var-201103-0294
Vulnerability from variot
Integer overflow in WebKit, as used on the Research In Motion (RIM) BlackBerry Torch 9800 with firmware 6.0.0.246, in Google Chrome before 10.0.648.133, and in Apple Safari before 5.0.5, allows remote attackers to execute arbitrary code via unknown vectors related to CSS "style handling," nodesets, and a length value, as demonstrated by Vincenzo Iozzo, Willem Pinckaers, and Ralf-Philipp Weinmann during a Pwn2Own competition at CanSecWest 2011. WebKit Is CSS There is a flaw in the handling of styles, node sets, and length values that could allow arbitrary code execution.Skillfully crafted by a third party Web Through the site, you may get important information on the heap memory address. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the WebKit library's implementation of a CSS style. When totaling the length of it's string elements, the library will store the result into a 32bit integer. This value will be used for an allocation and then later will be used to initialize the allocated buffer. Due to the number of elements being totaled being variable, this will allow an aggressor to provide as many elements as necessary in order to cause the integer value to wrap causing an under-allocation. Initialization of this data will then cause a heap-based buffer overflow. This can lead to code execution under the context of the application. WebKit is prone to a memory-corruption vulnerability. An attacker can exploit this issue by enticing an unsuspecting victim to view a malicious webpage. Failed exploit attempts will result in a denial-of-service condition. NOTE: This issue was previously discussed in BID 46833 (Blackberry Browser Multiple Unspecified Information Disclosure and Integer Overflow Vulnerabilities), but has been given its own record to better document it. Google Chrome is a web browser developed by Google (Google). This vulnerability has been demonstrated by Vincenzo Iozzo, Willem Pinckaers and Ralf-Philipp Weinmann in the Pwn2Own hacking contest at CanSecWest 2011. ZDI-11-104: (Pwn2Own) Webkit CSS Text Element Count Remote Code Execution Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-11-104
April 14, 2011
-- CVE ID: CVE-2011-1290
-- CVSS: 9, (AV:N/AC:L/Au:N/C:P/I:P/A:C)
-- Affected Vendors: WebKit
-- Affected Products: WebKit WebKit
-- TippingPoint(TM) IPS Customer Protection: TippingPoint IPS customers have been protected against this vulnerability by Digital Vaccine protection filter ID 11087.
-- Vendor Response: Apple patch on April 14, 2011: http://support.apple.com/kb/HT4606 http://support.apple.com/kb/HT4607 http://support.apple.com/kb/HT4596
-- Disclosure Timeline: 2011-03-31 - Vulnerability reported to vendor 2011-04-14 - Coordinated public release of advisory
-- Credit: This vulnerability was discovered by: * Anonymous * Vincenzo Iozzo, Willem Pinckaers, and Ralf-Philipp Weinmann
-- About the Zero Day Initiative (ZDI): Established by TippingPoint, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities.
Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at:
http://www.zerodayinitiative.com
The ZDI is unique in how the acquired vulnerability information is used. TippingPoint does not re-sell the vulnerability details or any exploit code. Instead, upon notifying the affected product vendor, TippingPoint provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, TippingPoint provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product.
Our vulnerability disclosure policy is available online at:
http://www.zerodayinitiative.com/advisories/disclosure_policy/
Follow the ZDI on Twitter:
http://twitter.com/thezdi
. Gents,
If you are a lucky BlackBerry owner, or an administrator of many BB devices, you can do a quick security check of your smartphone(s), by browsing this web page from your device (free quick check):
http://tehtris.com/bbcheck
For now, this will check for you if you are potentially vulnerable against those exploits:
-> Nov 2007 - US-CERT Advisory VU#282856 - Exploit from Michael Kemp http://www.blackberry.com/btsc/KB12577
-> Jan 2011 - CVE-2010-2599 - Exploit found by TEHTRI-Security http://www.blackberry.com/btsc/KB24841
-> Mar 2011 - CVE-2011-1290 - Awesome Pwn2own/CSW exploit from Vincenzo Iozzo, Ralf Philipp Weinmann, and Willem Pinckaers
A workaround for this latest vulnerability (CVE-2011-1290) could be to disable JavaScript, as explained on RIM resources.
