First published: Fri Sep 10 2010(Updated: )
Use-after-free vulnerability in Apple Safari 4.x before 4.1.2 and 5.x before 5.0.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via run-in styling in an element, related to object pointers.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mobile Safari | =4.0.2 | |
Apple Mobile Safari | =4.0.1 | |
Apple Mobile Safari | =5.0.1 | |
Apple Mobile Safari | =4.0.5 | |
Apple Mobile Safari | =4.0.3 | |
Apple Mobile Safari | =4.1 | |
Apple Mobile Safari | =4.0 | |
Apple Mobile Safari | =4.0.0b | |
Apple Mobile Safari | =4.0.4 | |
Apple Mobile Safari | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1806 has a critical severity level as it allows remote attackers to execute arbitrary code.
To mitigate CVE-2010-1806, users should update Apple Safari to version 4.1.2 or higher, or 5.0.2 and above.
CVE-2010-1806 affects Apple Safari versions 4.x before 4.1.2 and 5.x before 5.0.2.
CVE-2010-1806 can lead to arbitrary code execution or a denial of service attack causing the application to crash.
A use-after-free vulnerability like CVE-2010-1806 occurs when a program continues to use a pointer after the memory it points to has been freed, potentially allowing an attacker to manipulate the program's execution.