First published: Thu Jun 17 2010(Updated: )
Cross-site scripting (XSS) vulnerability in the WEBrick HTTP server in Ruby in Apple Mac OS X 10.5.8, and 10.6 before 10.6.4, allows remote attackers to inject arbitrary web script or HTML via a crafted URI that triggers a UTF-7 error page.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS and macOS | =10.5.8 | |
Apple macOS Server | =10.5.8 | |
Apple macOS Server | =10.6.3 | |
Apple iOS and macOS | =10.6.3 | |
Apple macOS Server | =10.6.1 | |
Apple macOS Server | =10.6.2 | |
Apple iOS and macOS | =10.6.1 | |
Apple macOS Server | =10.6.0 | |
Apple iOS and macOS | =10.6.0 | |
Apple iOS and macOS | =10.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0541 is considered a moderate severity vulnerability due to its potential for cross-site scripting exploits.
To fix CVE-2010-0541, upgrade to Mac OS X 10.6.4 or later as Apple has released a patch addressing this vulnerability.
CVE-2010-0541 affects Apple Mac OS X versions 10.5.8 and 10.6.x prior to 10.6.4.
Yes, CVE-2010-0541 can be exploited remotely by sending a crafted URI that triggers an error page.
CVE-2010-0541 is categorized as a cross-site scripting (XSS) vulnerability.