First published: Fri Jul 30 2010(Updated: )
WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4; and webkitgtk before 1.2.6; allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted regular expression.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Safari | <=5.0 | |
Safari | =4.0 | |
Safari | =4.0.0b | |
Safari | =4.0.1 | |
Safari | =4.0.2 | |
Safari | =4.0.3 | |
Safari | =4.0.4 | |
Safari | =4.0.5 | |
WebKit | ||
Apple iOS and macOS | =10.5 | |
Apple iOS and macOS | =10.5.0 | |
Apple iOS and macOS | =10.5.1 | |
Apple iOS and macOS | =10.5.2 | |
Apple iOS and macOS | =10.5.3 | |
Apple iOS and macOS | =10.5.4 | |
Apple iOS and macOS | =10.5.5 | |
Apple iOS and macOS | =10.5.6 | |
Apple iOS and macOS | =10.5.7 | |
Apple iOS and macOS | =10.5.8 | |
Apple iOS and macOS | =10.6.0 | |
Apple iOS and macOS | =10.6.1 | |
Apple iOS and macOS | =10.6.2 | |
Apple iOS and macOS | =10.6.3 | |
Apple iOS and macOS | =10.6.4 | |
Apple iOS and macOS | =10.5 | |
Apple iOS and macOS | =10.5.0 | |
Apple iOS and macOS | =10.5.1 | |
Apple iOS and macOS | =10.5.2 | |
Apple iOS and macOS | =10.5.3 | |
Apple iOS and macOS | =10.5.4 | |
Apple iOS and macOS | =10.5.5 | |
Apple iOS and macOS | =10.5.6 | |
Apple iOS and macOS | =10.5.7 | |
Apple iOS and macOS | =10.5.8 | |
Apple iOS and macOS | =10.6.0 | |
Apple iOS and macOS | =10.6.1 | |
Apple iOS and macOS | =10.6.2 | |
Apple iOS and macOS | =10.6.3 | |
Apple iOS and macOS | =10.6.4 | |
Microsoft Windows 7 | ||
Microsoft Windows Vista | ||
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 | |
Safari | <=4.1 | |
Apple iOS and macOS | =10.4 | |
Apple iOS and macOS | =10.4.0 | |
Apple iOS and macOS | =10.4.1 | |
Apple iOS and macOS | =10.4.2 | |
Apple iOS and macOS | =10.4.3 | |
Apple iOS and macOS | =10.4.4 | |
Apple iOS and macOS | =10.4.5 | |
Apple iOS and macOS | =10.4.6 | |
Apple iOS and macOS | =10.4.7 | |
Apple iOS and macOS | =10.4.8 | |
Apple iOS and macOS | =10.4.9 | |
Apple iOS and macOS | =10.4.10 | |
Apple iOS and macOS | =10.4.11 | |
Apple iOS and macOS | =10.4 | |
Apple iOS and macOS | =10.4.0 | |
Apple iOS and macOS | =10.4.1 | |
Apple iOS and macOS | =10.4.2 | |
Apple iOS and macOS | =10.4.3 | |
Apple iOS and macOS | =10.4.4 | |
Apple iOS and macOS | =10.4.5 | |
Apple iOS and macOS | =10.4.6 | |
Apple iOS and macOS | =10.4.7 | |
Apple iOS and macOS | =10.4.8 | |
Apple iOS and macOS | =10.4.9 | |
Apple iOS and macOS | =10.4.10 | |
Apple iOS and macOS | =10.4.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1792 has a high severity level due to its potential to allow remote attackers to execute arbitrary code.
To fix CVE-2010-1792, update your Apple Safari browser or WebKit to versions that are not vulnerable, specifically Safari 5.0.1 or later and WebKitGTK 1.2.6 or later.
Affected versions of Safari include versions prior to 5.0.1 on Mac OS X and prior to 4.1.1 on Windows.
CVE-2010-1792 can lead to arbitrary code execution or denial of service through memory corruption.
A temporary workaround for CVE-2010-1792 is to avoid opening untrusted websites in Safari until an update is applied.