First published: Fri Mar 11 2011(Updated: )
Integer overflow in WebKit, as used on the Research In Motion (RIM) BlackBerry Torch 9800 with firmware 6.0.0.246, in Google Chrome before 10.0.648.133, and in Apple Safari before 5.0.5, allows remote attackers to execute arbitrary code via unknown vectors related to CSS "style handling," nodesets, and a length value, as demonstrated by Vincenzo Iozzo, Willem Pinckaers, and Ralf-Philipp Weinmann during a Pwn2Own competition at CanSecWest 2011.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WebKit | ||
BlackBerry Torch 9800 Firmware | =6.0.0.246 | |
RIM BlackBerry Torch 9800 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1290 has a critical severity level due to its potential to allow remote attackers to execute arbitrary code.
To mitigate the vulnerabilities associated with CVE-2011-1290, ensure all affected browsers and firmware versions are updated to the latest secure versions.
CVE-2011-1290 affects Apple's WebKit, RIM's BlackBerry Torch 9800 running firmware 6.0.0.246, and versions of Google Chrome prior to 10.0.648.133.
CVE-2011-1290 can be exploited to execute arbitrary code, making it a vector for remote code execution attacks.
While CVE-2011-1290 was reported over a decade ago, its relevance may persist in legacy systems using outdated software.