First published: Thu Aug 26 2010(Updated: )
An input validation issue exists in WebKit's handling of floating point data types. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved validation of floating point values. Credit to Luke Wagner of Mozilla for reporting this issue. References: <a href="https://bugs.webkit.org/show_bug.cgi?id=43461">https://bugs.webkit.org/show_bug.cgi?id=43461</a> <a href="http://trac.webkit.org/changeset/64706">http://trac.webkit.org/changeset/64706</a>
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mobile Safari | =4.0.2 | |
Apple Mobile Safari | =4.0.1 | |
Apple Mobile Safari | =4.0.5 | |
Apple Mobile Safari | =4.0-beta | |
Apple Mobile Safari | =4.0.3 | |
Apple Mobile Safari | =4.1.1 | |
Apple Mobile Safari | =4.1 | |
Apple Mobile Safari | =4.0 | |
Apple Mobile Safari | =4.0.0b | |
Apple Mobile Safari | =4.0.4 | |
Apple Mobile Safari | =5.0.1 | |
Apple Mobile Safari | =5.0 | |
Android | <=2.1 | |
Android | =1.0 | |
Android | =1.6 | |
Android | =2.0 | |
Android | =1.5 | |
Android | =1.1 | |
WebKitGTK+ | =1.2.3 | |
WebKitGTK+ | =1.2.0 | |
WebKitGTK+ | =1.2.2 | |
WebKitGTK+ | <=1.2.5 | |
WebKitGTK+ | =1.2.4 | |
WebKitGTK+ | =1.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1807 has been classified as a high severity vulnerability due to its potential to cause application termination or arbitrary code execution.
To address CVE-2010-1807, users should update to the latest version of affected software, which includes improved validation of floating point values.
CVE-2010-1807 affects multiple versions of Apple Safari, Google Android, and WebKitGTK+, including several 4.x versions of Safari.
CVE-2010-1807 is an input validation vulnerability specifically related to the handling of floating point data types in WebKit.
Yes, CVE-2010-1807 can be exploited remotely by visiting a maliciously crafted website.