You should definitely read this: http://www.blackberry.com/btsc/KB26132
Have a nice day,
Laurent OUDOT, CEO TEHTRI-Security -- "This is not a game" http://www.tehtri-security.com/ Follow us: @tehtris
=> Join us for more hacking tricks during next awesome events:
-
SyScan Singapore (April) -- Training: "Advanced PHP Hacking" http://www.syscan.org/index.php/sg/training
-
HITB Amsterdam (May) -- Training: "Hunting Web Attackers" http://conference.hackinthebox.org/hitbsecconf2011ams/?page_id=16 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA-2192-1 security@debian.org http://www.debian.org/security/ Giuseppe Iuculano March 15, 2011 http://www.debian.org/security/faq
Package : chromium-browser Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2011-0779 CVE-2011-1290
Several vulnerabilities were discovered in the Chromium browser. The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2011-0779
Google Chrome before 9.0.597.84 does not properly handle a missing key in an extension, which allows remote attackers to cause a denial of service (application crash) via a crafted extension.
For the stable distribution (squeeze), these problems have been fixed in version 6.0.472.63~r59945-5+squeeze4
For the testing distribution (wheezy), these problems will be fixed soon.
For the unstable distribution (sid), these problems have been fixed version 10.0.648.133~r77742-1
We recommend that you upgrade your chromium-browser packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux)
iEYEARECAAYFAk1/lHMACgkQNxpp46476ao/EwCdFThT2dtAQ9HB8yza9Z4gIqV4 FeIAn3zISoa/86EhpLs5qjhMB9gQ6Oc0 =QJZP -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201103-0294", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "itunes", "scope": "eq", "trust": 1.1, "vendor": "apple", "version": "10" }, { "model": "webkit", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "*" }, { "model": "blackberry torch 9800", "scope": "eq", "trust": 1.0, "vendor": "rim", "version": "6.0.0.246" }, { "model": "blackberry torch 9800", "scope": "eq", "trust": 1.0, "vendor": "rim", "version": "*" }, { "model": "device software", "scope": "eq", "trust": 0.8, "vendor": "blackberry", "version": "6.0 and later" }, { "model": "chrome", "scope": "lt", "trust": 0.8, "vendor": "google", "version": "10.0.648.133" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.5.8" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.5.8" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "3.0 to 4.3.1 (iphone 3gs after )" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "3.1 to 4.3.1 (ipod touch (3rd generation) after )" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "3.2 to 4.3.1 (ipad for )" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "4.2.5 to 4.2.6 (iphone 4 (cdma))" }, { "model": "ipad", "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": "iphone", "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": "ipod touch", "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": "safari", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "5" }, { "model": "webkit", "scope": null, "trust": 0.7, "vendor": "webkit", "version": null }, { "model": "webkit", "scope": null, "trust": 0.6, "vendor": "apple", "version": null }, { "model": "in motion blackberry torch", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "98000" }, { "model": "in motion blackberry style", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "96700" }, { "model": "in motion blackberry pearl", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "91000" }, { "model": "in motion blackberry pearl", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "81000" }, { "model": "in motion blackberry device software", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "6.0" }, { "model": "in motion blackberry curve", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "93000" }, { "model": "in motion blackberry curve", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "83000" }, { "model": "in motion blackberry browser", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "0" }, { "model": "in motion blackberry", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "97800" }, { "model": "in