CVE-2011-3897
WebKit ContentEditable swapInNode Use-After-Free Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Use-after-free vulnerability in Google Chrome before 15.0.874.120 allows user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to editing.
Vulnerabilidad de uso después de liberación en Google Chrome anteriores a v15.0.874.120 permite al atacante remoto asistido por el usario provocar una denegación de servicio o posiblemente tener un impacto no especificado a través de vectores relacionados con la edición.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the WebKit library. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists when the library attempts to replace a particular element due to an HTML5 ContentEditable command. Due to the library not accommodating for DOM mutation events that can be made to occur, an aggressor can modify the tree out from underneath the library, leading to a type change. This can be used to trigger a use-after-free condition at which point can lead to code execution under the context of the application.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-10-01 CVE Reserved
- 2011-11-11 CVE Published
- 2024-08-06 CVE Updated
- 2024-11-27 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-416: Use After Free
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://code.google.com/p/chromium/issues/detail?id=102242 | X_refsource_confirm | |
http://googlechromereleases.blogspot.com/2011/11/stable-channel-update.html | X_refsource_confirm | |
http://secunia.com/advisories/46933 | Third Party Advisory | |
http://secunia.com/advisories/48274 | Third Party Advisory | |
http://secunia.com/advisories/48288 | Third Party Advisory | |
http://secunia.com/advisories/48377 | Third Party Advisory | |
http://www.securitytracker.com/id?1026774 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/73806 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14250 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Google Search vendor "Google" | Chrome Search vendor "Google" for product "Chrome" | < 15.0.874.120 Search vendor "Google" for product "Chrome" and version " < 15.0.874.120" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Itunes Search vendor "Apple" for product "Itunes" | < 10.6 Search vendor "Apple" for product "Itunes" and version " < 10.6" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Safari Search vendor "Apple" for product "Safari" | < 5.1.4 Search vendor "Apple" for product "Safari" and version " < 5.1.4" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Iphone Os Search vendor "Apple" for product "Iphone Os" | < 5.1 Search vendor "Apple" for product "Iphone Os" and version " < 5.1" | - |
Affected
|