First published: Thu Aug 26 2010(Updated: )
An input validation issue exists in WebKit's handling of floating point data types. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved validation of floating point values. Credit to Luke Wagner of Mozilla for reporting this issue. References: <a href="https://bugs.webkit.org/show_bug.cgi?id=43461">https://bugs.webkit.org/show_bug.cgi?id=43461</a> <a href="http://trac.webkit.org/changeset/64706">http://trac.webkit.org/changeset/64706</a>
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Safari | =4.0.2 | |
Apple Safari | =4.0.1 | |
Apple Safari | =4.0.5 | |
Apple Safari | =4.0-beta | |
Apple Safari | =4.0.3 | |
Apple Safari | =4.1.1 | |
Apple Safari | =4.1 | |
Apple Safari | =4.0 | |
Apple Safari | =4.0.0b | |
Apple Safari | =4.0.4 | |
Apple Safari | =5.0.1 | |
Apple Safari | =5.0 | |
Google Android | <=2.1 | |
Google Android | =1.0 | |
Google Android | =1.6 | |
Google Android | =2.0 | |
Google Android | =1.5 | |
Google Android | =1.1 | |
WebKitGTK WebKitGTK | =1.2.3 | |
WebKitGTK WebKitGTK | =1.2.0 | |
WebKitGTK WebKitGTK | =1.2.2 | |
WebKitGTK WebKitGTK | <=1.2.5 | |
WebKitGTK WebKitGTK | =1.2.4 | |
WebKitGTK WebKitGTK | =1.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.