.1/i586/webkit-1.2.7-0.1mdv2010.2.i586.rpm
 50875cf1bc8718cedce1a45dc509b44b  2010.1/i586/webkit-gtklauncher-1.2.7-0.1mdv2010.2.i586.rpm
 625d27780d1cc9edb935d4ac3521ae16  2010.1/i586/webkit-jsc-1.2.7-0.1mdv2010.2.i586.rpm 
 8d02c28d8f21a022130be4c49f9d27be  2010.1/SRPMS/webkit-1.2.7-0.1mdv2010.2.src.rpm
 Mandriva Linux 2010.1/X86_64:
 5ce57cd6ab823f8084030033c7c230d7  2010.1/x86_64/lib64webkitgtk1.0_2-1.2.7-0.1mdv2010.2.x86_64.rpm
 690d8718a97af93f58de3bb2357fbe9b  2010.1/x86_64/lib64webkitgtk1.0-devel-1.2.7-0.1mdv2010.2.x86_64.rpm
 7cc1d4aa77e1901ccc92f27faf85c9ea  2010.1/x86_64/webkit1.0-1.2.7-0.1mdv2010.2.x86_64.rpm
 2b77a77159529c55f64343aba98c15d9  2010.1/x86_64/webkit1.0-webinspector-1.2.7-0.1mdv2010.2.x86_64.rpm
 475cf83c5ddd8f6809c2c73a1f5a71d1  2010.1/x86_64/webkit-1.2.7-0.1mdv2010.2.x86_64.rpm
 b0f1c76107c3d54241daa7e61bfb29a9  2010.1/x86_64/webkit-gtklauncher-1.2.7-0.1mdv2010.2.x86_64.rpm
 97deff5e94a625a79842b4c240b0b00d  2010.1/x86_64/webkit-jsc-1.2.7-0.1mdv2010.2.x86_64.rpm 
 8d02c28d8f21a022130be4c49f9d27be  2010.1/SRPMS/webkit-1.2.7-0.1mdv2010.2.src.rpm
 _______________________________________________________________________
 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you. 
 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:
  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
 You can view other update advisories for Mandriva Linux at:
  http://www.mandriva.com/security/advisories
 If you want to report vulnerabilities, please contact
  security_(at)_mandriva.com
 _______________________________________________________________________
 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFNbgbemqjQ0CJFipgRAs9YAJ92z2WSC2ijj34b/wr42OIYLtv65gCg7XgL
Yv/ButpYAcXsmnJWUG4ayxQ=
=GRM6
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it. 
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
                        
| VAR-201006-1235 | CVE-2010-1256 | Microsoft IIS Vulnerable to arbitrary code execution | CVSS V2: 8.5 CVSS V3: - Severity: HIGH | 
                            Unspecified vulnerability in Microsoft IIS 6.0, 7.0, and 7.5, when Extended Protection for Authentication is enabled, allows remote authenticated users to execute arbitrary code via unknown vectors related to "token checking" that trigger memory corruption, aka "IIS Authentication Memory Corruption Vulnerability.". Microsoft IIS is prone to a remote code-execution vulnerability. 
An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. 
This issue affects IIS 6.0, 7.0 and 7.5. 
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
                    National Cyber Alert System
              Technical Cyber Security Alert TA10-159B
Microsoft Updates for Multiple Vulnerabilities
   Original release date: June 08, 2010
   Last revised: --
   Source: US-CERT
Systems Affected
     * Microsoft Windows
     * Microsoft Internet Explorer
     * Microsoft Office
     * Microsoft SharePoint Services
     * Microsoft .NET Framework
Overview
   Microsoft has released updates to address vulnerabilities in
   Microsoft Windows, Microsoft Internet Explorer, Microsoft Office,
   Microsoft SharePoint Services, and Microsoft .NET Framework. 
I. Description
   The Microsoft Security Bulletin Summary for June 2010 describes
   vulnerabilities in Microsoft Windows, Internet Explorer, Office,
   SharePoint Services, and .NET Framework. Microsoft has released
   updates to address the vulnerabilities. 
II. 
III. Solution
   Apply updates
   Microsoft has provided updates for these vulnerabilities in the
   Microsoft Security Bulletin Summary for June 2010. The security
   bulletin describes any known issues related to the updates. 
   Administrators are encouraged to note these issues and test for any
   potentially adverse effects. Administrators should consider using
   an automated update distribution system such as Windows Server
   Update Services (WSUS). 
IV. References
 * Microsoft Security Bulletin Summary for June 2010 -
   <http://www.microsoft.com/technet/security/bulletin/ms10-jun.mspx>
 * Microsoft Windows Server Update Services -
   <http://technet.microsoft.com/en-us/wsus/default.aspx>
 ____________________________________________________________________
   The most recent version of this document can be found at:
     <http://www.us-cert.gov/cas/techalerts/TA10-159B.html>
 ____________________________________________________________________
   Feedback can be directed to US-CERT Technical Staff. Please send
   email to <cert@cert.org> with "TA10-159B Feedback VU#855166" in
   the subject. 
 ____________________________________________________________________
   For instructions on subscribing to or unsubscribing from this
   mailing list, visit <http://www.us-cert.gov/cas/signup.html>. 
 ____________________________________________________________________
   Produced 2010 by US-CERT, a government organization. 
   Terms of use:
     <http://www.us-cert.gov/legal.html>
 ____________________________________________________________________
Revision History
  June 08, 2010: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBTA6Wzj6pPKYJORa3AQLl4Qf/dTsaW53BBruyFOcypbooTw5ULG9E5wPa
/DEiksCuX8hYOoev9jDDyhXZQIaE2OrkWdLpJJBtXwJJ4XhBqyni3fhQFrIkwGVQ
3w3068TGE6v/sjV/W/qWmkZjl4r+FIcR9VRlulLet9ZZAxoJ7VgTg/1O8eixr7SO
HpO+Xb3l3d4/XUGtTKCu5DsTTD1l6qQr66m3l4o26Bj834qfh0fvfneZHXCy3PUH
/lE3nFxH3M+JOQEdapgc/aYVnrcroZKix61lfs2S1NIUxvBAxea0UFZtywIId0hK
Sh2LGp7tUlXpfk8oo8LMgKG1y25xYmLE5WYIhO4E6Mas3jT/9ArwHQ==
=mq6Z
-----END PGP SIGNATURE-----
. ----------------------------------------------------------------------
Secunia CSI integrated with Microsoft WSUS and Microsoft SCCM for 3rd party Patch Management
Free webinars
http://secunia.com/vulnerability_scanning/corporate/webinars/
----------------------------------------------------------------------
TITLE:
Microsoft Internet Information Services Authentication Memory
Corruption
SECUNIA ADVISORY ID:
SA40079
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/40079/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=40079
RELEASE DATE:
2010-06-09
DISCUSS ADVISORY:
http://secunia.com/advisories/40079/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/40079/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=40079
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in Microsoft Internet Information
Services, which can be exploited by malicious users to potentially
compromise a vulnerable system. 
The vulnerability is caused due to improper handling of
authentication tokens and can be exploited to corrupt memory via a
specially a crafted authentication packet. 
Successful exploitation requires the "Extended Protection for
Authentication" feature to be enabled (disabled by default). 
SOLUTION:
Apply patches. 
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor. 
ORIGINAL ADVISORY:
MS10-040 (KB982666):
http://www.microsoft.com/technet/security/bulletin/MS10-040.mspx
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201006-1122 | CVE-2010-1389 | Apple Safari of WebKit Vulnerable to cross-site scripting | CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM | 
                            Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows user-assisted remote attackers to inject arbitrary web script or HTML via vectors involving a (1) paste or (2) drag-and-drop operation for a selection. Safari is prone to multiple security vulnerabilities that have been addressed in Apple security advisory APPLE-SA-2010-06-07-1. 
Attackers can exploit these issues by enticing an unsuspecting user into visiting a malicious webpage.  Successful attacks may result in information-disclosure, remote code-execution, denial-of-service, or other consequences. 
This BID is being retired. The following individual records exist to better document the issues:
40642 WebKit 'removeChild()' Remote Code Execution Vulnerability
40644 WebKit HTML Button Use After Free Remote Code Execution Vulnerability
40645 WebKit Marquee Event 'SelectionController' Remote Code Execution Vulnerability
40646 WebKit Editable Containers Remote Code Execution Vulnerability
40647 WebKit Option Element 'ContentEditable' Attribute Remote Code Execution Vulnerability
40649 WebKit 'ConditionEventListener' Remote Code Execution Vulnerability
40650 WebKit 'DOCUMENT_POSITION_DISCONNECTED' Attribute Remote Code Execution Vulnerability
40652 WebKit SVG 'RadialGradient' Attribute Remote Code Execution Vulnerability
40653 WebKit IBM1147 Character Set Text Transform Remote Code Execution Vulnerability
40654 WebKit Option Recursive Use Element Remote Code Execution Vulnerability
40655 WebKit 'first-letter' CSS Style Remote Code Execution Vulnerability
40656 WebKit SVG 'use' Element Remote Code Execution Vulnerability
40657 WebKit SVG 'use' Element Remote Code Execution Vulnerability
40658 WebKit Caption Element Handling Remote Code Execution Vulnerability
40659 WebKit Custom Vertical Positioning Remote Code Execution Vulnerability
40660 WebKit Dragging or Pasting Cross Domain Scripting Vulnerability
40661 WebKit Use After Free Remote Code Execution Vulnerability
40662 WebKit Hover Event Handling Remote Code Execution Vulnerability
40663 WebKit DOM Range Objects Remote Code Execution Vulnerability
40665 WebKit 'Node.normalize' Method Remote Code Execution Vulnerability
40665 WebKit 'Node.normalize' Method Remote Code Execution Vulnerability
40666 WebKit 'removeChild' DOM Method Remote Code Execution Vulnerability
40667 WebKit HTML Document Subtrees Remote Code Execution Vulnerability
40668 WebKit 'libxml' Context Handling Remote Code Execution Vulnerability
40669 Webkit UTF-7 Cross-Site Scripting Vulnerability
40670 WebKit Fonts Handling Remote Code Execution Vulnerability
40671 WebKit HTML Tables Remote Code Execution Vulnerability
40672 WebKit CSS-Styled HTML Handling Remote Code Execution Vulnerability
40673 Apple Safari PDF Handling Remote Code Execution Vulnerability
40674 Apple Safari Window Management Remote Code Execution Vulnerability
40675 Webkit HTML Document Fragments Cross Site Scripting Vulnerability
40697 WebKit Integer Truncation TCP Port Information Disclosure Vulnerability
40698 WebKit Keyboard Focus Cross Domain Information Disclosure Vulnerability
40704 Apple Safari Authentication Data URI Spoofing Vulnerability
40705 WebKit IRC Port Blacklist Information Disclosure Vulnerability
40707 Webkit DOM Constructor Object Cross Site Scripting Vulnerability
40710 WebKit 'frame.src' Validation Cross Site Scripting Vulnerability
40714 WebKit SVG Image Pattern Cross Domain Security Bypass Vulnerability
40717 WebKit Empty Hostname URI Handling Cross Site Scripting Vulnerability
40726 Webkit 'textarea' Element Cross-Site Scripting Vulnerability
40727 WebKit Cascading Stylesheets 'HREF' Information Disclosure Vulnerability
40732 WebKit HTTP Redirects Information Disclosure Vulnerability
40733 WebKit NTLM Credentials Information Disclosure Vulnerability
40750 WebKit HTTPS Redirect Information Disclosure Vulnerability
40752 WebKit HTTP URI Clipboard Information Disclosure Vulnerability
40753 WebKit Local Storage and Web SQL Database Directory Traversal Vulnerability
40754 WebKit 'execCommand()' Function Clipboard Overwrite Security Weakness
40756 WebKit ':visited' CSS Pseudo-class Information Disclosure Vulnerability. WebKit is prone to a cross-domain scripting vulnerability. 
An attacker can exploit this vulnerability to bypass the same-origin policy and obtain potentially sensitive information, or to launch other attacks against sites. ----------------------------------------------------------------------
Secunia CSI integrated with Microsoft WSUS and Microsoft SCCM for 3rd party Patch Management
Free webinars
http://secunia.com/vulnerability_scanning/corporate/webinars/
----------------------------------------------------------------------
TITLE:
Apple Safari Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA40105
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/40105/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=40105
RELEASE DATE:
2010-06-09
DISCUSS ADVISORY:
http://secunia.com/advisories/40105/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/40105/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=40105
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Some vulnerabilities have been reported in Apple Safari, which can be
exploited by malicious people to bypass certain security restrictions,
disclose sensitive information, conduct spoofing or cross-site
scripting attacks, and potentially compromise a user's system. 
1) An error when processing ColorSync profiles embedded in a
specially crafted image can be exploited to potentially execute
arbitrary code. 
This is related to vulnerability #2 in:
SA36096
2) The browser follows links containing arbitrary user information
without warning, which can be exploited to facilitate phishing
attacks via specially crafted URLs. 
3) A use-after-free error when handling PDF files can be exploited to
potentially execute arbitrary code. 
4) An error in WebKit when handling clipboard URLs can be exploited
to disclose sensitive files if a user is tricked into dragging or
pasting links or images to a malicious website. 
5) An error in WebKit when a selection from a website is dragged or
pasted into another website can be exploited to potentially execute
arbitrary JavaScript code in the context of the destination website. 
6) An error in WebKit when handling UTF-7 encoded text can be
exploited to leave an HTML quoted string unterminated and facilitate
cross-site scripting attacks. 
7) An input sanitation error in WebKit when handling Local Storage
and Web SQL databases can be exploited to create database files in
arbitrary directories via directory traversal attacks. 
8) A use-after-free error in WebKit when rendering HTML buttons can
be exploited to potentially execute arbitrary code. 
9) A use-after-free error in WebKit when handling attribute
manipulations can be exploited to potentially execute arbitrary
code. 
10) An error in WebKit when handling HTML document fragments can be
exploited to execute arbitrary JavaScript code in a legitimate
context processing foreign HTML fragments. 
11) An error in WebKit when handling keyboard focus can be exploited
to deliver key press events intended for a different frame. 
12) An error in WebKit when handling DOM constructor objects can be
exploited to conduct cross-site scripting attacks. 
13) A use-after-free error in WebKit when handling the removal of
container elements can be exploited to potentially execute arbitrary
code. 
14) A use-after-free error in WebKit when rendering a selection at
the time of a layout change can be exploited to potentially execute
arbitrary code. 
15) An error in WebKit when handling ordered list insertions can be
exploited to corrupt memory and potentially execute arbitrary code. 
16) An uninitialised memory access error in WebKit when handling
selection changes on form input elements can be exploited to
potentially execute arbitrary code. 
17) A use-after-free error in WebKit when handling caption elements
can be exploited to potentially execute arbitrary code. 
18) A use-after-free error in WebKit when handling the
":first-letter" pseudo-element in cascading stylesheets can be
exploited to potentially execute arbitrary code. 
19) A double-free error in WebKit when handling event listeners in
SVG documents can be exploited to potentially execute arbitrary
code. 
20) An uninitialised memory access error in WebKit when handling
"use" elements in SVG documents can be exploited to potentially
execute arbitrary code. 
21) A use-after-free error in WebKit when handling SVG documents with
multiple "use" elements can be exploited to potentially execute
arbitrary code. 
22) An error in WebKit when handling nested "use" elements in SVG
documents can be exploited to corrupt memory and potentially execute
arbitrary code. 
23) A use-after-free error in WebKit when handling CSS run-ins can be
exploited to potentially execute arbitrary code. 
24) A use-after-free error in WebKit when handling HTML elements with
custom vertical positioning can be exploited to potentially execute
arbitrary code. 
25) An error exists in WebKit when visiting HTTPS websites
redirecting to HTTP websites. This can be exploited to disclose
potentially sensitive information contained in the HTTPS URL by
reading the "Referer" header. 
26) An integer truncation error in WebKit when handling TCP requests
can be exploited to pass arbitrary data to arbitrary TCP ports. 
27) An error in WebKit when processing connections to IRC ports can
be exploited to send arbitrary data to arbitrary IRC servers. 
28) A use-after-free error in WebKit when handling hover events can
be exploited to potentially execute arbitrary code. 
29) An error in WebKit can be exploited to read NTLM credentials that
are incorrectly transmitted in plain-text via Man-in-the-Middle (MitM)
attacks. 
30) A use-after-free error in WebKit when handling the "removeChild"
DOM method can be exploited to potentially execute arbitrary code. 
31) An error in WebKit when handling libxml contexts can be exploited
to potentially execute arbitrary code. 
32) An error in WebKit when handling a canvas with an SVG image
pattern can be exploited to load and capture an image from another
website. 
33) An error in WebKit when rendering CSS-styled HTML content with
multiple ":after" pseudo-selectors can be exploited to corrupt memory
and potentially execute arbitrary code. 
34) An error in WebKit when handling the "src" attribute of a frame
element can be exploited to facilitate cross-site scripting attacks. 
35) A use-after-free error in WebKit when handling drag and drop
operations can be exploited to potentially execute arbitrary code. 
36) An error in the implementation of the JavaScript "execCommand"
function can be exploited to modify the contents of the clipboard. 
37) An error when handling malformed URLs can be exploited to bypass
the same-origin policy and execute arbitrary script code in the
context of a different domain. 
38) A use-after-free error in WebKit when handling DOM "Range"
objects can be exploited to potentially execute arbitrary code. 
39) A use-after-free error in WebKit when handling the
"Node.normalize()" method can be exploited to potentially execute
arbitrary code. 
40) A use-after-free error in WebKit when rendering HTML document
subtrees can be exploited to potentially execute arbitrary code. 
42) An error in WebKit when visiting a website which redirects form
submissions to a redirecting website can be exploited disclose
submitted data. 
43) A type checking error in WebKit when handling text nodes can be
exploited to potentially execute arbitrary code. 
44) A use-after-free error in WebKit when handling fonts can be
exploited to potentially execute arbitrary code. 
45) An error in WebKit when handling HTML tables can be exploited to
trigger an out-of-bounds memory access and potentially execute
arbitrary code. 
46) An error in WebKit when handling the CSS ":visited" pseudo-class
can be exploited to disclose visited websites. 
SOLUTION:
Update to version 4.1 (available only for Mac OS X v10.4 systems) or
upgrade to version 5.0. 
PROVIDED AND/OR DISCOVERED BY:
37) Michal Zalewski
The vendor also credits:
1) Chris Evans of the Google Security Team, and Andrzej Dyjak
2) Abhishek Arya of Google
3) Borja Marcos of Sarenet
4) Eric Seidel of Google
5) Paul Stone of Context Information Security
6) Masahiro Yamada
8) Matthieu Bonetti of Vupen
9) Ralf Philipp Weinmann working with TippingPoint's Zero Day
Initiative
10, 41) Eduardo Vela Nava (sirdarckcat) of Google
11) Michal Zalewski of Google
12) Gianni "gf3" Chiappetta of Runlevel6
13, 15, 16, 18, 19, 20, 21, 23, 43) wushi of team509, working with
TippingPoint's Zero Day Initiative
14) wushi and Z of team509, working with TippingPoint's Zero Day
Initiative
17) regenrecht working with iDefense
22, 31) Aki Helin of OUSPG
24) Ojan Vafai of Google
25) Colin Percival of Tarsnap
28) Dave Bowker
30) Mark Dowd of Azimuth Security
32) Chris Evans of Google
33, 45) wushi of team509
34) Sergey Glazunov
35) kuzzcc, and Skylined of Google Chrome Security Team
38) Yaar Schnitman of Google
39) Mark Dowd
40) James Robinson of Google
42) Marc Worrell of WhatWebWhat
ORIGINAL ADVISORY:
Apple:
http://support.apple.com/kb/HT4196
Michal Zalewski:
http://lcamtuf.blogspot.com/2010/06/safari-tale-of-betrayal-and-revenge.html
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
 _______________________________________________________________________
 Mandriva Linux Security Advisory                         MDVSA-2011:039
 http://www.mandriva.com/security/
 _______________________________________________________________________
 Package : webkit
 Date    : March 2, 2011
 Affected: 2010.1
 _______________________________________________________________________
 Problem Description:
 Multiple cross-site scripting, denial of service and arbitrary code
 execution security flaws were discovered in webkit. 
 