motion blackberry", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "97005.0.0.593" }, { "model": "in motion blackberry", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "88004.2" }, { "model": "in motion blackberry", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "88004.1" }, { "model": "in motion blackberry", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "88000" }, { "model": "in motion blackberry", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "87204.2" }, { "model": "in motion blackberry", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "87204.1" }, { "model": "in motion blackberry 8700r", "scope": null, "trust": 0.3, "vendor": "research", "version": null }, { "model": "in motion blackberry 8700f", "scope": null, "trust": 0.3, "vendor": "research", "version": null }, { "model": "in motion blackberry 8700c", "scope": null, "trust": 0.3, "vendor": "research", "version": null }, { "model": "in motion blackberry", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "83204.2" }, { "model": "in motion blackberry", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "83204.1" }, { "model": "in motion blackberry", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "7780" }, { "model": "in motion blackberry", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "7750" }, { "model": "in motion blackberry", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "7730" }, { "model": "in motion blackberry", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "7520" }, { "model": "in motion blackberry", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "7290" }, { "model": "in motion blackberry", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "7280" }, { "model": "in motion blackberry", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "72700" }, { "model": "in motion blackberry", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "7250" }, { "model": "in motion blackberry", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "72304.0" }, { "model": "in motion blackberry", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "72303.8" }, { "model": "in motion blackberry", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "72303.7.1.41" }, { "model": "in motion blackberry 7130e", "scope": null, "trust": 0.3, "vendor": "research", "version": null }, { "model": "in motion blackberry 7105t", "scope": null, "trust": 0.3, "vendor": "research", "version": null }, { "model": "in motion blackberry", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "7100x" }, { "model": "in motion blackberry", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "7100v" }, { "model": "in motion blackberry 7100t", "scope": null, "trust": 0.3, "vendor": "research", "version": null }, { "model": "in motion blackberry 7100r", "scope": null, "trust": 0.3, "vendor": "research", "version": null }, { "model": "in motion blackberry 7100i", "scope": null, "trust": 0.3, "vendor": "research", "version": null }, { "model": "in motion blackberry 7100g", "scope": null, "trust": 0.3, "vendor": "research", "version": null }, { "model": "in motion blackberry", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "9700" }, { "model": "in motion blackberry", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "9650" }, { "model": "in motion blackberry", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "8530" }, { "model": "in motion blackberry", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "8520" }, { "model": "in motion blackberry", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "8330" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.94" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.84" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.107" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.128" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.127" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux