First published: Fri Jun 11 2010(Updated: )
WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, Apple Safari before 4.1 on Mac OS X 10.4, and Google Chrome before 5.0.375.70 does not properly handle a transformation of a text node that has the IBM1147 character set, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document containing a BR element, related to a "type checking issue."
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome | <5.0.375.70 | |
Canonical Ubuntu Linux | =10.10 | |
Canonical Ubuntu Linux | =10.04 | |
Canonical Ubuntu Linux | =9.10 | |
openSUSE openSUSE | =11.2 | |
openSUSE openSUSE | =11.3 | |
SUSE SUSE Linux Enterprise Server | =11-sp1 | |
SUSE SUSE Linux Enterprise Desktop | =11-sp1 | |
SUSE SUSE Linux Enterprise Server | =10-sp3 | |
Canonical Ubuntu Linux | =10.04.4 | |
SUSE SUSE Linux Enterprise Desktop | =10-sp3 | |
Apple Safari | <=4.0.5 | |
Apple Webkit | ||
Apple Mac OS X | =10.5 | |
Apple Mac OS X | =10.5.0 | |
Apple Mac OS X | =10.5.1 | |
Apple Mac OS X | =10.5.2 | |
Apple Mac OS X | =10.5.3 | |
Apple Mac OS X | =10.5.4 | |
Apple Mac OS X | =10.5.5 | |
Apple Mac OS X | =10.5.6 | |
Apple Mac OS X | =10.5.7 | |
Apple Mac OS X | =10.5.8 | |
Apple Mac OS X | =10.6.0 | |
Apple Mac OS X | =10.6.1 | |
Apple Mac OS X | =10.6.2 | |
Apple Mac OS X | =10.6.3 | |
Apple Mac OS X Server | =10.5 | |
Apple Mac OS X Server | =10.5.0 | |
Apple Mac OS X Server | =10.5.1 | |
Apple Mac OS X Server | =10.5.2 | |
Apple Mac OS X Server | =10.5.3 | |
Apple Mac OS X Server | =10.5.4 | |
Apple Mac OS X Server | =10.5.5 | |
Apple Mac OS X Server | =10.5.6 | |
Apple Mac OS X Server | =10.5.7 | |
Apple Mac OS X Server | =10.5.8 | |
Apple Mac OS X Server | =10.6.0 | |
Apple Mac OS X Server | =10.6.1 | |
Apple Mac OS X Server | =10.6.2 | |
Apple Mac OS X Server | =10.6.3 | |
Microsoft Windows 7 | ||
Microsoft Windows Vista | ||
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 | |
Apple Mac OS X | =10.4 | |
Apple Mac OS X | =10.4.0 | |
Apple Mac OS X | =10.4.1 | |
Apple Mac OS X | =10.4.2 | |
Apple Mac OS X | =10.4.3 | |
Apple Mac OS X | =10.4.4 | |
Apple Mac OS X | =10.4.5 | |
Apple Mac OS X | =10.4.6 | |
Apple Mac OS X | =10.4.7 | |
Apple Mac OS X | =10.4.8 | |
Apple Mac OS X | =10.4.9 | |
Apple Mac OS X | =10.4.10 | |
Apple Mac OS X | =10.4.11 | |
Apple Mac OS X Server | =10.4 | |
Apple Mac OS X Server | =10.4.0 | |
Apple Mac OS X Server | =10.4.1 | |
Apple Mac OS X Server | =10.4.2 | |
Apple Mac OS X Server | =10.4.3 | |
Apple Mac OS X Server | =10.4.4 | |
Apple Mac OS X Server | =10.4.5 | |
Apple Mac OS X Server | =10.4.6 | |
Apple Mac OS X Server | =10.4.7 | |
Apple Mac OS X Server | =10.4.8 | |
Apple Mac OS X Server | =10.4.9 | |
Apple Mac OS X Server | =10.4.10 | |
Apple Mac OS X Server | =10.4.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.