First published: Wed May 26 2010(Updated: )
An off by one memory corruption issue exists in WebSocketHandshake::readServerHandshake(). This issue is addressed by improved bounds checking. References: Bugzilla: <a href="https://bugs.webkit.org/show_bug.cgi?id=36339">https://bugs.webkit.org/show_bug.cgi?id=36339</a> Trac: <a href="http://trac.webkit.org/changeset/56380">http://trac.webkit.org/changeset/56380</a> Acknowledgements: Red Hat would like to thank Drew Yao of Apple Product Security for responsibly reporting this issue. Upstream acknowledges Skylined of Google Chrome Security Team as the original reporter.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
WebKit | <=r56379 | |
Qt | <=4.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1766 has a medium severity rating due to its potential for memory corruption.
To fix CVE-2010-1766, update your WebKit or Qt installation to the latest version that is not affected by this vulnerability.
CVE-2010-1766 affects WebKit up to version r56379 and Qt up to version 4.6.2.
CVE-2010-1766 is classified as an off-by-one memory corruption vulnerability.
No specific workaround exists for CVE-2010-1766; updating the software is the recommended solution.