 Please consult the CVE web links for further information. 
 _______________________________________________________________________
 References:
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2797
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2841
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0046
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0047
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0048
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0049
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0050
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0051
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0052
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0053
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0054
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0314
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0647
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0650
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0651
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0656
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1386
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1387
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1389
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1390
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1391
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1392
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1393
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1394
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1395
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1396
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1397
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1398
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1400
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1401
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1402
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1403
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1404
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1405
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1406
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1407
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1408
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1409
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1410
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1412
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1414
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1415
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1416
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1417
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1418
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1419
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1421
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1422
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1501
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1664
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1665
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1758
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1759
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1760
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1761
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1762
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1764
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1766
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1767
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1770
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1771
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1772
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1773
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1774
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1780
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1781
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1782
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1783
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1784
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1785
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1786
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1787
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1788
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1790
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1791
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1792
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1793
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1807
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1812
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1814
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1815
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2264
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2647
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2648
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3113
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3114
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3115
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3116
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3119
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3248
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3255
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3257
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3259
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3812
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3813
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4040
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4197
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4198
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4204
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4206
 _______________________________________________________________________
 Updated Packages:
 Mandriva Linux 2010.1:
 141f3cd181b875d1bb40b67a507b6db1  2010.1/i586/libwebkitgtk1.0_2-1.2.7-0.1mdv2010.2.i586.rpm
 054886a3c645b3ce710b9b9daec1d5f9  2010.1/i586/libwebkitgtk1.0-devel-1.2.7-0.1mdv2010.2.i586.rpm
 bef556ca3f281f6ef4086292c3b658d2  2010.1/i586/webkit1.0-1.2.7-0.1mdv2010.2.i586.rpm
 a1ff7ac638646aeb64e3bbdca9bc945d  2010.1/i586/webkit1.0-webinspector-1.2.7-0.1mdv2010.2.i586.rpm
 3f40e3ebc62bad67097a9e102e0e79c2  2010.1/i586/webkit-1.2.7-0.1mdv2010.2.i586.rpm
 50875cf1bc8718cedce1a45dc509b44b  2010.1/i586/webkit-gtklauncher-1.2.7-0.1mdv2010.2.i586.rpm
 625d27780d1cc9edb935d4ac3521ae16  2010.1/i586/webkit-jsc-1.2.7-0.1mdv2010.2.i586.rpm 
 8d02c28d8f21a022130be4c49f9d27be  2010.1/SRPMS/webkit-1.2.7-0.1mdv2010.2.src.rpm
 Mandriva Linux 2010.1/X86_64:
 5ce57cd6ab823f8084030033c7c230d7  2010.1/x86_64/lib64webkitgtk1.0_2-1.2.7-0.1mdv2010.2.x86_64.rpm
 690d8718a97af93f58de3bb2357fbe9b  2010.1/x86_64/lib64webkitgtk1.0-devel-1.2.7-0.1mdv2010.2.x86_64.rpm
 7cc1d4aa77e1901ccc92f27faf85c9ea  2010.1/x86_64/webkit1.0-1.2.7-0.1mdv2010.2.x86_64.rpm
 2b77a77159529c55f64343aba98c15d9  2010.1/x86_64/webkit1.0-webinspector-1.2.7-0.1mdv2010.2.x86_64.rpm
 475cf83c5ddd8f6809c2c73a1f5a71d1  2010.1/x86_64/webkit-1.2.7-0.1mdv2010.2.x86_64.rpm
 b0f1c76107c3d54241daa7e61bfb29a9  2010.1/x86_64/webkit-gtklauncher-1.2.7-0.1mdv2010.2.x86_64.rpm
 97deff5e94a625a79842b4c240b0b00d  2010.1/x86_64/webkit-jsc-1.2.7-0.1mdv2010.2.x86_64.rpm 
 8d02c28d8f21a022130be4c49f9d27be  2010.1/SRPMS/webkit-1.2.7-0.1mdv2010.2.src.rpm
 _______________________________________________________________________
 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you. 
 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:
  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
 You can view other update advisories for Mandriva Linux at:
  http://www.mandriva.com/security/advisories
 If you want to report vulnerabilities, please contact
  security_(at)_mandriva.com
 _______________________________________________________________________
 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFNbgbemqjQ0CJFipgRAs9YAJ92z2WSC2ijj34b/wr42OIYLtv65gCg7XgL
Yv/ButpYAcXsmnJWUG4ayxQ=
=GRM6
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it. 
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
. ----------------------------------------------------------------------
Windows Applications Insecure Library Loading
The Official, Verified Secunia List:
http://secunia.com/advisories/windows_insecure_library_loading/
The list is continuously updated as we confirm the vulnerability reports so check back regularly too see if any of your apps are affected. 
For more information:
SA36677
SA37346
SA37769
SA37931
SA38545
SA38932
SA39091
SA39651
SA40105
SA40196
SA40479
SA40664
SA41014
SA41085
SA41242
SA41328
SOLUTION:
Apply updated packages. ----------------------------------------------------------------------
Secure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM)
                        
| VAR-201006-1259 | CVE-2010-1402 | Apple Safari of WebKit Vulnerable to arbitrary code execution | CVSS V2: 9.3 CVSS V3: - Severity: HIGH | 
                            Double free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to an event listener in an SVG document, related to duplicate event listeners, a timer, and an AnimateTransform object. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple's Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within how the application duplicates event listeners in .svg documents. Upon creating an AnimateTransform object, the library will create a timer to handle the transformation and duplicate the object's event listener into Webkit's "shadow tree" of the image. Upon destruction of the shadow tree and the original tree, the application will destroy the Element containing the event listener twice. This can lead to code execution under the context of the application. 
An attacker can exploit this issue by enticing an unsuspecting user into viewing a malicious webpage. Failed exploit attempts will result in a denial-of-service condition. 
NOTE: This issue was previously covered in BID 40620 (Apple Safari Prior to 5.0 and 4.1 Multiple Security Vulnerabilities) but has been given its own record to better document it. Apple Apple Safari is a web browser developed by Apple (Apple), and is the default browser included with Mac OS X and iOS operating systems. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
 _______________________________________________________________________
 Mandriva Linux Security Advisory                         MDVSA-2011:039
 http://www.mandriva.com/security/
 _______________________________________________________________________
 Package : webkit
 Date    : March 2, 2011
 Affected: 2010.1
 _______________________________________________________________________
 Problem Description:
 Multiple cross-site scripting, denial of service and arbitrary code
 execution security flaws were discovered in webkit. 
 
