First published: Fri Mar 12 2010(Updated: )
Use-after-free vulnerability in WebKit in Apple Safari before 4.0.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via HTML elements with right-to-left (RTL) text directionality.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Safari | =4.0.2 | |
Safari | =4.0.1 | |
Safari | <=4.0.4 | |
Safari | =4.0-beta | |
Safari | =4.0.3 | |
Safari | =4.0 | |
Safari | =4.0.0b | |
<=4.0.4 | ||
=4.0 | ||
=4.0-beta | ||
=4.0.0b | ||
=4.0.1 | ||
=4.0.2 | ||
=4.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0049 is considered a high-severity vulnerability due to its potential to allow remote code execution.
To fix CVE-2010-0049, update your Apple Safari browser to version 4.0.5 or later.
Affected versions include Safari 4.0.4 and earlier, including 4.0.3, 4.0.2, 4.0.1, and 4.0.0 beta.
Exploiting CVE-2010-0049 can lead to arbitrary code execution or a denial of service causing the application to crash.
Yes, CVE-2010-0049 is a known vulnerability that has been documented and assigned a CVE identifier.