HTTP: Apple Safari and Google Chrome Webkit Object Outline Memory Corruption

This signature detects attempts to exploit a known memory corruption vulnerability in Webkit, the HTML rendering engine used in Apple's Safari and Google's Chrome Web browser. It is due to memory corruption during the rendering of HTML object outlines. This can be exploited by enticing a user to open a specially crafted Web page. A successful attack can result in memory corruption which can crash the browser or could lead to arbitrary code execution.

Extended Description

Webkit is prone to a memory-corruption vulnerability. An attacker can exploit this issue by tricking an unsuspecting victim into viewing a web page containing malicious content. Successfully exploiting these issues may allow attackers to crash the affected application or execute arbitrary code. This issue affects the following: iOS 2.0 through 4.0.2 for iPhone 3G and later iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later Versions prior to Apple Safari 4.1.2 and 5.0.2 Versions prior to Google Chrome 5.0.375.125 NOTE: This issue was previously discussed in BID 43070 (Apple iPhone/iPod touch Prior to iOS 4.1 Multiple Vulnerabilities) but has been given its own record to better document it.

Affected Products

Apple ipod_touch,Google chrome

References

BugTraq: 43078

CVE: CVE-2010-1813

Short Name
HTTP:STC:CHROME:WEBKIT-OO
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Apple CVE-2010-1813 Chrome Corruption Google Memory Object Outline Safari Webkit and bid:43078
Release Date
12/30/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3339
False Positive
Unknown
Vendors

Google

Apple

CVSS Score

6.8

Found a potential security threat?