armel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1.2" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.5" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.5" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.4" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.4" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.3" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.1" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.4" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.4" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.3" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.2" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.1" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1" }, { "model": "safari beta", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4" }, { "model": "safari beta", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4" }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "10.2" }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "10.1" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "ipad", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.6" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.5" }, { "model": "ios beta", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0" }, { "model": "chrome", "scope": "ne", "trust": 0.3, "vendor": "google", "version": "10.0.648.133" }, { "model": "safari for windows", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "5.0.5" }, { "model": "safari", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "5.0.5" }, { "model": "itunes", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "10.2.2" }, { "model": "ios", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "4.3.2" }, { "model": "ios", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "4.2.7" } ], "sources": [ { "db": "ZDI", "id": "ZDI-11-104" }, { "db": "BID", "id": "46849" }, { "db": "JVNDB", "id": "JVNDB-2011-001530" }, { "db": "CNNVD", "id": "CNNVD-201103-180" }, { "db": "NVD", "id": "CVE-2011-1290" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:rim:blackberry_torch_9800_firmware:6.0.0.246:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:rim:blackberry_torch_9800:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2011-1290" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "AnonymousVincenzo Iozzo, Willem Pinckaers, and Ralf-Philipp Weinmann", "sources": [ { "db": "ZDI", "id": "ZDI-11-104" } ], "trust": 0.7 }, "cve": "CVE-2011-1290", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2011-1290", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "ZDI", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2011-1290", "impactScore": 8.5, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.7, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-49235", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2011-1290", "trust": 1.8, "value": "HIGH" }, { "author": "ZDI", "id": "CVE-2011-1290", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201103-180", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-49235", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-11-104" }, { "db": "VULHUB", "id": "VHN-49235" }, { "db": "JVNDB", "id": "JVNDB-2011-001530" }, { "db": "CNNVD", "id": "CNNVD-201103-180" }, { "db": "NVD", "id": "CVE-2011-1290" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Integer overflow in WebKit, as used on the Research In Motion (RIM) BlackBerry Torch 9800 with firmware 6.0.0.246, in Google Chrome before 10.0.648.133, and in Apple Safari before 5.0.5, allows remote attackers to execute arbitrary code via unknown vectors related to CSS \"style handling,\" nodesets, and a length value, as demonstrated by Vincenzo Iozzo, Willem Pinckaers, and Ralf-Philipp Weinmann during a Pwn2Own competition at CanSecWest 2011. WebKit Is CSS There is a flaw in the handling of styles, node sets, and length values that could allow arbitrary code execution.Skillfully crafted by a third party Web Through the site, you may get important information on the heap memory address. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the WebKit library\u0027s implementation of a CSS style. When totaling the length of it\u0027s string elements, the library will store the result into a 32bit integer. This value will be used for an allocation and then later will be used to initialize the allocated buffer. Due to the number of elements being totaled being variable, this will allow an aggressor to provide as many elements as necessary in order to cause the integer value to wrap causing an under-allocation. Initialization of this data will then cause a heap-based buffer overflow. This can lead to code execution under the context of the application. WebKit is prone to a memory-corruption vulnerability. \nAn attacker can exploit this issue by enticing an unsuspecting victim to view a malicious webpage. Failed exploit attempts will result in a denial-of-service condition. \nNOTE: This issue was previously discussed in BID 46833 (Blackberry Browser Multiple Unspecified Information Disclosure and Integer Overflow Vulnerabilities), but has been given its own record to better document it. Google Chrome is a web browser developed by Google (Google). This vulnerability has been demonstrated by Vincenzo Iozzo, Willem Pinckaers and Ralf-Philipp Weinmann in the Pwn2Own hacking contest at CanSecWest 2011. ZDI-11-104: (Pwn2Own) Webkit CSS Text Element Count Remote Code Execution Vulnerability\n\nhttp://www.zerodayinitiative.com/advisories/ZDI-11-104\n\nApril 14, 2011\n\n-- CVE ID:\nCVE-2011-1290\n\n-- CVSS:\n9, (AV:N/AC:L/Au:N/C:P/I:P/A:C)\n\n-- Affected Vendors:\nWebKit\n\n-- Affected Products:\nWebKit WebKit\n\n-- TippingPoint(TM) IPS Customer Protection:\nTippingPoint IPS customers have been protected against this\nvulnerability by Digital Vaccine protection filter ID 11087. \n\n-- Vendor Response:\nApple patch on April 14, 2011:\nhttp://support.apple.com/kb/HT4606\nhttp://support.apple.com/kb/HT4607\nhttp://support.apple.com/kb/HT4596\n\n-- Disclosure Timeline:\n2011-03-31 - Vulnerability reported to vendor\n2011-04-14 - Coordinated public release of advisory\n\n-- Credit:\nThis vulnerability was discovered by:\n * Anonymous\n * Vincenzo Iozzo, Willem Pinckaers, and Ralf-Philipp Weinmann\n\n-- About the Zero Day Initiative (ZDI):\nEstablished by TippingPoint, The Zero Day Initiative (ZDI) represents \na best-of-breed model for rewarding security researchers for responsibly\ndisclosing discovered vulnerabilities. \n\nResearchers interested in getting paid for their security research\nthrough the ZDI can find more information and sign-up at:\n\n http://www.zerodayinitiative.com\n\nThe ZDI is unique in how the acquired vulnerability information is\nused. TippingPoint does not re-sell the vulnerability details or any\nexploit code. Instead, upon notifying the affected product vendor,\nTippingPoint provides its customers with zero day protection through\nits intrusion prevention technology. Explicit details regarding the\nspecifics of the vulnerability are not exposed to any parties until\nan official vendor patch is publicly available. Furthermore, with the\naltruistic aim of helping to secure a broader user base, TippingPoint\nprovides this vulnerability information confidentially to security\nvendors (including competitors) who have a vulnerability protection or\nmitigation product. \n\nOur vulnerability disclosure policy is available online at:\n\n http://www.zerodayinitiative.com/advisories/disclosure_policy/\n\nFollow the ZDI on Twitter:\n\n http://twitter.com/thezdi\n. \nGents,\n\nIf you are a lucky BlackBerry owner, or an administrator of many BB\ndevices, you can do a quick security check of your smartphone(s), by\nbrowsing this web page from your device (free quick check):\n\n http://tehtris.com/bbcheck\n\nFor now, this will check for you if you are potentially vulnerable\nagainst those exploits:\n\n-\u003e Nov 2007 - US-CERT Advisory VU#282856 - Exploit from Michael Kemp\n http://www.blackberry.com/btsc/KB12577\n\n-\u003e Jan 2011 - CVE-2010-2599 - Exploit found by TEHTRI-Security\n http://www.blackberry.com/btsc/KB24841\n\n-\u003e Mar 2011 - CVE-2011-1290 - Awesome Pwn2own/CSW exploit from Vincenzo\nIozzo, Ralf Philipp Weinmann, and Willem Pinckaers\n\nA workaround for this latest vulnerability (CVE-2011-1290) could be to\ndisable JavaScript, as explained on RIM resources. \n\nYou should definitely read this: http://www.blackberry.com/btsc/KB26132\n\nHave a nice day,\n\nLaurent OUDOT, CEO TEHTRI-Security -- \"This is not a game\"\n http://www.tehtri-security.com/\n Follow us: @tehtris\n\n=\u003e Join us for