 Please consult the CVE web links for further information. 
 
 The updated packages have been upgraded to the latest version (1.2.7)
 to correct these issues. 
 _______________________________________________________________________
 References:
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2797
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2841
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0046
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0047
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0048
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0049
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0050
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0051
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0052
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0053
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0054
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0314
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0647
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0650
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0651
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0656
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1386
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1387
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1389
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1390
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1391
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1392
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1393
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1394
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1395
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1396
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1397
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1398
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1400
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1401
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1402
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1403
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1404
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1405
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1406
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1407
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1408
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1409
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1410
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1412
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1414
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1415
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1416
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1417
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1418
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1419
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1421
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1422
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1501
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1664
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1665
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1758
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1759
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1760
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1761
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1762
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1764
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1766
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1767
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1770
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1771
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1772
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1773
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1774
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1780
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1781
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1782
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1783
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1784
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1785
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1786
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1787
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1788
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1790
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1791
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1792
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1793
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1807
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1812
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1814
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1815
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2264
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2647
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2648
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3113
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3114
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3115
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3116
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3119
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3248
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3255
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3257
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3259
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3812
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3813
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4040
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4197
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4198
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4204
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4206
 _______________________________________________________________________
 Updated Packages:
 Mandriva Linux 2010.1:
 141f3cd181b875d1bb40b67a507b6db1  2010.1/i586/libwebkitgtk1.0_2-1.2.7-0.1mdv2010.2.i586.rpm
 054886a3c645b3ce710b9b9daec1d5f9  2010.1/i586/libwebkitgtk1.0-devel-1.2.7-0.1mdv2010.2.i586.rpm
 bef556ca3f281f6ef4086292c3b658d2  2010.1/i586/webkit1.0-1.2.7-0.1mdv2010.2.i586.rpm
 a1ff7ac638646aeb64e3bbdca9bc945d  2010.1/i586/webkit1.0-webinspector-1.2.7-0.1mdv2010.2.i586.rpm
 3f40e3ebc62bad67097a9e102e0e79c2  2010.1/i586/webkit-1.2.7-0.1mdv2010.2.i586.rpm
 50875cf1bc8718cedce1a45dc509b44b  2010.1/i586/webkit-gtklauncher-1.2.7-0.1mdv2010.2.i586.rpm
 625d27780d1cc9edb935d4ac3521ae16  2010.1/i586/webkit-jsc-1.2.7-0.1mdv2010.2.i586.rpm 
 8d02c28d8f21a022130be4c49f9d27be  2010.1/SRPMS/webkit-1.2.7-0.1mdv2010.2.src.rpm
 Mandriva Linux 2010.1/X86_64:
 5ce57cd6ab823f8084030033c7c230d7  2010.1/x86_64/lib64webkitgtk1.0_2-1.2.7-0.1mdv2010.2.x86_64.rpm
 690d8718a97af93f58de3bb2357fbe9b  2010.1/x86_64/lib64webkitgtk1.0-devel-1.2.7-0.1mdv2010.2.x86_64.rpm
 7cc1d4aa77e1901ccc92f27faf85c9ea  2010.1/x86_64/webkit1.0-1.2.7-0.1mdv2010.2.x86_64.rpm
 2b77a77159529c55f64343aba98c15d9  2010.1/x86_64/webkit1.0-webinspector-1.2.7-0.1mdv2010.2.x86_64.rpm
 475cf83c5ddd8f6809c2c73a1f5a71d1  2010.1/x86_64/webkit-1.2.7-0.1mdv2010.2.x86_64.rpm
 b0f1c76107c3d54241daa7e61bfb29a9  2010.1/x86_64/webkit-gtklauncher-1.2.7-0.1mdv2010.2.x86_64.rpm
 97deff5e94a625a79842b4c240b0b00d  2010.1/x86_64/webkit-jsc-1.2.7-0.1mdv2010.2.x86_64.rpm 
 8d02c28d8f21a022130be4c49f9d27be  2010.1/SRPMS/webkit-1.2.7-0.1mdv2010.2.src.rpm
 _______________________________________________________________________
 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you. 
 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:
  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
 You can view other update advisories for Mandriva Linux at:
  http://www.mandriva.com/security/advisories
 If you want to report vulnerabilities, please contact
  security_(at)_mandriva.com
 _______________________________________________________________________
 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFNbgbemqjQ0CJFipgRAs9YAJ92z2WSC2ijj34b/wr42OIYLtv65gCg7XgL
Yv/ButpYAcXsmnJWUG4ayxQ=
=GRM6
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it. 
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
. ZDI-10-100: Apple Webkit ConditionEventListener Remote Code Execution Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-10-100
June 8, 2010
-- CVE ID:
CVE-2010-1402
-- Affected Vendors:
Apple
-- Affected Products:
Apple WebKit
-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability by Digital Vaccine protection filter ID 9873. 
-- Vendor Response:
Apple has issued an update to correct this vulnerability. More
details can be found at:
http://support.apple.com/kb/HT4196
-- Disclosure Timeline:
2010-02-18 - Vulnerability reported to vendor
2010-06-08 - Coordinated public release of advisory
-- Credit:
This vulnerability was discovered by:
    * wushi of team509
-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents 
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities. 
Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:
    http://www.zerodayinitiative.com
The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product. 
Our vulnerability disclosure policy is available online at:
    http://www.zerodayinitiative.com/advisories/disclosure_policy/
Follow the ZDI on Twitter:
    http://twitter.com/thezdi
                        
| VAR-201006-1253 | CVE-2010-1770 | Apple Safari of WebKit Vulnerable to arbitrary code execution | CVSS V2: 9.3 CVSS V3: - Severity: HIGH | 
                            WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, Apple Safari before 4.1 on Mac OS X 10.4, and Google Chrome before 5.0.375.70 does not properly handle a transformation of a text node that has the IBM1147 character set, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document containing a BR element, related to a "type checking issue.". This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari's Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within Webkit's support of character sets. If the IBM1147 character set is applied to a particular element and that element has a text transformation applied to it, the application will attempt to access an object that doesn't exist in order to perform the transformation. Successful exploitation will lead to code execution under the context of the web-browser. WebKit is prone to a remote code-execution vulnerability related to text transformations. An attacker can exploit this issue by enticing an unsuspecting victim into viewing a malicious webpage. Failed exploit attempts will result in a denial-of-service condition. 
NOTE: This issue was previously covered in BID 40620 (Apple Safari Prior to 5.0 and 4.1 Multiple Security Vulnerabilities) but has been given its own record to better document it. WebKit is a set of open source web browser engines jointly developed by companies such as KDE, Apple (Apple), and Google (Google), and is currently used by browsers such as Apple Safari and Google Chrome. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
 _______________________________________________________________________
 Mandriva Linux Security Advisory                         MDVSA-2011:039
 http://www.mandriva.com/security/
 _______________________________________________________________________
 Package : webkit
 Date    : March 2, 2011
 Affected: 2010.1
 _______________________________________________________________________
 Problem Description:
 Multiple cross-site scripting, denial of service and arbitrary code
 execution security flaws were discovered in webkit. 
 
 Please consult the CVE web links for further information. 
 
 The updated packages have been upgraded to the latest version (1.2.7)
 to correct these issues. 
 _______________________________________________________________________
 References:
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2797
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2841
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0046
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0047
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0048
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0049
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0050
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0051
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0052
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0053
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0054
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0314
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0647
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0650
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0651
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0656
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1386
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1387
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1389
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1390
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1391
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1392
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1393
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1394
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1395
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1396
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1397
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1398
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1400
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1401
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1402
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1403
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1404
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1405
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1406
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1407
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1408
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1409
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1410
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1412
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1414
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1415
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1416
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1417
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1418
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1419
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1421
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1422
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1501
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1664
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1665
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1758
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1759
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1760
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1761
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1762
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1764
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1766
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1767
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1770
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1771
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1772
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1773
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1774
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1780
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1781
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1782
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1783
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1784
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1785
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1786
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1787
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1788
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1790
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1791
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1792
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1793
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1807
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1812
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1814
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1815
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2264
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2647
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2648
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3113
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3114
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3115
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3116
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3119
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3248
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3255
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3257
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3259
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3812
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3813
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4040
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4197
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4198
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4204
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4206
 _______________________________________________________________________
 Updated Packages:
 Mandriva Linux 2010.1:
 141f3cd181b875d1bb40b67a507b6db1  2010.1/i586/libwebkitgtk1.0_2-1.2.7-0.1mdv2010.2.i586.rpm
 054886a3c645b3ce710b9b9daec1d5f9  2010.1/i586/libwebkitgtk1.0-devel-1.2.7-0.1mdv2010.2.i586.rpm
 bef556ca3f281f6ef4086292c3b658d2  2010.1/i586/webkit1.0-1.2.7-0.1mdv2010.2.i586.rpm
 a1ff7ac638646aeb64e3bbdca9bc945d  2010.1/i586/webkit1.0-webinspector-1.2.7-0.1mdv2010.2.i586.rpm
 3f40e3ebc62bad67097a9e102e0e79c2  2010.1/i586/webkit-1.2.7-0.1mdv2010.2.i586.rpm
 50875cf1bc8718cedce1a45dc509b44b  2010.1/i586/webkit-gtklauncher-1.2.7-0.1mdv2010.2.i586.rpm
 625d27780d1cc9edb935d4ac3521ae16  2010.1/i586/webkit-jsc-1.2.7-0.1mdv2010.2.i586.rpm 
 8d02c28d8f21a022130be4c49f9d27be  2010.1/SRPMS/webkit-1.2.7-0.1mdv2010.2.src.rpm
 Mandriva Linux 2010.1/X86_64:
 5ce57cd6ab823f8084030033c7c230d7  2010.1/x86_64/lib64webkitgtk1.0_2-1.2.7-0.1mdv2010.2.x86_64.rpm
 690d8718a97af93f58de3bb2357fbe9b  2010.1/x86_64/lib64webkitgtk1.0-devel-1.2.7-0.1mdv2010.2.x86_64.rpm
 7cc1d4aa77e1901ccc92f27faf85c9ea  2010.1/x86_64/webkit1.0-1.2.7-0.1mdv2010.2.x86_64.rpm
 2b77a77159529c55f64343aba98c15d9  2010.1/x86_64/webkit1.0-webinspector-1.2.7-0.1mdv2010.2.x86_64.rpm
 475cf83c5ddd8f6809c2c73a1f5a71d1  2010.1/x86_64/webkit-1.2.7-0.1mdv2010.2.x86_64.rpm
 b0f1c76107c3d54241daa7e61bfb29a9  2010.1/x86_64/webkit-gtklauncher-1.2.7-0.1mdv2010.2.x86_64.rpm
 97deff5e94a625a79842b4c240b0b00d  2010.1/x86_64/webkit-jsc-1.2.7-0.1mdv2010.2.x86_64.rpm 
 8d02c28d8f21a022130be4c49f9d27be  2010.1/SRPMS/webkit-1.2.7-0.1mdv2010.2.src.rpm
 _______________________________________________________________________
 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you. 
 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:
  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
 You can view other update advisories for Mandriva Linux at:
  http://www.mandriva.com/security/advisories
 If you want to report vulnerabilities, please contact
  security_(at)_mandriva.com
 _______________________________________________________________________
 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFNbgbemqjQ0CJFipgRAs9YAJ92z2WSC2ijj34b/wr42OIYLtv65gCg7XgL
Yv/ButpYAcXsmnJWUG4ayxQ=
=GRM6
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it. 
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
. ZDI-10-093: Apple Webkit CSS Charset Text Transformation Remote Code Execution Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-10-093
June 8, 2010
-- CVE ID:
CVE-2010-1770
-- Affected Vendors:
Apple
-- Affected Products:
Apple WebKit
-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability by Digital Vaccine protection filter ID 9858. 
-- Vendor Response:
Apple has issued an update to correct this vulnerability. More
details can be found at:
http://support.apple.com/kb/HT4196
-- Disclosure Timeline:
2010-05-03 - Vulnerability reported to vendor
2010-06-08 - Coordinated public release of advisory
-- Credit:
This vulnerability was discovered by:
    * wushi of team509
-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents 
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities. 
Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:
    http://www.zerodayinitiative.com
The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product. 
Our vulnerability disclosure policy is available online at:
    http://www.zerodayinitiative.com/advisories/disclosure_policy/
Follow the ZDI on Twitter:
    http://twitter.com/thezdi
                        
| VAR-201006-1245 | CVE-2010-1416 | Apple Safari of WebKit Vulnerability to read images from other sites | CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM | 
                            WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, does not properly restrict the reading of a canvas that contains an SVG image pattern from a different web site, which allows remote attackers to read images from other sites via a crafted canvas, related to a "cross-site image capture issue.". WebKit is prone to a cross-domain security-bypass vulnerability. 
An attacker can exploit this issue to load and capture an image hosted on another website.  Successful exploits may lead to further attacks. 
NOTE: This issue was previously covered in BID 40620 (Apple Safari Prior to 5.0 and 4.1 Multiple Security Vulnerabilities) but has been given its own record to better document it. Apple Apple Safari is a web browser developed by Apple (Apple), and is the default browser included with Mac OS X and iOS operating systems. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
 _______________________________________________________________________
 Mandriva Linux Security Advisory                         MDVSA-2011:039
 http://www.mandriva.com/security/
 _______________________________________________________________________
 Package : webkit
 Date    : March 2, 2011
 Affected: 2010.1
 _______________________________________________________________________
 Problem Description:
 Multiple cross-site scripting, denial of service and arbitrary code
 execution security flaws were discovered in webkit. 
 
