First published: Fri Sep 24 2010(Updated: )
Use-after-free vulnerability in WebKit before r65958, as used in Google Chrome before 6.0.472.59, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger use of document APIs such as document.close during parsing, as demonstrated by a Cascading Style Sheets (CSS) file referencing an invalid SVG font, aka rdar problem 8442098.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome (Trace Event) | <6.0.472.59 | |
iTunes | <10.5 | |
Apple Mobile Safari | <5.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1823 has a medium severity rating due to the potential denial of service and unspecified impacts it can cause.
To fix CVE-2010-1823, update Google Chrome to version 6.0.472.59 or later, iTunes to version 10.5 or later, and Apple Mobile Safari to version 5.0.6 or later.
CVE-2010-1823 affects Google Chrome versions prior to 6.0.472.59, iTunes versions prior to 10.5, and Apple Mobile Safari versions prior to 5.0.6.
A use-after-free vulnerability, such as CVE-2010-1823, occurs when a program continues to use a memory reference after it has been freed, potentially allowing attackers to manipulate program execution.
CVE-2010-1823 is specifically noted for causing denial of service but does not explicitly mention remote code execution as a consequence.