more hacking tricks during next awesome events:\n\n- SyScan Singapore (April) -- Training: \"Advanced PHP Hacking\"\nhttp://www.syscan.org/index.php/sg/training\n\n- HITB Amsterdam (May) -- Training: \"Hunting Web Attackers\"\nhttp://conference.hackinthebox.org/hitbsecconf2011ams/?page_id=16\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-2192-1 security@debian.org\nhttp://www.debian.org/security/ Giuseppe Iuculano\nMarch 15, 2011 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : chromium-browser\nVulnerability : several\nProblem type : remote\nDebian-specific: no\nCVE ID : CVE-2011-0779 CVE-2011-1290\n\n\nSeveral vulnerabilities were discovered in the Chromium browser. \nThe Common Vulnerabilities and Exposures project identifies the\nfollowing problems:\n\nCVE-2011-0779\n\n Google Chrome before 9.0.597.84 does not properly handle a missing key in an\n extension, which allows remote attackers to cause a denial of service\n (application crash) via a crafted extension. \n\n\nFor the stable distribution (squeeze), these problems have been fixed\nin version 6.0.472.63~r59945-5+squeeze4\n\nFor the testing distribution (wheezy), these problems will be fixed soon. \n\nFor the unstable distribution (sid), these problems have been fixed\nversion 10.0.648.133~r77742-1\n\n\nWe recommend that you upgrade your chromium-browser packages. \n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.11 (GNU/Linux)\n\niEYEARECAAYFAk1/lHMACgkQNxpp46476ao/EwCdFThT2dtAQ9HB8yza9Z4gIqV4\nFeIAn3zISoa/86EhpLs5qjhMB9gQ6Oc0\n=QJZP\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2011-1290" }, { "db": "JVNDB", "id": "JVNDB-2011-001530" }, { "db": "ZDI", "id": "ZDI-11-104" }, { "db": "BID", "id": "46849" }, { "db": "VULHUB", "id": "VHN-49235" }, { "db": "PACKETSTORM", "id": "100465" }, { "db": "PACKETSTORM", "id": "99462" }, { "db": "PACKETSTORM", "id": "99354" } ], "trust": 2.88 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-49235", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-49235" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-1290", "trust": 3.8 }, { "db": "ZDI", "id": "ZDI-11-104", "trust": 2.2 }, { "db": "BID", "id": "46849", "trust": 2.2 }, { "db": "SECUNIA", "id": "44154", "trust": 1.9 }, { "db": "SECUNIA", "id": "44151", "trust": 1.9 }, { "db": "SECUNIA", "id": "43748", "trust": 1.9 }, { "db": "SECUNIA", "id": "43735", "trust": 1.9 }, { "db": "VUPEN", "id": "ADV-2011-0654", "trust": 1.9 }, { "db": "VUPEN", "id": "ADV-2011-0984", "trust": 1.9 }, { "db": "VUPEN", "id": "ADV-2011-0645", "trust": 1.9 }, { "db": "SECTRACK", "id": "1025212", "trust": 1.9 }, { "db": "SECUNIA", "id": "43782", "trust": 1.1 }, { "db": "VUPEN", "id": "ADV-2011-0671", "trust": 1.1 }, { "db": "OSVDB", "id": "71182", "trust": 1.1 }, { "db": "XF", "id": "66052", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2011-001530", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-1107", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-201103-180", "trust": 0.7 }, { "db": "NSFOCUS", "id": "16728", "trust": 0.6 }, { "db": "NSFOCUS", "id": "16587", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "100465", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-49235", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "99462", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "99354", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-11-104" }, { "db": "VULHUB", "id": "VHN-49235" }, { "db": "BID", "id": "46849" }, { "db": "JVNDB", "id": "JVNDB-2011-001530" }, { "db": "PACKETSTORM", "id": "100465" }, { "db": "PACKETSTORM", "id": "99462" }, { "db": "PACKETSTORM", "id": "99354" }, { "db": "CNNVD", "id": "CNNVD-201103-180" }, { "db": "NVD", "id": "CVE-2011-1290" } ] }, "id": "VAR-201103-0294", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-49235" } ], "trust": 0.38333333 }, "last_update_date": "2024-07-23T20:56:26.520000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT4596", "trust": 0.8, "url": "http://support.apple.com/kb/ht4596" }, { "title": "HT4606", "trust": 0.8, "url": "http://support.apple.com/kb/ht4606" }, { "title": "HT4607", "trust": 0.8, "url": "http://support.apple.com/kb/ht4607" }, { "title": "HT4609", "trust": 