 Please consult the CVE web links for further information. 
 
 The updated packages have been upgraded to the latest version (1.2.7)
 to correct these issues. 
 _______________________________________________________________________
 References:
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2797
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2841
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0046
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0047
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0048
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0049
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0050
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0051
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0052
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0053
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0054
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0314
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0647
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0650
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0651
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0656
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1386
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1387
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1389
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1390
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1391
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1392
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1393
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1394
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1395
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1396
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1397
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1398
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1400
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1401
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1402
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1403
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1404
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1405
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1406
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1407
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1408
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1409
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1410
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1412
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1414
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1415
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1416
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1417
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1418
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1419
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1421
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1422
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1501
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1664
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1665
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1758
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1759
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1760
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1761
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1762
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1764
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1766
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1767
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1770
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1771
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1772
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1773
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1774
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1780
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1781
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1782
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1783
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1784
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1785
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1786
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1787
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1788
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1790
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1791
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1792
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1793
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1807
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1812
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1814
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1815
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2264
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2647
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2648
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3113
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3114
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3115
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3116
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3119
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3248
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3255
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3257
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3259
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3812
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3813
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4040
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4197
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4198
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4204
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4206
 _______________________________________________________________________
 Updated Packages:
 Mandriva Linux 2010.1:
 141f3cd181b875d1bb40b67a507b6db1  2010.1/i586/libwebkitgtk1.0_2-1.2.7-0.1mdv2010.2.i586.rpm
 054886a3c645b3ce710b9b9daec1d5f9  2010.1/i586/libwebkitgtk1.0-devel-1.2.7-0.1mdv2010.2.i586.rpm
 bef556ca3f281f6ef4086292c3b658d2  2010.1/i586/webkit1.0-1.2.7-0.1mdv2010.2.i586.rpm
 a1ff7ac638646aeb64e3bbdca9bc945d  2010.1/i586/webkit1.0-webinspector-1.2.7-0.1mdv2010.2.i586.rpm
 3f40e3ebc62bad67097a9e102e0e79c2  2010.1/i586/webkit-1.2.7-0.1mdv2010.2.i586.rpm
 50875cf1bc8718cedce1a45dc509b44b  2010.1/i586/webkit-gtklauncher-1.2.7-0.1mdv2010.2.i586.rpm
 625d27780d1cc9edb935d4ac3521ae16  2010.1/i586/webkit-jsc-1.2.7-0.1mdv2010.2.i586.rpm 
 8d02c28d8f21a022130be4c49f9d27be  2010.1/SRPMS/webkit-1.2.7-0.1mdv2010.2.src.rpm
 Mandriva Linux 2010.1/X86_64:
 5ce57cd6ab823f8084030033c7c230d7  2010.1/x86_64/lib64webkitgtk1.0_2-1.2.7-0.1mdv2010.2.x86_64.rpm
 690d8718a97af93f58de3bb2357fbe9b  2010.1/x86_64/lib64webkitgtk1.0-devel-1.2.7-0.1mdv2010.2.x86_64.rpm
 7cc1d4aa77e1901ccc92f27faf85c9ea  2010.1/x86_64/webkit1.0-1.2.7-0.1mdv2010.2.x86_64.rpm
 2b77a77159529c55f64343aba98c15d9  2010.1/x86_64/webkit1.0-webinspector-1.2.7-0.1mdv2010.2.x86_64.rpm
 475cf83c5ddd8f6809c2c73a1f5a71d1  2010.1/x86_64/webkit-1.2.7-0.1mdv2010.2.x86_64.rpm
 b0f1c76107c3d54241daa7e61bfb29a9  2010.1/x86_64/webkit-gtklauncher-1.2.7-0.1mdv2010.2.x86_64.rpm
 97deff5e94a625a79842b4c240b0b00d  2010.1/x86_64/webkit-jsc-1.2.7-0.1mdv2010.2.x86_64.rpm 
 8d02c28d8f21a022130be4c49f9d27be  2010.1/SRPMS/webkit-1.2.7-0.1mdv2010.2.src.rpm
 _______________________________________________________________________
 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you. 
 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:
  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
 You can view other update advisories for Mandriva Linux at:
  http://www.mandriva.com/security/advisories
 If you want to report vulnerabilities, please contact
  security_(at)_mandriva.com
 _______________________________________________________________________
 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFNbgbemqjQ0CJFipgRAs9YAJ92z2WSC2ijj34b/wr42OIYLtv65gCg7XgL
Yv/ButpYAcXsmnJWUG4ayxQ=
=GRM6
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it. 
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
                        
