First published: Fri Sep 10 2010(Updated: )
Untrusted search path vulnerability in Apple Safari 4.x before 4.1.2 and 5.x before 5.0.2 on Windows allows local users to gain privileges via a Trojan horse explorer.exe (aka Windows Explorer) program in a directory containing a file that had been downloaded by Safari.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mobile Safari | =4.0 | |
Apple Mobile Safari | =4.0.0b | |
Apple Mobile Safari | =4.0.1 | |
Apple Mobile Safari | =4.0.2 | |
Apple Mobile Safari | =4.0.3 | |
Apple Mobile Safari | =4.0.4 | |
Apple Mobile Safari | =4.0.5 | |
Apple Mobile Safari | =4.1 | |
Apple Mobile Safari | =5.0 | |
Apple Mobile Safari | =5.0.1 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1805 is categorized as a medium severity vulnerability that can lead to privilege escalation.
To fix CVE-2010-1805, update Apple Safari to version 4.1.2 or later, or 5.0.2 or later.
CVE-2010-1805 affects users running Apple Safari versions 4.x before 4.1.2 and 5.x before 5.0.2 on Windows.
CVE-2010-1805 is an untrusted search path vulnerability allowing local users to execute malicious programs.
Mitigating CVE-2010-1805 without updating Safari is not recommended due to the nature of the vulnerability and associated risks.