Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:STC:SAFARI:CONT-EDITABLE

Severity

High

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

Apple Safari Webkit Option Element ContentEditable Code Execution

Release Date

2010/10/04

Update Number

1784

Supported Platforms

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Apple Safari Webkit Option Element ContentEditable Code Execution


This signature detects attempts to exploit a known vulnerability in Apple Safari Webkit. It is due to the way the application removes a particular container element containing another element with a specific attribute. Remote attackers can exploit this by enticing the target user to open a maliciously crafted Web page. Successful exploitation can result in execution of arbitrary code within the security context of the current user.

Extended Description

WebKit is prone to a remote code-execution vulnerability. Successful exploits may allow the attacker to execute arbitrary code in the context of the application. Failed exploit attempts will result in a denial-of-service condition. NOTE: This issue was previously covered in BID 40620 (Apple Safari Prior to 5.0 and 4.1 Multiple Security Vulnerabilities) but has been given its own record to better document it.

Affected Products

  • Apple iPhone 2.0
  • Apple iPhone 2.0.1
  • Apple iPhone 2.0.2
  • Apple iPhone 2.1
  • Apple iPhone 2.2
  • Apple iPhone 2.2.1
  • Apple iPhone 3.0
  • Apple iPhone 3.0.1
  • Apple iPhone 3.1
  • Apple iPhone 3.1.2
  • Apple iPhone 3.1.3
  • Apple iPod Touch 2.0
  • Apple iPod Touch 2.0.1
  • Apple iPod Touch 2.0.2
  • Apple iPod Touch 2.1
  • Apple iPod Touch 2.2
  • Apple iPod Touch 2.2.1
  • Apple iPod Touch 3.0
  • Apple iPod Touch 3.1.1
  • Apple iPod Touch 3.1.2
  • Apple iPod Touch 3.1.3
  • Apple iTunes 8.0
  • Apple iTunes 8.0.2.20
  • Apple iTunes 8.1
  • Apple iTunes 8.2
  • Apple iTunes 9.0.0
  • Apple iTunes 9.0.1
  • Apple iTunes 9.0.1.8
  • Apple iTunes 9.0.2
  • Apple iTunes 9.1
  • Apple Safari 4
  • Apple Safari 4.0.1
  • Apple Safari 4.0.2
  • Apple Safari 4.0.2 For Windows
  • Apple Safari 4.0.3
  • Apple Safari 4.0.3 For Windows
  • Apple Safari 4.0.4
  • Apple Safari 4.0.4 For Windows
  • Apple Safari 4.0.5
  • Apple Safari 4.0.5 For Windows
  • Apple Safari 4 Beta
  • Apple Safari 4 For Windows
  • Mandriva Linux Mandrake 2010.1
  • Mandriva Linux Mandrake 2010.1 X86 64
  • Pardus Linux 2009
  • Ubuntu Ubuntu Linux 10.04 Amd64
  • Ubuntu Ubuntu Linux 10.04 I386
  • Ubuntu Ubuntu Linux 10.04 Powerpc
  • Ubuntu Ubuntu Linux 10.04 Sparc
  • Ubuntu Ubuntu Linux 10.10 amd64
  • Ubuntu Ubuntu Linux 10.10 i386
  • Ubuntu Ubuntu Linux 10.10 powerpc
  • Ubuntu Ubuntu Linux 9.10 Amd64
  • Ubuntu Ubuntu Linux 9.10 I386
  • Ubuntu Ubuntu Linux 9.10 Lpia
  • Ubuntu Ubuntu Linux 9.10 Powerpc
  • Ubuntu Ubuntu Linux 9.10 Sparc
  • WebKit Open Source Project WebKit 1.2.2
  • WebKit Open Source Project WebKit 1.2.2-1
  • WebKit Open Source Project WebKit 1.2.3
  • WebKit Open Source Project WebKit R38566
  • WebKit Open Source Project WebKit R51295
  • WebKit Open Source Project WebKit R52401
  • WebKit Open Source Project WebKit R52833
  • WebKit Open Source Project WebKit

References

  • BugTraq: 40647
  • CVE: CVE-2010-1396
  • URL: http://support.apple.com/kb/HT4196

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out