| VAR-201006-1247 | CVE-2010-2205 | Adobe Flash ActionScript AVM2 newfunction vulnerability | CVSS V2: 9.3 CVSS V3: - Severity: HIGH | 
                            Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, access uninitialized memory, which allows attackers to execute arbitrary code via unspecified vectors. Adobe Flash contains a vulnerability in the handling of the ActionScript newfunction instruction, which can allow a remote, unauthenticated attacker to execute arbitrary code. Adobe Acrobat and Reader are prone to multiple remote vulnerabilities. 
Attackers can exploit these issues to execute arbitrary code or cause denial-of-service conditions. 
Adobe Reader and Acrobat versions prior to and including 9.3.2 and 8.2.2 are affected. 
This BID is being retired. The following individual records exist to better document the issues:
41230 Adobe Acrobat and Reader CVE-2010-1295 Remote Memory Corruption Vulnerability
41231 Adobe Acrobat and Reader CoolType Typography Engine Remote Denial of Service Vulnerability
41232 Adobe Acrobat andReader CVE-2010-1285 Remote Code Execution Vulnerability
41234 Adobe Acrobat and Reader CVE-2010-2202 Remote Memory Corruption Vulnerability
41235 Adobe Acrobat and Reader CVE-2010-2203 Remote Memory Corruption Vulnerability
41236 Adobe Acrobat and Reader CVE-2010-2168 Remote Code Execution Vulnerability
41237 Adobe Acrobat and Reader CVE-2010-2201 Remote Code Execution Vulnerability
41238 Adobe Acrobat and Reader CVE-2010-2205 Remote Code Execution Vulnerability
41239 Adobe Acrobat and Reader CVE-2010-2207 Remote Memory Corruption Vulnerability
41240 Adobe Acrobat and Reader CVE-2010-2209 Remote Memory Corruption Vulnerability
41241 Adobe Acrobat and Reader CVE-2010-2206 Remote Code Execution Vulnerability
41242 Adobe Acrobat and Reader CVE-2010-2210 Remote Memory Corruption Vulnerability
41243 Adobe Acrobat and Reader CVE-2010-2211 Remote Memory Corruption Vulnerability
41244 Adobe Acrobat and Reader CVE-2010-2208 Remote Code Execution Vulnerability
41245 Adobe Acrobat and Reader CVE-2010-2212 Remote Memory Corruption Vulnerability. Adobe Reader's AcroForm.api has an uninitialized memory error when parsing JPEG graphics files. Users who are tricked into opening malformed PDF files may trigger out-of-bounds memory references, resulting in arbitrary code execution. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 201009-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
  Severity: Normal
     Title: Adobe Reader: Multiple vulnerabilities
      Date: September 07, 2010
      Bugs: #297385, #306429, #313343, #322857
        ID: 201009-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities in Adobe Reader might result in the execution
of arbitrary code or other attacks. For further
information please consult the CVE entries and the Adobe Security
Bulletins referenced below. 
Workaround
==========
There is no known workaround at this time. 
Resolution
==========
All Adobe Reader users should upgrade to the latest version:
    # emerge --sync
    # emerge --ask --oneshot --verbose ">=app-text/acroread-9.3.4"
References
==========
  [ 1 ] APSA10-01
        http://www.adobe.com/support/security/advisories/apsa10-01.html
  [ 2 ] APSB10-02
        http://www.adobe.com/support/security/bulletins/apsb10-02.html
  [ 3 ] APSB10-07
        http://www.adobe.com/support/security/bulletins/apsb10-07.html
  [ 4 ] APSB10-09
        http://www.adobe.com/support/security/bulletins/apsb10-09.html
  [ 5 ] APSB10-14
        http://www.adobe.com/support/security/bulletins/apsb10-14.html
  [ 6 ] APSB10-16
        http://www.adobe.com/support/security/bulletins/apsb10-16.html
  [ 7 ] CVE-2009-3953
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3953
  [ 8 ] CVE-2009-4324
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4324
  [ 9 ] CVE-2010-0186
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0186
  [ 10 ] CVE-2010-0188
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0188
  [ 11 ] CVE-2010-0190
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0190
  [ 12 ] CVE-2010-0191
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0191
  [ 13 ] CVE-2010-0192
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0192
  [ 14 ] CVE-2010-0193
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0193
  [ 15 ] CVE-2010-0194
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0194
  [ 16 ] CVE-2010-0195
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0195
  [ 17 ] CVE-2010-0196
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0196
  [ 18 ] CVE-2010-0197
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0197
  [ 19 ] CVE-2010-0198
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0198
  [ 20 ] CVE-2010-0199
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0199
  [ 21 ] CVE-2010-0201
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0201
  [ 22 ] CVE-2010-0202
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0202
  [ 23 ] CVE-2010-0203
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0203
  [ 24 ] CVE-2010-0204
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0204
  [ 25 ] CVE-2010-1241
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1241
  [ 26 ] CVE-2010-1285
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1285
  [ 27 ] CVE-2010-1295
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1295
  [ 28 ] CVE-2010-1297
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1297
  [ 29 ] CVE-2010-2168
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2168
  [ 30 ] CVE-2010-2201
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2201
  [ 31 ] CVE-2010-2202
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2202
  [ 32 ] CVE-2010-2203
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2203
  [ 33 ] CVE-2010-2204
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2204
  [ 34 ] CVE-2010-2205
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2205
  [ 35 ] CVE-2010-2206
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2206
  [ 36 ] CVE-2010-2207
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2207
  [ 37 ] CVE-2010-2208
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2208
  [ 38 ] CVE-2010-2209
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2209
  [ 39 ] CVE-2010-2210
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2210
  [ 40 ] CVE-2010-2211
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2211
  [ 41 ] CVE-2010-2212
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2212
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
  http://security.gentoo.org/glsa/glsa-201009-05.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org. 
License
=======
Copyright 2010 Gentoo Foundation, Inc; referenced text
belongs to its owner(s). 
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license. 
http://creativecommons.org/licenses/by-sa/2.5
. ----------------------------------------------------------------------
Secunia CSI integrated with Microsoft WSUS and Microsoft SCCM for 3rd party Patch Management
Free webinars
http://secunia.com/vulnerability_scanning/corporate/webinars/
----------------------------------------------------------------------
TITLE:
Adobe Flash Player Unspecified Code Execution Vulnerability
SECUNIA ADVISORY ID:
SA40026
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/40026/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=40026
RELEASE DATE:
2010-06-05
DISCUSS ADVISORY:
http://secunia.com/advisories/40026/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/40026/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=40026
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in Adobe Flash Player, which can be
exploited by malicious people to compromise a user's system. 
The vulnerability is caused due to an unspecified error. No more
information is currently available. 
The vulnerability is reported in version 10.0.45.2 and prior 10.0.x
and 9.0.x versions for Windows, Macintosh, Linux, and Solaris. 
NOTE: The vulnerability is reportedly being actively exploited. 
SOLUTION:
Reportedly, the latest version 10.1 Release Candidate is not
affected. 
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
PROVIDED AND/OR DISCOVERED BY:
Reported as a 0-day. 
ORIGINAL ADVISORY:
Adobe:
http://www.adobe.com/support/security/advisories/apsa10-01.html
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. 
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
                    National Cyber Alert System
              Technical Cyber Security Alert TA10-159A
Adobe Flash, Reader, and Acrobat Vulnerability
   Original release date: June 08, 2010
   Last revised: --
   Source: US-CERT
Systems Affected
     * Adobe Flash Player 10.0.45.2 and earlier 10.x versions
     * Adobe Flash Player 9.0.262 and earlier 9.x versions
     * Adobe Reader 9.3.2 and earlier 9.x versions
     * Adobe Acrobat 9.3.2 and earlier 9.x versions
     Other Adobe products that support Flash may also be vulnerable. This
   vulnerability affects Flash Player, Reader, Acrobat, and possibly
   other products that support Flash. 
I. It may
   also affect other products that independently support Flash, such
   as Photoshop, Photoshop Lightroom, Freehand MX, and Fireworks. 
   An attacker could exploit this vulnerability by convincing a user
   to open specially crafted Flash content. Flash content is commonly
   hosted on a web page, but it can also be embedded in PDF and other
   documents or provided as a stand-alone file. 
II. 
III. Solution
 Update
   Adobe Security Advisory APSA10-01 suggests updating to the release
   candidate of Flash Player 10.1. 
 Disable Flash in your web browser
   Uninstall Flash or restrict which sites are allowed to run Flash. 
   To the extent possible, only run trusted Flash content on trusted
   domains. For more information, see Securing Your Web Browser. 
 Disable Flash in Adobe Reader and Acrobat
   Disabling Flash in Adobe Reader will mitigate attacks that rely on
   Flash content embedded in a PDF file. Disabling 3D & Multimedia
   support does not directly address the vulnerability, but it does
   provide additional mitigation and results in a more user-friendly
   error message instead of a crash. To disable Flash and 3D &
   Multimedia support in Adobe Reader 9, delete, rename, or remove
   access to these files:
   Microsoft Windows
     "%ProgramFiles%\Adobe\Reader 9.0\Reader\authplay.dll"
     "%ProgramFiles%\Adobe\Reader 9.0\Reader\rt3d.dll"
   Apple Mac OS X
     "/Applications/Adobe Reader 9/Adobe
     Reader.app/Contents/Frameworks/AuthPlayLib.bundle"
     "/Applications/Adobe Reader 9/Adobe
     Reader.app/Contents/Frameworks/Adobe3D.framework"
   GNU/Linux (locations may vary among distributions)
     "/opt/Adobe/Reader9/Reader/intellinux/lib/libauthplay.so"
     "/opt/Adobe/Reader9/Reader/intellinux/lib/librt3d.so"
   File locations may be different for Adobe Acrobat or other Adobe
   products that include Flash and 3D & Multimedia support. Disabling
   these plugins will reduce functionality and will not protect
   against Flash content hosted on websites. Depending on the update
   schedule for products other than Flash Player, consider leaving
   Flash and 3D & Multimedia support disabled unless they are
   absolutely required. 
 Prevent Internet Explorer from automatically opening PDF documents
   The installer for Adobe Reader and Acrobat configures Internet
   Explorer to automatically open PDF files without any user
   interaction. This behavior can be reverted to a safer option that
   prompts the user by importing the following as a .REG file:
     Windows Registry Editor Version 5.00
     [HKEY_CLASSES_ROOT\AcroExch.Document.7]
     "EditFlags"=hex:00,00,00,00
 Disable the display of PDF documents in the web browser
   Preventing PDF documents from opening inside a web browser will
   partially mitigate this vulnerability. If this workaround is
   applied, it may also mitigate future vulnerabilities. 
   To prevent PDF documents from automatically being opened in a web
   browser, do the following:
     1. 
     2. Open the Edit menu. 
     3. Choose the Preferences option. 
     4. Choose the Internet section. 
     5. Uncheck the "Display PDF in browser" checkbox. 
 Disable JavaScript in Adobe Reader and Acrobat
   Disabling JavaScript provides some additional protection against
   attacks. Acrobat JavaScript can be disabled using the Preferences
   menu (Edit -> Preferences -> JavaScript; uncheck Enable Acrobat
   JavaScript). 
 Enable DEP in Microsoft Windows
   Consider enabling Data Execution Prevention (DEP) in supported
   versions of Windows. DEP should not be treated as a complete
   workaround, but it can mitigate the execution of attacker-supplied
   code in some cases. Microsoft has published detailed technical
   information about DEP in Security Research & Defense blog posts
   "Understanding DEP as a mitigation technology" part 1 and part 2. 
   Use of DEP should be considered in conjunction with the application
   of patches or other mitigations described in this document. 
 Do not access PDF documents from untrusted sources
   Do not open unfamiliar or unexpected PDF documents, particularly
   those hosted on websites or delivered as email attachments. Please
   see Cyber Security Tip ST04-010. 
IV. References
 * Security Advisory for Flash Player, Adobe Reader and Acrobat -
   <http://www.adobe.com/support/security/advisories/apsa10-01.html>
 * Adobe Labs - Flash Player 10 pre-release -
   <http://labs.adobe.com/technologies/flashplayer10/>
 * US-CERT Vulnerability Note VU#486225 -
   <http://www.kb.cert.org/vuls/id/486225>
 * Securing Your Web Browser -
   <http://www.us-cert.gov/reading_room/securing_browser/>
 * Understanding DEP as a mitigation technology part 1 -
   <http://blogs.technet.com/b/srd/archive/2009/06/05/understanding-dep-as-a-mitigation-technology-part-1.aspx>
 * Understanding DEP as a mitigation technology part 2 -
   <http://blogs.technet.com/b/srd/archive/2009/06/12/understanding-dep-as-a-mitigation-technology-part-2.aspx>
 ____________________________________________________________________
   The most recent version of this document can be found at:
     <http://www.us-cert.gov/cas/techalerts/TA10-159A.html>
 ____________________________________________________________________
   Feedback can be directed to US-CERT Technical Staff. Please send
   email to <cert@cert.org> with "TA10-159A Feedback VU#486225" in
   the subject. 
 ____________________________________________________________________
   For instructions on subscribing to or unsubscribing from this
   mailing list, visit <http://www.us-cert.gov/cas/signup.html>. 
 ____________________________________________________________________
   Produced 2010 by US-CERT, a government organization. 
   Terms of use:
     <http://www.us-cert.gov/legal.html>
 ____________________________________________________________________
Revision History
  June 08, 2010: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBTA65yT6pPKYJORa3AQLS9wf/fh+7IwRtBvoPgn8pYeOsVheLkbVLWC3W
miWUnY1acuPTwZzG5JcAldRHksFkx1j0mMEvp4PhtiTr51JFPi4XgDfrG4cEcVaw
nuAqEV+hLAWZkMex/jWxBV+85tZqKN0kiUr3bq5DPsdkhjV7c2MFfS8BSxLXLuPm
OFAXPT+XFldq6MJhYUOtWT1CIz6PNPfo68KmZaUThjdqkkBW3HQu90OSRf2c6M/u
V6KBQf7QuhpPqYUqAZU6ZUNEfL/7g2BwvuPjUMlgE5N+Z8EYnhyhu0qDtZeLUcXA
2gH31VEr79DUHJqpb9jk61bi5Dm4gjHeLHoTAwu0IrduZzXvWncfIg==
=ZPZM
-----END PGP SIGNATURE-----
. 
SOLUTION:
Delete, rename, or remove access to authplay.dll to prevent running
SWF content in PDF files
                        
