HTTP: Apple Safari Webkit Button First-Letter Style Rendering Code Execution

This signature detects attempts to exploit a known code execution vulnerability in Apple's Safari Webkit. It is due to a use after free error when processing "first-letter" CSS style. A remote attacker can exploit this by enticing a user to open a maliciously crafted file on a target system. A successful attack can result in arbitrary code execution with the privileges of the targeted user.

Extended Description

WebKit is prone to a remote code-execution vulnerability due to a use-after-free error. An attacker can exploit this issue by enticing an unsuspecting victim into viewing a malicious webpage. Successful exploits may allow the attacker to execute arbitrary code in the context of the application. Failed exploit attempts will result in a denial-of-service condition. NOTE: This issue was previously covered in BID 40620 (Apple Safari Prior to 5.0 and 4.1 Multiple Security Vulnerabilities) but has been given its own record to better document it.

Affected Products

Apple ipod_touch,Apple safari

Short Name
HTTP:STC:SAFARI:WEBKIT-1ST-LTR
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Apple Button CVE-2010-1392 Code Execution First-Letter Rendering Safari Style Webkit bid:40644
Release Date
09/28/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Webkit_open_source_project

Suse

Apple

Pardus

Ubuntu

Mandriva

CVSS Score

9.3

Found a potential security threat?