First published: Thu Nov 18 2010(Updated: )
Common Vulnerabilities and Exposures assigned an identifier <a href="https://access.redhat.com/security/cve/CVE-2010-3813">CVE-2010-3813</a> to the following vulnerability: Name: <a href="https://access.redhat.com/security/cve/CVE-2010-3813">CVE-2010-3813</a> Status: Candidate URL: <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3813">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3813</a> Assigned: 20101007 Reference: CONFIRM:<a href="http://support.apple.com/kb/HT4455">http://support.apple.com/kb/HT4455</a> Reference: CONFIRM:<a href="http://support.apple.com/kb/HT4456">http://support.apple.com/kb/HT4456</a> WebKit in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4, allows remote attackers to bypass the DNS prefetching setting via an HTML LINK element, as demonstrated by an HTML e-mail message that uses a LINK element for X-Confirm-Reading-To functionality. Upstream: Bugzilla: <a href="https://bugs.webkit.org/show_bug.cgi?id=42500">https://bugs.webkit.org/show_bug.cgi?id=42500</a> Trac: <a href="http://trac.webkit.org/changeset/63622">http://trac.webkit.org/changeset/63622</a> This is fixed in webkitgtk 1.2.6
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/webkitgtk | <0:1.2.6-2.el6_0 | 0:1.2.6-2.el6_0 |
Apple Safari | <=5.0.2 | |
Apple Safari | =5.0 | |
Apple Safari | =5.0.1 | |
Apple Webkit | ||
Apple Mac OS X | =10.5 | |
Apple Mac OS X | =10.5.0 | |
Apple Mac OS X | =10.5.1 | |
Apple Mac OS X | =10.5.2 | |
Apple Mac OS X | =10.5.3 | |
Apple Mac OS X | =10.5.4 | |
Apple Mac OS X | =10.5.5 | |
Apple Mac OS X | =10.5.6 | |
Apple Mac OS X | =10.5.7 | |
Apple Mac OS X | =10.5.8 | |
Apple Mac OS X | =10.6.0 | |
Apple Mac OS X | =10.6.1 | |
Apple Mac OS X | =10.6.2 | |
Apple Mac OS X | =10.6.3 | |
Apple Mac OS X | =10.6.4 | |
Apple Mac OS X | =10.6.5 | |
Apple Mac OS X Server | =10.5 | |
Apple Mac OS X Server | =10.5.0 | |
Apple Mac OS X Server | =10.5.1 | |
Apple Mac OS X Server | =10.5.2 | |
Apple Mac OS X Server | =10.5.3 | |
Apple Mac OS X Server | =10.5.4 | |
Apple Mac OS X Server | =10.5.5 | |
Apple Mac OS X Server | =10.5.6 | |
Apple Mac OS X Server | =10.5.7 | |
Apple Mac OS X Server | =10.5.8 | |
Apple Mac OS X Server | =10.6.0 | |
Apple Mac OS X Server | =10.6.1 | |
Apple Mac OS X Server | =10.6.2 | |
Apple Mac OS X Server | =10.6.3 | |
Apple Mac OS X Server | =10.6.4 | |
Apple Mac OS X Server | =10.6.5 | |
Microsoft Windows 7 | ||
Microsoft Windows Vista | ||
Microsoft Windows XP | =sp2 | |
Apple Safari | <=4.1.2 | |
Apple Safari | =1.0 | |
Apple Safari | =1.0-beta | |
Apple Safari | =1.0-beta2 | |
Apple Safari | =1.0.0 | |
Apple Safari | =1.0.0b1 | |
Apple Safari | =1.0.0b2 | |
Apple Safari | =1.0.1 | |
Apple Safari | =1.0.2 | |
Apple Safari | =1.0.3 | |
Apple Safari | =1.0.3-85.8 | |
Apple Safari | =1.0.3-85.8.1 | |
Apple Safari | =1.1 | |
Apple Safari | =1.1.0 | |
Apple Safari | =1.1.1 | |
Apple Safari | =1.2 | |
Apple Safari | =1.2.0 | |
Apple Safari | =1.2.1 | |
Apple Safari | =1.2.2 | |
Apple Safari | =1.2.3 | |
Apple Safari | =1.2.4 | |
Apple Safari | =1.2.5 | |
Apple Safari | =1.3 | |
Apple Safari | =1.3.0 | |
Apple Safari | =1.3.1 | |
Apple Safari | =1.3.2 | |
Apple Safari | =1.3.2-312.5 | |
Apple Safari | =1.3.2-312.6 | |
Apple Safari | =2 | |
Apple Safari | =2.0 | |
Apple Safari | =2.0.0 | |
Apple Safari | =2.0.1 | |
Apple Safari | =2.0.2 | |
Apple Safari | =2.0.3 | |
Apple Safari | =2.0.3-417.8 | |
Apple Safari | =2.0.3-417.9 | |
Apple Safari | =2.0.3-417.9.2 | |
Apple Safari | =2.0.3-417.9.3 | |
Apple Safari | =2.0.4 | |
Apple Safari | =3 | |
Apple Safari | =3.0 | |
Apple Safari | =3.0.0 | |
Apple Safari | =3.0.0b | |
Apple Safari | =3.0.1 | |
Apple Safari | =3.0.1b | |
Apple Safari | =3.0.2 | |
Apple Safari | =3.0.2b | |
Apple Safari | =3.0.3 | |
Apple Safari | =3.0.3b | |
Apple Safari | =3.0.4 | |
Apple Safari | =3.0.4b | |
Apple Safari | =3.1.0 | |
Apple Safari | =3.1.0b | |
Apple Safari | =3.1.1 | |
Apple Safari | =3.1.2 | |
Apple Safari | =3.2.0 | |
Apple Safari | =3.2.1 | |
Apple Safari | =3.2.2 | |
Apple Safari | =4.1 | |
Apple Safari | =4.1.1 | |
Apple Mac OS X | =10.4 | |
Apple Mac OS X | =10.4.0 | |
Apple Mac OS X | =10.4.1 | |
Apple Mac OS X | =10.4.2 | |
Apple Mac OS X | =10.4.3 | |
Apple Mac OS X | =10.4.4 | |
Apple Mac OS X | =10.4.5 | |
Apple Mac OS X | =10.4.6 | |
Apple Mac OS X | =10.4.7 | |
Apple Mac OS X | =10.4.8 | |
Apple Mac OS X | =10.4.9 | |
Apple Mac OS X | =10.4.10 | |
Apple Mac OS X | =10.4.11 | |
Apple Mac OS X Server | =10.4 | |
Apple Mac OS X Server | =10.4.0 | |
Apple Mac OS X Server | =10.4.1 | |
Apple Mac OS X Server | =10.4.2 | |
Apple Mac OS X Server | =10.4.3 | |
Apple Mac OS X Server | =10.4.4 | |
Apple Mac OS X Server | =10.4.5 | |
Apple Mac OS X Server | =10.4.6 | |
Apple Mac OS X Server | =10.4.7 | |
Apple Mac OS X Server | =10.4.8 | |
Apple Mac OS X Server | =10.4.9 | |
Apple Mac OS X Server | =10.4.10 | |
Apple Mac OS X Server | =10.4.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.