| VAR-201006-1246 | CVE-2010-1409 | Apple Safari of WebKit In IRC Vulnerability where data is exposed via the Internet | CVSS V2: 5.8 CVSS V3: - Severity: MEDIUM | 
                            Incomplete blacklist vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to trigger disclosure of data over IRC via vectors involving an IRC service port. Safari is prone to multiple security vulnerabilities that have been addressed in Apple security advisory APPLE-SA-2010-06-07-1. 
Attackers can exploit these issues by enticing an unsuspecting user into visiting a malicious webpage.  Successful attacks may result in information-disclosure, remote code-execution, denial-of-service, or other consequences. 
This BID is being retired. The following individual records exist to better document the issues:
40642 WebKit 'removeChild()' Remote Code Execution Vulnerability
40644 WebKit HTML Button Use After Free Remote Code Execution Vulnerability
40645 WebKit Marquee Event 'SelectionController' Remote Code Execution Vulnerability
40646 WebKit Editable Containers Remote Code Execution Vulnerability
40647 WebKit Option Element 'ContentEditable' Attribute Remote Code Execution Vulnerability
40649 WebKit 'ConditionEventListener' Remote Code Execution Vulnerability
40650 WebKit 'DOCUMENT_POSITION_DISCONNECTED' Attribute Remote Code Execution Vulnerability
40652 WebKit SVG 'RadialGradient' Attribute Remote Code Execution Vulnerability
40653 WebKit IBM1147 Character Set Text Transform Remote Code Execution Vulnerability
40654 WebKit Option Recursive Use Element Remote Code Execution Vulnerability
40655 WebKit 'first-letter' CSS Style Remote Code Execution Vulnerability
40656 WebKit SVG 'use' Element Remote Code Execution Vulnerability
40657 WebKit SVG 'use' Element Remote Code Execution Vulnerability
40658 WebKit Caption Element Handling Remote Code Execution Vulnerability
40659 WebKit Custom Vertical Positioning Remote Code Execution Vulnerability
40660 WebKit Dragging or Pasting Cross Domain Scripting Vulnerability
40661 WebKit Use After Free Remote Code Execution Vulnerability
40662 WebKit Hover Event Handling Remote Code Execution Vulnerability
40663 WebKit DOM Range Objects Remote Code Execution Vulnerability
40665 WebKit 'Node.normalize' Method Remote Code Execution Vulnerability
40665 WebKit 'Node.normalize' Method Remote Code Execution Vulnerability
40666 WebKit 'removeChild' DOM Method Remote Code Execution Vulnerability
40667 WebKit HTML Document Subtrees Remote Code Execution Vulnerability
40668 WebKit 'libxml' Context Handling Remote Code Execution Vulnerability
40669 Webkit UTF-7 Cross-Site Scripting Vulnerability
40670 WebKit Fonts Handling Remote Code Execution Vulnerability
40671 WebKit HTML Tables Remote Code Execution Vulnerability
40672 WebKit CSS-Styled HTML Handling Remote Code Execution Vulnerability
40673 Apple Safari PDF Handling Remote Code Execution Vulnerability
40674 Apple Safari Window Management Remote Code Execution Vulnerability
40675 Webkit HTML Document Fragments Cross Site Scripting Vulnerability
40697 WebKit Integer Truncation TCP Port Information Disclosure Vulnerability
40698 WebKit Keyboard Focus Cross Domain Information Disclosure Vulnerability
40704 Apple Safari Authentication Data URI Spoofing Vulnerability
40705 WebKit IRC Port Blacklist Information Disclosure Vulnerability
40707 Webkit DOM Constructor Object Cross Site Scripting Vulnerability
40710 WebKit 'frame.src' Validation Cross Site Scripting Vulnerability
40714 WebKit SVG Image Pattern Cross Domain Security Bypass Vulnerability
40717 WebKit Empty Hostname URI Handling Cross Site Scripting Vulnerability
40726 Webkit 'textarea' Element Cross-Site Scripting Vulnerability
40727 WebKit Cascading Stylesheets 'HREF' Information Disclosure Vulnerability
40732 WebKit HTTP Redirects Information Disclosure Vulnerability
40733 WebKit NTLM Credentials Information Disclosure Vulnerability
40750 WebKit HTTPS Redirect Information Disclosure Vulnerability
40752 WebKit HTTP URI Clipboard Information Disclosure Vulnerability
40753 WebKit Local Storage and Web SQL Database Directory Traversal Vulnerability
40754 WebKit 'execCommand()' Function Clipboard Overwrite Security Weakness
40756 WebKit ':visited' CSS Pseudo-class Information Disclosure Vulnerability. WebKit is prone to an information-disclosure vulnerability. 
Successful exploits can allow the attacker to gain access to sensitive information. ----------------------------------------------------------------------
Secunia CSI integrated with Microsoft WSUS and Microsoft SCCM for 3rd party Patch Management
Free webinars
http://secunia.com/vulnerability_scanning/corporate/webinars/
----------------------------------------------------------------------
TITLE:
Apple Safari Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA40105
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/40105/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=40105
RELEASE DATE:
2010-06-09
DISCUSS ADVISORY:
http://secunia.com/advisories/40105/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/40105/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=40105
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Some vulnerabilities have been reported in Apple Safari, which can be
exploited by malicious people to bypass certain security restrictions,
disclose sensitive information, conduct spoofing or cross-site
scripting attacks, and potentially compromise a user's system. 
1) An error when processing ColorSync profiles embedded in a
specially crafted image can be exploited to potentially execute
arbitrary code. 
This is related to vulnerability #2 in:
SA36096
2) The browser follows links containing arbitrary user information
without warning, which can be exploited to facilitate phishing
attacks via specially crafted URLs. 
3) A use-after-free error when handling PDF files can be exploited to
potentially execute arbitrary code. 
4) An error in WebKit when handling clipboard URLs can be exploited
to disclose sensitive files if a user is tricked into dragging or
pasting links or images to a malicious website. 
5) An error in WebKit when a selection from a website is dragged or
pasted into another website can be exploited to potentially execute
arbitrary JavaScript code in the context of the destination website. 
6) An error in WebKit when handling UTF-7 encoded text can be
exploited to leave an HTML quoted string unterminated and facilitate
cross-site scripting attacks. 
7) An input sanitation error in WebKit when handling Local Storage
and Web SQL databases can be exploited to create database files in
arbitrary directories via directory traversal attacks. 
8) A use-after-free error in WebKit when rendering HTML buttons can
be exploited to potentially execute arbitrary code. 
9) A use-after-free error in WebKit when handling attribute
manipulations can be exploited to potentially execute arbitrary
code. 
10) An error in WebKit when handling HTML document fragments can be
exploited to execute arbitrary JavaScript code in a legitimate
context processing foreign HTML fragments. 
11) An error in WebKit when handling keyboard focus can be exploited
to deliver key press events intended for a different frame. 
12) An error in WebKit when handling DOM constructor objects can be
exploited to conduct cross-site scripting attacks. 
13) A use-after-free error in WebKit when handling the removal of
container elements can be exploited to potentially execute arbitrary
code. 
14) A use-after-free error in WebKit when rendering a selection at
the time of a layout change can be exploited to potentially execute
arbitrary code. 
15) An error in WebKit when handling ordered list insertions can be
exploited to corrupt memory and potentially execute arbitrary code. 
16) An uninitialised memory access error in WebKit when handling
selection changes on form input elements can be exploited to
potentially execute arbitrary code. 
17) A use-after-free error in WebKit when handling caption elements
can be exploited to potentially execute arbitrary code. 
18) A use-after-free error in WebKit when handling the
":first-letter" pseudo-element in cascading stylesheets can be
exploited to potentially execute arbitrary code. 
19) A double-free error in WebKit when handling event listeners in
SVG documents can be exploited to potentially execute arbitrary
code. 
20) An uninitialised memory access error in WebKit when handling
"use" elements in SVG documents can be exploited to potentially
execute arbitrary code. 
21) A use-after-free error in WebKit when handling SVG documents with
multiple "use" elements can be exploited to potentially execute
arbitrary code. 
22) An error in WebKit when handling nested "use" elements in SVG
documents can be exploited to corrupt memory and potentially execute
arbitrary code. 
23) A use-after-free error in WebKit when handling CSS run-ins can be
exploited to potentially execute arbitrary code. 
24) A use-after-free error in WebKit when handling HTML elements with
custom vertical positioning can be exploited to potentially execute
arbitrary code. 
25) An error exists in WebKit when visiting HTTPS websites
redirecting to HTTP websites. This can be exploited to disclose
potentially sensitive information contained in the HTTPS URL by
reading the "Referer" header. 
26) An integer truncation error in WebKit when handling TCP requests
can be exploited to pass arbitrary data to arbitrary TCP ports. 
28) A use-after-free error in WebKit when handling hover events can
be exploited to potentially execute arbitrary code. 
29) An error in WebKit can be exploited to read NTLM credentials that
are incorrectly transmitted in plain-text via Man-in-the-Middle (MitM)
attacks. 
30) A use-after-free error in WebKit when handling the "removeChild"
DOM method can be exploited to potentially execute arbitrary code. 
31) An error in WebKit when handling libxml contexts can be exploited
to potentially execute arbitrary code. 
32) An error in WebKit when handling a canvas with an SVG image
pattern can be exploited to load and capture an image from another
website. 
33) An error in WebKit when rendering CSS-styled HTML content with
multiple ":after" pseudo-selectors can be exploited to corrupt memory
and potentially execute arbitrary code. 
34) An error in WebKit when handling the "src" attribute of a frame
element can be exploited to facilitate cross-site scripting attacks. 
35) A use-after-free error in WebKit when handling drag and drop
operations can be exploited to potentially execute arbitrary code. 
36) An error in the implementation of the JavaScript "execCommand"
function can be exploited to modify the contents of the clipboard. 
37) An error when handling malformed URLs can be exploited to bypass
the same-origin policy and execute arbitrary script code in the
context of a different domain. 
38) A use-after-free error in WebKit when handling DOM "Range"
objects can be exploited to potentially execute arbitrary code. 
39) A use-after-free error in WebKit when handling the
"Node.normalize()" method can be exploited to potentially execute
arbitrary code. 
40) A use-after-free error in WebKit when rendering HTML document
subtrees can be exploited to potentially execute arbitrary code. 
41) An error in WebKit when handling HTML content in "textarea"
elements can be exploited to conduct cross-site scripting attacks. 
42) An error in WebKit when visiting a website which redirects form
submissions to a redirecting website can be exploited disclose
submitted data. 
43) A type checking error in WebKit when handling text nodes can be
exploited to potentially execute arbitrary code. 
44) A use-after-free error in WebKit when handling fonts can be
exploited to potentially execute arbitrary code. 
45) An error in WebKit when handling HTML tables can be exploited to
trigger an out-of-bounds memory access and potentially execute
arbitrary code. 
46) An error in WebKit when handling the CSS ":visited" pseudo-class
can be exploited to disclose visited websites. 
SOLUTION:
Update to version 4.1 (available only for Mac OS X v10.4 systems) or
upgrade to version 5.0. 
PROVIDED AND/OR DISCOVERED BY:
37) Michal Zalewski
The vendor also credits:
1) Chris Evans of the Google Security Team, and Andrzej Dyjak
2) Abhishek Arya of Google
3) Borja Marcos of Sarenet
4) Eric Seidel of Google
5) Paul Stone of Context Information Security
6) Masahiro Yamada
8) Matthieu Bonetti of Vupen
9) Ralf Philipp Weinmann working with TippingPoint's Zero Day
Initiative
10, 41) Eduardo Vela Nava (sirdarckcat) of Google
11) Michal Zalewski of Google
12) Gianni "gf3" Chiappetta of Runlevel6
13, 15, 16, 18, 19, 20, 21, 23, 43) wushi of team509, working with
TippingPoint's Zero Day Initiative
14) wushi and Z of team509, working with TippingPoint's Zero Day
Initiative
17) regenrecht working with iDefense
22, 31) Aki Helin of OUSPG
24) Ojan Vafai of Google
25) Colin Percival of Tarsnap
28) Dave Bowker
30) Mark Dowd of Azimuth Security
32) Chris Evans of Google
33, 45) wushi of team509
34) Sergey Glazunov
35) kuzzcc, and Skylined of Google Chrome Security Team
38) Yaar Schnitman of Google
39) Mark Dowd
40) James Robinson of Google
42) Marc Worrell of WhatWebWhat
ORIGINAL ADVISORY:
Apple:
http://support.apple.com/kb/HT4196
Michal Zalewski:
http://lcamtuf.blogspot.com/2010/06/safari-tale-of-betrayal-and-revenge.html
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
 _______________________________________________________________________
 Mandriva Linux Security Advisory                         MDVSA-2011:039
 http://www.mandriva.com/security/
 _______________________________________________________________________
 Package : webkit
 Date    : March 2, 2011
 Affected: 2010.1
 _______________________________________________________________________
 Problem Description:
 Multiple cross-site scripting, denial of service and arbitrary code
 execution security flaws were discovered in webkit. 
 
 Please consult the CVE web links for further information. 
 _______________________________________________________________________
 References:
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2797
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2841
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0046
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0047
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0048
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0049
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0050
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0051
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0052
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0053
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0054
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0314
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0647
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0650
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0651
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0656
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1386
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1387
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1389
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1390
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1391
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1392
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1393
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1394
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1395
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1396
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1397
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1398
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1400
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1401
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1402
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1403
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1404
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1405
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1406
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1407
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1408
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1409
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1410
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1412
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1414
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1415
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1416
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1417
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1418
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1419
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1421
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1422
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1501
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1664
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1665
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1758
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1759
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1760
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1761
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1762
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1764
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1766
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1767
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1770
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1771
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1772
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1773
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1774
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1780
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1781
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1782
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1783
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1784
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1785
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1786
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1787
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1788
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1790
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1791
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1792
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1793
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1807
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1812
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1814
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1815
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2264
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2647
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2648
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3113
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3114
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3115
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3116
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3119
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3248
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3255
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3257
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3259
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3812
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3813
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4040
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4197
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4198
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4204
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4206
 _______________________________________________________________________
 Updated Packages:
 Mandriva Linux 2010.1:
 141f3cd181b875d1bb40b67a507b6db1  2010.1/i586/libwebkitgtk1.0_2-1.2.7-0.1mdv2010.2.i586.rpm
 054886a3c645b3ce710b9b9daec1d5f9  2010.1/i586/libwebkitgtk1.0-devel-1.2.7-0.1mdv2010.2.i586.rpm
 bef556ca3f281f6ef4086292c3b658d2  2010.1/i586/webkit1.0-1.2.7-0.1mdv2010.2.i586.rpm
 a1ff7ac638646aeb64e3bbdca9bc945d  2010.1/i586/webkit1.0-webinspector-1.2.7-0.1mdv2010.2.i586.rpm
 3f40e3ebc62bad67097a9e102e0e79c2  2010.1/i586/webkit-1.2.7-0.1mdv2010.2.i586.rpm
 50875cf1bc8718cedce1a45dc509b44b  2010.1/i586/webkit-gtklauncher-1.2.7-0.1mdv2010.2.i586.rpm
 625d27780d1cc9edb935d4ac3521ae16  2010.1/i586/webkit-jsc-1.2.7-0.1mdv2010.2.i586.rpm 
 8d02c28d8f21a022130be4c49f9d27be  2010.1/SRPMS/webkit-1.2.7-0.1mdv2010.2.src.rpm
 Mandriva Linux 2010.1/X86_64:
 5ce57cd6ab823f8084030033c7c230d7  2010.1/x86_64/lib64webkitgtk1.0_2-1.2.7-0.1mdv2010.2.x86_64.rpm
 690d8718a97af93f58de3bb2357fbe9b  2010.1/x86_64/lib64webkitgtk1.0-devel-1.2.7-0.1mdv2010.2.x86_64.rpm
 7cc1d4aa77e1901ccc92f27faf85c9ea  2010.1/x86_64/webkit1.0-1.2.7-0.1mdv2010.2.x86_64.rpm
 2b77a77159529c55f64343aba98c15d9  2010.1/x86_64/webkit1.0-webinspector-1.2.7-0.1mdv2010.2.x86_64.rpm
 475cf83c5ddd8f6809c2c73a1f5a71d1  2010.1/x86_64/webkit-1.2.7-0.1mdv2010.2.x86_64.rpm
 b0f1c76107c3d54241daa7e61bfb29a9  2010.1/x86_64/webkit-gtklauncher-1.2.7-0.1mdv2010.2.x86_64.rpm
 97deff5e94a625a79842b4c240b0b00d  2010.1/x86_64/webkit-jsc-1.2.7-0.1mdv2010.2.x86_64.rpm 
 8d02c28d8f21a022130be4c49f9d27be  2010.1/SRPMS/webkit-1.2.7-0.1mdv2010.2.src.rpm
 _______________________________________________________________________
 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you. 
 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:
  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
 You can view other update advisories for Mandriva Linux at:
  http://www.mandriva.com/security/advisories
 If you want to report vulnerabilities, please contact
  security_(at)_mandriva.com
 _______________________________________________________________________
 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFNbgbemqjQ0CJFipgRAs9YAJ92z2WSC2ijj34b/wr42OIYLtv65gCg7XgL
Yv/ButpYAcXsmnJWUG4ayxQ=
=GRM6
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it. 
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
. ----------------------------------------------------------------------
Windows Applications Insecure Library Loading
The Official, Verified Secunia List:
http://secunia.com/advisories/windows_insecure_library_loading/
The list is continuously updated as we confirm the vulnerability reports so check back regularly too see if any of your apps are affected. Some
have an unknown impact and others can be exploited by malicious
people to bypass certain security restrictions, disclose sensitive
information, or compromise a user's system. 
For more information:
SA37931
SA40105
4) One unspecified vulnerability with an unknown impact has been
reported in WebKit included in iTunes. No further information is
currently available. 
5) Two vulnerabilities in WebKit can be exploited by malicious people
to compromise a user's system. 
For more information see vulnerability #14 and 15 in:
SA40257
SOLUTION:
Update to version 9.2. 
PROVIDED AND/OR DISCOVERED BY:
1) The vendor credits Chris Evans of the Google Security Team and
Andrzej Dyjak. 
2) The vendor credits Kevin Finisterre, digitalmunition.com. 
4) Reported by the vendor. ----------------------------------------------------------------------
Secure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM)
                        
