CVE-2011-1290
Webkit CSS Text Element Count Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Integer overflow in WebKit, as used on the Research In Motion (RIM) BlackBerry Torch 9800 with firmware 6.0.0.246, in Google Chrome before 10.0.648.133, and in Apple Safari before 5.0.5, allows remote attackers to execute arbitrary code via unknown vectors related to CSS "style handling," nodesets, and a length value, as demonstrated by Vincenzo Iozzo, Willem Pinckaers, and Ralf-Philipp Weinmann during a Pwn2Own competition at CanSecWest 2011.
Un desbordamiento de enteros en WebKit, tal y como es usado en el BlackBerry Torch 9800 de Research In Motion (RIM) con versión de firmware 6.0.0.246, en Google Chrome anterior a versión 10.0.648.133 y en Apple Safari anterior a versión 5.0.5, permite a los atacantes remotos ejecutar código arbitrario por medio de vectores desconocidos relacionados a el "style handling," de CSS, los ajustes de nodos y un valor de longitud, como es demostrado por Vincenzo Iozzo, Willem Pinckaers y Ralf-Philipp Weinmann durante una competencia de Pwn2Own en CanSecWest 2011.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the WebKit library's implementation of a CSS style. When totaling the length of it's string elements, the library will store the result into a 32bit integer. This value will be used for an allocation and then later will be used to initialize the allocated buffer. Due to the number of elements being totaled being variable, this will allow an aggressor to provide as many elements as necessary in order to cause the integer value to wrap causing an under-allocation. Initialization of this data will then cause a heap-based buffer overflow. This can lead to code execution under the context of the application.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-03-06 CVE Reserved
- 2011-03-11 CVE Published
- 2024-03-27 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-189: Numeric Errors
CAPEC
References (25)
URL | Tag | Source |
---|---|---|
http://dvlabs.tippingpoint.com/blog/2011/02/02/pwn2own-2011 | X_refsource_misc | |
http://googlechromereleases.blogspot.com/2011/03/stable-and-beta-channel-updates.html | X_refsource_confirm | |
http://osvdb.org/71182 | Vdb Entry | |
http://support.apple.com/kb/HT4596 | X_refsource_confirm | |
http://support.apple.com/kb/HT4607 | X_refsource_confirm | |
http://www.blackberry.com/btsc/KB26132 | X_refsource_confirm | |
http://www.securityfocus.com/archive/1/517513/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/46849 | Vdb Entry | |
http://www.securitytracker.com/id?1025212 | Vdb Entry | |
http://www.vupen.com/english/advisories/2011/0671 | Vdb Entry | |
http://www.zdnet.com/blog/security/pwn2own-2011-blackberry-falls-to-webkit-browser-attack/8401 | X_refsource_misc | |
http://www.zerodayinitiative.com/advisories/ZDI-11-104 | X_refsource_misc | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/66052 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.apple.com/archives/security-announce/2011//Apr/msg00000.html | 2018-10-09 | |
http://lists.apple.com/archives/security-announce/2011//Apr/msg00001.html | 2018-10-09 | |
http://lists.apple.com/archives/security-announce/2011//Apr/msg00002.html | 2018-10-09 | |
http://secunia.com/advisories/43735 | 2018-10-09 | |
http://secunia.com/advisories/43748 | 2018-10-09 | |
http://secunia.com/advisories/43782 | 2018-10-09 | |
http://secunia.com/advisories/44151 | 2018-10-09 | |
http://secunia.com/advisories/44154 | 2018-10-09 | |
http://www.debian.org/security/2011/dsa-2192 | 2018-10-09 | |
http://www.vupen.com/english/advisories/2011/0645 | 2018-10-09 | |
http://www.vupen.com/english/advisories/2011/0654 | 2018-10-09 | |
http://www.vupen.com/english/advisories/2011/0984 | 2018-10-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apple Search vendor "Apple" | Webkit Search vendor "Apple" for product "Webkit" | * | - |
Affected
| in | Rim Search vendor "Rim" | Blackberry Torch 9800 Search vendor "Rim" for product "Blackberry Torch 9800" | * | - |
Affected
|
Rim Search vendor "Rim" | Blackberry Torch 9800 Firmware Search vendor "Rim" for product "Blackberry Torch 9800 Firmware" | 6.0.0.246 Search vendor "Rim" for product "Blackberry Torch 9800 Firmware" and version "6.0.0.246" | - |
Affected
| in | Rim Search vendor "Rim" | Blackberry Torch 9800 Search vendor "Rim" for product "Blackberry Torch 9800" | * | - |
Affected
|