First published: Wed Jun 10 2009(Updated: )
Use-after-free vulnerability in the JavaScript DOM implementation in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by destroying a document.body element that has an unspecified XML container with elements that support the dir attribute.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Safari | =3.0.4b | |
Apple Safari | =2.0.3-417.9.3 | |
Apple Safari | =3.0.4 | |
Apple Safari | =3.0.1-beta | |
Apple Safari | =2.0.1 | |
Apple Safari | =2.0.3 | |
Apple Safari | =2.0.2 | |
Apple Safari | =3.0.0 | |
Apple Safari | =3.0.1 | |
Apple Safari | =3.0.2 | |
Apple Safari | <=3.2.2 | |
Apple Safari | =3.0.3b | |
Apple Safari | =3.1.1 | |
Apple Safari | =2.0.3-417.9 | |
Apple Safari | =2.0.3-417.9.2 | |
Apple Safari | =3.0.3 | |
Apple Safari | =2.0 | |
Apple Safari | =2.0.3-417.8 | |
Apple Safari | =3.1.2 | |
Apple Safari | =3.1.0b | |
Apple Safari | =3.1.0 | |
Apple Safari | =2.0.4 | |
Apple Safari | =3.0.0b | |
Apple Safari | =2.0.0 | |
Apple Safari | =3.2.0 | |
Apple Safari | =3.0.2b | |
Apple Safari | =3.0.1b | |
Apple Safari | =3.2.1 | |
Apple Safari | =3.0 | |
Apple iPhone OS | =1.0.0 | |
Apple iPhone OS | =1.0.1 | |
Apple iPhone OS | =1.0.2 | |
Apple iPhone OS | =1.1.0 | |
Apple iPhone OS | =1.1.1 | |
Apple iPhone OS | =1.1.2 | |
Apple iPhone OS | =1.1.3 | |
Apple iPhone OS | =1.1.4 | |
Apple iPhone OS | =1.1.5 | |
Apple iPhone OS | =2.0 | |
Apple iPhone OS | =2.0.0 | |
Apple iPhone OS | =2.0.1 | |
Apple iPhone OS | =2.0.2 | |
Apple iPhone OS | =2.1 | |
Apple iPhone OS | =2.1.1 | |
Apple iPhone OS | =2.2 | |
Apple iPhone OS | =2.2.1 | |
Apple iPod touch | ||
Apple iPhone OS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.