| VAR-201006-1243 | CVE-2010-1393 | Apple Safari of Cascading Style Sheet Implementation Important in URL Vulnerabilities that allow information to be seen | CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM | 
                            The Cascading Style Sheets (CSS) implementation in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to discover sensitive URLs via an HREF attribute associated with a redirecting URL. Safari is prone to multiple security vulnerabilities that have been addressed in Apple security advisory APPLE-SA-2010-06-07-1. 
Attackers can exploit these issues by enticing an unsuspecting user into visiting a malicious webpage.  Successful attacks may result in information-disclosure, remote code-execution, denial-of-service, or other consequences. 
This BID is being retired. The following individual records exist to better document the issues:
40642 WebKit 'removeChild()' Remote Code Execution Vulnerability
40644 WebKit HTML Button Use After Free Remote Code Execution Vulnerability
40645 WebKit Marquee Event 'SelectionController' Remote Code Execution Vulnerability
40646 WebKit Editable Containers Remote Code Execution Vulnerability
40647 WebKit Option Element 'ContentEditable' Attribute Remote Code Execution Vulnerability
40649 WebKit 'ConditionEventListener' Remote Code Execution Vulnerability
40650 WebKit 'DOCUMENT_POSITION_DISCONNECTED' Attribute Remote Code Execution Vulnerability
40652 WebKit SVG 'RadialGradient' Attribute Remote Code Execution Vulnerability
40653 WebKit IBM1147 Character Set Text Transform Remote Code Execution Vulnerability
40654 WebKit Option Recursive Use Element Remote Code Execution Vulnerability
40655 WebKit 'first-letter' CSS Style Remote Code Execution Vulnerability
40656 WebKit SVG 'use' Element Remote Code Execution Vulnerability
40657 WebKit SVG 'use' Element Remote Code Execution Vulnerability
40658 WebKit Caption Element Handling Remote Code Execution Vulnerability
40659 WebKit Custom Vertical Positioning Remote Code Execution Vulnerability
40660 WebKit Dragging or Pasting Cross Domain Scripting Vulnerability
40661 WebKit Use After Free Remote Code Execution Vulnerability
40662 WebKit Hover Event Handling Remote Code Execution Vulnerability
40663 WebKit DOM Range Objects Remote Code Execution Vulnerability
40665 WebKit 'Node.normalize' Method Remote Code Execution Vulnerability
40665 WebKit 'Node.normalize' Method Remote Code Execution Vulnerability
40666 WebKit 'removeChild' DOM Method Remote Code Execution Vulnerability
40667 WebKit HTML Document Subtrees Remote Code Execution Vulnerability
40668 WebKit 'libxml' Context Handling Remote Code Execution Vulnerability
40669 Webkit UTF-7 Cross-Site Scripting Vulnerability
40670 WebKit Fonts Handling Remote Code Execution Vulnerability
40671 WebKit HTML Tables Remote Code Execution Vulnerability
40672 WebKit CSS-Styled HTML Handling Remote Code Execution Vulnerability
40673 Apple Safari PDF Handling Remote Code Execution Vulnerability
40674 Apple Safari Window Management Remote Code Execution Vulnerability
40675 Webkit HTML Document Fragments Cross Site Scripting Vulnerability
40697 WebKit Integer Truncation TCP Port Information Disclosure Vulnerability
40698 WebKit Keyboard Focus Cross Domain Information Disclosure Vulnerability
40704 Apple Safari Authentication Data URI Spoofing Vulnerability
40705 WebKit IRC Port Blacklist Information Disclosure Vulnerability
40707 Webkit DOM Constructor Object Cross Site Scripting Vulnerability
40710 WebKit 'frame.src' Validation Cross Site Scripting Vulnerability
40714 WebKit SVG Image Pattern Cross Domain Security Bypass Vulnerability
40717 WebKit Empty Hostname URI Handling Cross Site Scripting Vulnerability
40726 Webkit 'textarea' Element Cross-Site Scripting Vulnerability
40727 WebKit Cascading Stylesheets 'HREF' Information Disclosure Vulnerability
40732 WebKit HTTP Redirects Information Disclosure Vulnerability
40733 WebKit NTLM Credentials Information Disclosure Vulnerability
40750 WebKit HTTPS Redirect Information Disclosure Vulnerability
40752 WebKit HTTP URI Clipboard Information Disclosure Vulnerability
40753 WebKit Local Storage and Web SQL Database Directory Traversal Vulnerability
40754 WebKit 'execCommand()' Function Clipboard Overwrite Security Weakness
40756 WebKit ':visited' CSS Pseudo-class Information Disclosure Vulnerability. 
Successful exploits may allow the attacker to gain access to the contents of another website, including potentially sensitive information. ----------------------------------------------------------------------
Secunia CSI integrated with Microsoft WSUS and Microsoft SCCM for 3rd party Patch Management
Free webinars
http://secunia.com/vulnerability_scanning/corporate/webinars/
----------------------------------------------------------------------
TITLE:
Apple Safari Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA40105
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/40105/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=40105
RELEASE DATE:
2010-06-09
DISCUSS ADVISORY:
http://secunia.com/advisories/40105/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/40105/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=40105
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Some vulnerabilities have been reported in Apple Safari, which can be
exploited by malicious people to bypass certain security restrictions,
disclose sensitive information, conduct spoofing or cross-site
scripting attacks, and potentially compromise a user's system. 
1) An error when processing ColorSync profiles embedded in a
specially crafted image can be exploited to potentially execute
arbitrary code. 
This is related to vulnerability #2 in:
SA36096
2) The browser follows links containing arbitrary user information
without warning, which can be exploited to facilitate phishing
attacks via specially crafted URLs. 
3) A use-after-free error when handling PDF files can be exploited to
potentially execute arbitrary code. 
4) An error in WebKit when handling clipboard URLs can be exploited
to disclose sensitive files if a user is tricked into dragging or
pasting links or images to a malicious website. 
5) An error in WebKit when a selection from a website is dragged or
pasted into another website can be exploited to potentially execute
arbitrary JavaScript code in the context of the destination website. 
6) An error in WebKit when handling UTF-7 encoded text can be
exploited to leave an HTML quoted string unterminated and facilitate
cross-site scripting attacks. 
7) An input sanitation error in WebKit when handling Local Storage
and Web SQL databases can be exploited to create database files in
arbitrary directories via directory traversal attacks. 
8) A use-after-free error in WebKit when rendering HTML buttons can
be exploited to potentially execute arbitrary code. 
9) A use-after-free error in WebKit when handling attribute
manipulations can be exploited to potentially execute arbitrary
code. 
10) An error in WebKit when handling HTML document fragments can be
exploited to execute arbitrary JavaScript code in a legitimate
context processing foreign HTML fragments. 
11) An error in WebKit when handling keyboard focus can be exploited
to deliver key press events intended for a different frame. 
12) An error in WebKit when handling DOM constructor objects can be
exploited to conduct cross-site scripting attacks. 
13) A use-after-free error in WebKit when handling the removal of
container elements can be exploited to potentially execute arbitrary
code. 
14) A use-after-free error in WebKit when rendering a selection at
the time of a layout change can be exploited to potentially execute
arbitrary code. 
15) An error in WebKit when handling ordered list insertions can be
exploited to corrupt memory and potentially execute arbitrary code. 
16) An uninitialised memory access error in WebKit when handling
selection changes on form input elements can be exploited to
potentially execute arbitrary code. 
17) A use-after-free error in WebKit when handling caption elements
can be exploited to potentially execute arbitrary code. 
18) A use-after-free error in WebKit when handling the
":first-letter" pseudo-element in cascading stylesheets can be
exploited to potentially execute arbitrary code. 
19) A double-free error in WebKit when handling event listeners in
SVG documents can be exploited to potentially execute arbitrary
code. 
20) An uninitialised memory access error in WebKit when handling
"use" elements in SVG documents can be exploited to potentially
execute arbitrary code. 
21) A use-after-free error in WebKit when handling SVG documents with
multiple "use" elements can be exploited to potentially execute
arbitrary code. 
22) An error in WebKit when handling nested "use" elements in SVG
documents can be exploited to corrupt memory and potentially execute
arbitrary code. 
23) A use-after-free error in WebKit when handling CSS run-ins can be
exploited to potentially execute arbitrary code. 
24) A use-after-free error in WebKit when handling HTML elements with
custom vertical positioning can be exploited to potentially execute
arbitrary code. 
25) An error exists in WebKit when visiting HTTPS websites
redirecting to HTTP websites. This can be exploited to disclose
potentially sensitive information contained in the HTTPS URL by
reading the "Referer" header. 
26) An integer truncation error in WebKit when handling TCP requests
can be exploited to pass arbitrary data to arbitrary TCP ports. 
27) An error in WebKit when processing connections to IRC ports can
be exploited to send arbitrary data to arbitrary IRC servers. 
28) A use-after-free error in WebKit when handling hover events can
be exploited to potentially execute arbitrary code. 
29) An error in WebKit can be exploited to read NTLM credentials that
are incorrectly transmitted in plain-text via Man-in-the-Middle (MitM)
attacks. 
30) A use-after-free error in WebKit when handling the "removeChild"
DOM method can be exploited to potentially execute arbitrary code. 
31) An error in WebKit when handling libxml contexts can be exploited
to potentially execute arbitrary code. 
32) An error in WebKit when handling a canvas with an SVG image
pattern can be exploited to load and capture an image from another
website. 
33) An error in WebKit when rendering CSS-styled HTML content with
multiple ":after" pseudo-selectors can be exploited to corrupt memory
and potentially execute arbitrary code. 
34) An error in WebKit when handling the "src" attribute of a frame
element can be exploited to facilitate cross-site scripting attacks. 
35) A use-after-free error in WebKit when handling drag and drop
operations can be exploited to potentially execute arbitrary code. 
36) An error in the implementation of the JavaScript "execCommand"
function can be exploited to modify the contents of the clipboard. 
37) An error when handling malformed URLs can be exploited to bypass
the same-origin policy and execute arbitrary script code in the
context of a different domain. 
38) A use-after-free error in WebKit when handling DOM "Range"
objects can be exploited to potentially execute arbitrary code. 
39) A use-after-free error in WebKit when handling the
"Node.normalize()" method can be exploited to potentially execute
arbitrary code. 
40) A use-after-free error in WebKit when rendering HTML document
subtrees can be exploited to potentially execute arbitrary code. 
41) An error in WebKit when handling HTML content in "textarea"
elements can be exploited to conduct cross-site scripting attacks. 
42) An error in WebKit when visiting a website which redirects form
submissions to a redirecting website can be exploited disclose
submitted data. 
43) A type checking error in WebKit when handling text nodes can be
exploited to potentially execute arbitrary code. 
44) A use-after-free error in WebKit when handling fonts can be
exploited to potentially execute arbitrary code. 
45) An error in WebKit when handling HTML tables can be exploited to
trigger an out-of-bounds memory access and potentially execute
arbitrary code. 
46) An error in WebKit when handling the CSS ":visited" pseudo-class
can be exploited to disclose visited websites. 
SOLUTION:
Update to version 4.1 (available only for Mac OS X v10.4 systems) or
upgrade to version 5.0. 
PROVIDED AND/OR DISCOVERED BY:
37) Michal Zalewski
The vendor also credits:
1) Chris Evans of the Google Security Team, and Andrzej Dyjak
2) Abhishek Arya of Google
3) Borja Marcos of Sarenet
4) Eric Seidel of Google
5) Paul Stone of Context Information Security
6) Masahiro Yamada
8) Matthieu Bonetti of Vupen
9) Ralf Philipp Weinmann working with TippingPoint's Zero Day
Initiative
10, 41) Eduardo Vela Nava (sirdarckcat) of Google
11) Michal Zalewski of Google
12) Gianni "gf3" Chiappetta of Runlevel6
13, 15, 16, 18, 19, 20, 21, 23, 43) wushi of team509, working with
TippingPoint's Zero Day Initiative
14) wushi and Z of team509, working with TippingPoint's Zero Day
Initiative
17) regenrecht working with iDefense
22, 31) Aki Helin of OUSPG
24) Ojan Vafai of Google
25) Colin Percival of Tarsnap
28) Dave Bowker
30) Mark Dowd of Azimuth Security
32) Chris Evans of Google
33, 45) wushi of team509
34) Sergey Glazunov
35) kuzzcc, and Skylined of Google Chrome Security Team
38) Yaar Schnitman of Google
39) Mark Dowd
40) James Robinson of Google
42) Marc Worrell of WhatWebWhat
ORIGINAL ADVISORY:
Apple:
http://support.apple.com/kb/HT4196
Michal Zalewski:
http://lcamtuf.blogspot.com/2010/06/safari-tale-of-betrayal-and-revenge.html
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
 _______________________________________________________________________
 Mandriva Linux Security Advisory                         MDVSA-2011:039
 http://www.mandriva.com/security/
 _______________________________________________________________________
 Package : webkit
 Date    : March 2, 2011
 Affected: 2010.1
 _______________________________________________________________________
 Problem Description:
 Multiple cross-site scripting, denial of service and arbitrary code
 execution security flaws were discovered in webkit. 
 
