Advisory Details

June 8th, 2010

Apple Webkit Attribute Child Removal Remote Code Execution Vulnerability

ZDI-10-091
ZDI-CAN-762

CVE ID CVE-2010-1119
CVSS SCORE 10.0, AV:N/AC:L/Au:N/C:C/I:C/A:C
AFFECTED VENDORS Apple
AFFECTED PRODUCTS WebKit
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['9853']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute remote code on vulnerable installations of Apple Webkit. User interaction is required in that a target must be coerced into visiting a malicious page.

The specific flaw exists within Webkit's process for destructing attribute objects via the removeChild method. If an attribute's child object is accessed after the attribute was removed from the document, an invalid pointer is referenced. This can be exploited by an attacker to execute remote code under the context of the user running the browser.

ADDITIONAL DETAILS Apple has issued an update to correct this vulnerability. More details can be found at:
http://support.apple.com/kb/HT4196
DISCLOSURE TIMELINE
  • 2010-03-26 - Vulnerability reported to vendor
  • 2010-06-08 - Coordinated public release of advisory
CREDIT Ralf Philipp Weinmann
Vincenzo Iozzo
BACK TO ADVISORIES