0.8, "url": "http://support.apple.com/kb/ht4609" }, { "title": "HT4607", "trust": 0.8, "url": "http://support.apple.com/kb/ht4607?viewlocale=ja_jp" }, { "title": "HT4609", "trust": 0.8, "url": "http://support.apple.com/kb/ht4609?viewlocale=ja_jp" }, { "title": "HT4596", "trust": 0.8, "url": "http://support.apple.com/kb/ht4596?viewlocale=ja_jp" }, { "title": "HT4606", "trust": 0.8, "url": "http://support.apple.com/kb/ht4606?viewlocale=ja_jp" }, { "title": "Google Chrome", "trust": 0.8, "url": "http://www.google.co.jp/chrome/intl/ja/landing_ff_yt.html?hl=ja\u0026hl=ja" }, { "title": "stable-and-beta-channel-updates", "trust": 0.8, "url": "http://googlechromereleases.blogspot.com/2011/03/stable-and-beta-channel-updates.html" }, { "title": "KB26132", "trust": 0.8, "url": "http://www.blackberry.com/btsc/kb26132" }, { "title": "Apple patch on April 14, 2011: fix:http://trac.webkit.org/changeset/80787http://trac.webkit.org/changeset/82054", "trust": 0.7, "url": "http://support.apple.com/kb/ht4606http://support.apple.com/kb/ht4607http://support.apple.com/kb/ht4596webkit" }, { "title": "WebKit Fixes for digital error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=169944" } ], "sources": [ { "db": "ZDI", "id": "ZDI-11-104" }, { "db": "JVNDB", "id": "JVNDB-2011-001530" }, { "db": "CNNVD", "id": "CNNVD-201103-180" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-189", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-49235" }, { "db": "JVNDB", "id": "JVNDB-2011-001530" }, { "db": "NVD", "id": "CVE-2011-1290" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "http://www.securityfocus.com/bid/46849" }, { "trust": 1.9, "url": "http://www.securitytracker.com/id?1025212" }, { "trust": 1.9, "url": "http://secunia.com/advisories/43735" }, { "trust": 1.9, "url": "http://secunia.com/advisories/43748" }, { "trust": 1.9, "url": "http://secunia.com/advisories/44151" }, { "trust": 1.9, "url": "http://secunia.com/advisories/44154" }, { "trust": 1.9, "url": "http://www.vupen.com/english/advisories/2011/0645" }, { "trust": 1.9, "url": "http://www.vupen.com/english/advisories/2011/0654" }, { "trust": 1.9, "url": "http://www.vupen.com/english/advisories/2011/0984" }, { "trust": 1.7, "url": "http://dvlabs.tippingpoint.com/blog/2011/02/02/pwn2own-2011" }, { "trust": 1.7, "url": "http://www.zdnet.com/blog/security/pwn2own-2011-blackberry-falls-to-webkit-browser-attack/8401" }, { "trust": 1.4, "url": "http://googlechromereleases.blogspot.com/2011/03/stable-and-beta-channel-updates.html" }, { "trust": 1.2, "url": "http://support.apple.com/kb/ht4596" }, { "trust": 1.2, "url": "http://support.apple.com/kb/ht4607" }, { "trust": 1.2, "url": "http://www.blackberry.com/btsc/kb26132" }, { "trust": 1.2, "url": "http://www.zerodayinitiative.com/advisories/zdi-11-104" }, { "trust": 1.1, "url": "http://lists.apple.com/archives/security-announce/2011//apr/msg00000.html" }, { "trust": 1.1, "url": "http://lists.apple.com/archives/security-announce/2011//apr/msg00001.html" }, { "trust": 1.1, "url": "http://lists.apple.com/archives/security-announce/2011//apr/msg00002.html" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/517513/100/0/threaded" }, { "trust": 1.1, "url": "http://www.debian.org/security/2011/dsa-2192" }, { "trust": 1.1, "url": "http://osvdb.org/71182" }, { "trust": 1.1, "url": "http://secunia.com/advisories/43782" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2011/0671" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66052" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1290" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/66052" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu990878" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu658892" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu805814" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu597782" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-1290" }, { "trust": 0.7, "url": "http://support.apple.com/kb/ht4606http://support.apple.com/kb/ht4607http://support.apple.com/kb/ht4596webkit" }, { "trust": 