 Please consult the CVE web links for further information. 
 _______________________________________________________________________
 References:
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2797
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2841
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0046
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0047
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0048
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0049
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0050
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0051
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0052
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0053
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0054
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0314
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0647
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0650
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0651
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0656
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1386
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1387
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1389
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1390
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1391
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1392
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1393
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1394
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1395
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1396
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1397
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1398
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1400
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1401
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1402
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1403
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1404
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1405
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1406
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1407
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1408
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1409
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1410
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1412
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1414
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1415
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1416
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1417
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1418
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1419
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1421
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1422
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1501
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1664
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1665
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1758
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1759
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1760
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1761
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1762
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1764
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1766
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1767
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1770
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1771
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1772
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1773
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1774
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1780
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1781
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1782
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1783
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1784
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1785
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1786
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1787
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1788
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1790
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1791
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1792
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1793
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1807
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1812
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1814
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1815
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2264
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2647
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2648
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3113
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3114
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3115
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3116
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3119
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3248
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3255
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3257
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3259
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3812
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3813
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4040
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4197
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4198
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4204
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4206
 _______________________________________________________________________
 Updated Packages:
 Mandriva Linux 2010.1:
 141f3cd181b875d1bb40b67a507b6db1  2010.1/i586/libwebkitgtk1.0_2-1.2.7-0.1mdv2010.2.i586.rpm
 054886a3c645b3ce710b9b9daec1d5f9  2010.1/i586/libwebkitgtk1.0-devel-1.2.7-0.1mdv2010.2.i586.rpm
 bef556ca3f281f6ef4086292c3b658d2  2010.1/i586/webkit1.0-1.2.7-0.1mdv2010.2.i586.rpm
 a1ff7ac638646aeb64e3bbdca9bc945d  2010.1/i586/webkit1.0-webinspector-1.2.7-0.1mdv2010.2.i586.rpm
 3f40e3ebc62bad67097a9e102e0e79c2  2010.1/i586/webkit-1.2.7-0.1mdv2010.2.i586.rpm
 50875cf1bc8718cedce1a45dc509b44b  2010.1/i586/webkit-gtklauncher-1.2.7-0.1mdv2010.2.i586.rpm
 625d27780d1cc9edb935d4ac3521ae16  2010.1/i586/webkit-jsc-1.2.7-0.1mdv2010.2.i586.rpm 
 8d02c28d8f21a022130be4c49f9d27be  2010.1/SRPMS/webkit-1.2.7-0.1mdv2010.2.src.rpm
 Mandriva Linux 2010.1/X86_64:
 5ce57cd6ab823f8084030033c7c230d7  2010.1/x86_64/lib64webkitgtk1.0_2-1.2.7-0.1mdv2010.2.x86_64.rpm
 690d8718a97af93f58de3bb2357fbe9b  2010.1/x86_64/lib64webkitgtk1.0-devel-1.2.7-0.1mdv2010.2.x86_64.rpm
 7cc1d4aa77e1901ccc92f27faf85c9ea  2010.1/x86_64/webkit1.0-1.2.7-0.1mdv2010.2.x86_64.rpm
 2b77a77159529c55f64343aba98c15d9  2010.1/x86_64/webkit1.0-webinspector-1.2.7-0.1mdv2010.2.x86_64.rpm
 475cf83c5ddd8f6809c2c73a1f5a71d1  2010.1/x86_64/webkit-1.2.7-0.1mdv2010.2.x86_64.rpm
 b0f1c76107c3d54241daa7e61bfb29a9  2010.1/x86_64/webkit-gtklauncher-1.2.7-0.1mdv2010.2.x86_64.rpm
 97deff5e94a625a79842b4c240b0b00d  2010.1/x86_64/webkit-jsc-1.2.7-0.1mdv2010.2.x86_64.rpm 
 8d02c28d8f21a022130be4c49f9d27be  2010.1/SRPMS/webkit-1.2.7-0.1mdv2010.2.src.rpm
 _______________________________________________________________________
 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you. 
 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:
  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
 You can view other update advisories for Mandriva Linux at:
  http://www.mandriva.com/security/advisories
 If you want to report vulnerabilities, please contact
  security_(at)_mandriva.com
 _______________________________________________________________________
 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFNbgbemqjQ0CJFipgRAs9YAJ92z2WSC2ijj34b/wr42OIYLtv65gCg7XgL
Yv/ButpYAcXsmnJWUG4ayxQ=
=GRM6
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it. 
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
. ----------------------------------------------------------------------
Windows Applications Insecure Library Loading
The Official, Verified Secunia List:
http://secunia.com/advisories/windows_insecure_library_loading/
The list is continuously updated as we confirm the vulnerability reports so check back regularly too see if any of your apps are affected. Some
have an unknown impact and others can be exploited by malicious
people to bypass certain security restrictions, disclose sensitive
information, or compromise a user's system. 
For more information:
SA37931
SA40105
4) One unspecified vulnerability with an unknown impact has been
reported in WebKit included in iTunes. No further information is
currently available. 
5) Two vulnerabilities in WebKit can be exploited by malicious people
to compromise a user's system. 
For more information see vulnerability #14 and 15 in:
SA40257
SOLUTION:
Update to version 9.2. 
PROVIDED AND/OR DISCOVERED BY:
1) The vendor credits Chris Evans of the Google Security Team and
Andrzej Dyjak. 
2) The vendor credits Kevin Finisterre, digitalmunition.com. 
4) Reported by the vendor. ----------------------------------------------------------------------
Secure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM)
                        
| VAR-201006-1241 | CVE-2010-1404 | Apple Safari of WebKit Vulnerable to arbitrary code execution | CVSS V2: 9.3 CVSS V3: - Severity: HIGH | 
                            Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an SVG document that contains recursive Use elements, which are not properly handled during page deconstruction. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple's Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within how the WebKit library handles recursively defined Use elements. Upon expanding the target of the use element within the tree, the application will create a dual-reference of a Use element. Upon page deconstruction the application will destroy the single reference and then attempt to destroy the second one that is currently occupying the recently freed memory. Successful exploitation can lead to code execution under the context of the application. Failed exploit attempts will result in a denial-of-service condition. 
NOTE: This issue was previously covered in BID 40620 (Apple Safari Prior to 5.0 and 4.1 Multiple Security Vulnerabilities) but has been given its own record to better document it. Apple Apple Safari is a web browser developed by Apple (Apple), and is the default browser included with Mac OS X and iOS operating systems. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
 _______________________________________________________________________
 Mandriva Linux Security Advisory                         MDVSA-2011:039
 http://www.mandriva.com/security/
 _______________________________________________________________________
 Package : webkit
 Date    : March 2, 2011
 Affected: 2010.1
 _______________________________________________________________________
 Problem Description:
 Multiple cross-site scripting, denial of service and arbitrary code
 execution security flaws were discovered in webkit. 
 
 Please consult the CVE web links for further information. 
 
 The updated packages have been upgraded to the latest version (1.2.7)
 to correct these issues. 
 _______________________________________________________________________
 References:
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2797
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2841
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0046
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0047
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0048
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0049
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0050
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0051
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0052
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0053
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0054
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0314
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0647
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0650
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0651
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0656
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1386
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1387
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1389
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1390
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1391
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1392
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1393
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1394
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1395
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1396
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1397
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1398
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1400
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1401
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1402
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1403
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1404
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1405
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1406
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1407
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1408
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1409
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1410
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1412
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1414
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1415
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1416
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1417
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1418
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1419
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1421
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1422
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1501
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1664
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1665
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1758
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1759
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1760
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1761
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1762
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1764
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1766
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1767
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1770
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1771
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1772
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1773
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1774
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1780
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1781
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1782
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1783
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1784
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1785
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1786
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1787
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1788
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1790
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1791
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1792
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1793
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1807
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1812
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1814
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1815
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2264
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2647
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2648
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3113
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3114
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3115
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3116
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3119
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3248
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3255
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3257
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3259
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3812
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3813
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4040
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4197
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4198
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4204
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4206
 _______________________________________________________________________
 Updated Packages:
 Mandriva Linux 2010.1:
 141f3cd181b875d1bb40b67a507b6db1  2010.1/i586/libwebkitgtk1.0_2-1.2.7-0.1mdv2010.2.i586.rpm
 054886a3c645b3ce710b9b9daec1d5f9  2010.1/i586/libwebkitgtk1.0-devel-1.2.7-0.1mdv2010.2.i586.rpm
 bef556ca3f281f6ef4086292c3b658d2  2010.1/i586/webkit1.0-1.2.7-0.1mdv2010.2.i586.rpm
 a1ff7ac638646aeb64e3bbdca9bc945d  2010.1/i586/webkit1.0-webinspector-1.2.7-0.1mdv2010.2.i586.rpm
 3f40e3ebc62bad67097a9e102e0e79c2  2010.1/i586/webkit-1.2.7-0.1mdv2010.2.i586.rpm
 50875cf1bc8718cedce1a45dc509b44b  2010.1/i586/webkit-gtklauncher-1.2.7-0.1mdv2010.2.i586.rpm
 625d27780d1cc9edb935d4ac3521ae16  2010.1/i586/webkit-jsc-1.2.7-0.1mdv2010.2.i586.rpm 
 8d02c28d8f21a022130be4c49f9d27be  2010.1/SRPMS/webkit-1.2.7-0.1mdv2010.2.src.rpm
 Mandriva Linux 2010.1/X86_64:
 5ce57cd6ab823f8084030033c7c230d7  2010.1/x86_64/lib64webkitgtk1.0_2-1.2.7-0.1mdv2010.2.x86_64.rpm
 690d8718a97af93f58de3bb2357fbe9b  2010.1/x86_64/lib64webkitgtk1.0-devel-1.2.7-0.1mdv2010.2.x86_64.rpm
 7cc1d4aa77e1901ccc92f27faf85c9ea  2010.1/x86_64/webkit1.0-1.2.7-0.1mdv2010.2.x86_64.rpm
 2b77a77159529c55f64343aba98c15d9  2010.1/x86_64/webkit1.0-webinspector-1.2.7-0.1mdv2010.2.x86_64.rpm
 475cf83c5ddd8f6809c2c73a1f5a71d1  2010.1/x86_64/webkit-1.2.7-0.1mdv2010.2.x86_64.rpm
 b0f1c76107c3d54241daa7e61bfb29a9  2010.1/x86_64/webkit-gtklauncher-1.2.7-0.1mdv2010.2.x86_64.rpm
 97deff5e94a625a79842b4c240b0b00d  2010.1/x86_64/webkit-jsc-1.2.7-0.1mdv2010.2.x86_64.rpm 
 8d02c28d8f21a022130be4c49f9d27be  2010.1/SRPMS/webkit-1.2.7-0.1mdv2010.2.src.rpm
 _______________________________________________________________________
 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you. 
 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:
  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
 You can view other update advisories for Mandriva Linux at:
  http://www.mandriva.com/security/advisories
 If you want to report vulnerabilities, please contact
  security_(at)_mandriva.com
 _______________________________________________________________________
 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFNbgbemqjQ0CJFipgRAs9YAJ92z2WSC2ijj34b/wr42OIYLtv65gCg7XgL
Yv/ButpYAcXsmnJWUG4ayxQ=
=GRM6
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it. 
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
. ZDI-10-096: Apple Webkit Recursive Use Element Remote Code Execution Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-10-096
June 8, 2010
-- CVE ID:
CVE-2010-1404
-- Affected Vendors:
Apple
-- Affected Products:
Apple WebKit
-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability by Digital Vaccine protection filter ID 9849. 
-- Vendor Response:
Apple has issued an update to correct this vulnerability. More
details can be found at:
http://support.apple.com/kb/HT4196
-- Disclosure Timeline:
2010-02-23 - Vulnerability reported to vendor
2010-06-08 - Coordinated public release of advisory
-- Credit:
This vulnerability was discovered by:
    * wushi of team509
-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents 
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities. 
Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:
    http://www.zerodayinitiative.com
The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product. 
Our vulnerability disclosure policy is available online at:
    http://www.zerodayinitiative.com/advisories/disclosure_policy/
Follow the ZDI on Twitter:
    http://twitter.com/thezdi
                        