0.7, "url": "http://trac.webkit.org/changeset/80787http://trac.webkit.org/changeset/82054" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/16728" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/16587" }, { "trust": 0.3, "url": "http://www.zerodayinitiative.com/advisories/zdi-11-104/" }, { "trust": 0.3, "url": "http://www.google.com/chrome" }, { "trust": 0.3, "url": "http://threatpost.com/en_us/blogs/iphone-blackberry-fall-second-day-pwn2own-031011" }, { "trust": 0.3, "url": "http://www.rim.net/" }, { "trust": 0.3, "url": "http://www.webkit.org/" }, { "trust": 0.3, "url": "http://lists.apple.com/archives/security-announce/2011/apr/msg00004.html" }, { "trust": 0.3, "url": "http://btsc.webapps.blackberry.com/btsc/search.do?cmd=displaykc\u0026doctype=kc\u0026externalid=kb26132" }, { "trust": 0.3, "url": "http://www.blackberry.com/btsc/dynamickc.do?externalid=kb26132\u0026sliceid=1\u0026command=show\u0026forward=nonthreadedkc\u0026kcid=kb26132" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1290" }, { "trust": 0.1, "url": "http://www.zerodayinitiative.com/advisories/disclosure_policy/" }, { "trust": 0.1, "url": "http://twitter.com/thezdi" }, { "trust": 0.1, "url": "http://www.tippingpoint.com" }, { "trust": 0.1, "url": "http://www.zerodayinitiative.com" }, { "trust": 0.1, "url": "http://support.apple.com/kb/ht4606" }, { "trust": 0.1, "url": "http://www.blackberry.com/btsc/kb24841" }, { "trust": 0.1, "url": "http://www.tehtri-security.com/" }, { "trust": 0.1, "url": "http://www.blackberry.com/btsc/kb12577" }, { "trust": 0.1, "url": "http://conference.hackinthebox.org/hitbsecconf2011ams/?page_id=16" }, { "trust": 0.1, "url": "http://tehtris.com/bbcheck" }, { "trust": 0.1, "url": "http://www.syscan.org/index.php/sg/training" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2599" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0779" } ], "sources": [ { "db": "ZDI", "id": "ZDI-11-104" }, { "db": "VULHUB", "id": "VHN-49235" }, { "db": "BID", "id": "46849" }, { "db": "JVNDB", "id": "JVNDB-2011-001530" }, { "db": "PACKETSTORM", "id": "100465" }, { "db": "PACKETSTORM", "id": "99462" }, { "db": "PACKETSTORM", "id": "99354" }, { "db": "CNNVD", "id": "CNNVD-201103-180" }, { "db": "NVD", "id": "CVE-2011-1290" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-11-104" }, { "db": "VULHUB", "id": "VHN-49235" }, { "db": "BID", "id": "46849" }, { "db": "JVNDB", "id": "JVNDB-2011-001530" }, { "db": "PACKETSTORM", "id": "100465" }, { "db": "PACKETSTORM", "id": "99462" }, { "db": "PACKETSTORM", "id": "99354" }, { "db": "CNNVD", "id": "CNNVD-201103-180" }, { "db": "NVD", "id": "CVE-2011-1290" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-04-14T00:00:00", "db": "ZDI", "id": "ZDI-11-104" }, { "date": "2011-03-11T00:00:00", "db": "VULHUB", "id": "VHN-49235" }, { "date": "2011-03-10T00:00:00", "db": "BID", "id": "46849" }, { "date": "2011-05-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-001530" }, { "date": "2011-04-15T14:14:11", "db": "PACKETSTORM", "id": "100465" }, { "date": "2011-03-18T22:39:32", "db": "PACKETSTORM", "id": "99462" }, { "date": "2011-03-16T02:27:27", "db": "PACKETSTORM", "id": "99354" }, { "date": "2011-03-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201103-180" }, { "date": "2011-03-11T21:57:16.893000", "db": "NVD", "id": "CVE-2011-1290" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-04-14T00:00:00", "db": "ZDI", "id": "ZDI-11-104" }, { "date": "2018-10-09T00:00:00", "db": "VULHUB", "id": "VHN-49235" }, { "date": "2011-10-11T19:10:00", "db": "BID", "id": "46849" }, { "date": "2011-05-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-001530" }, { "date": "2021-11-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201103-180" }, { "date": "2018-10-09T19:30:42.537000", "db": "NVD", "id": "CVE-2011-1290" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "100465" }, { "db": "CNNVD", "id": "CNNVD-201103-180" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WebKit Vulnerable to arbitrary code execution", "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-001530" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "digital error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201103-180" } ], "trust": 0.6 } }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.