CVE-2011-1290 (GCVE-0-2011-1290)
Vulnerability from cvelistv5
Published
2011-03-11 21:00
Modified
2024-08-06 22:21
Severity ?
CWE
  • n/a
Summary
Integer overflow in WebKit, as used on the Research In Motion (RIM) BlackBerry Torch 9800 with firmware 6.0.0.246, in Google Chrome before 10.0.648.133, and in Apple Safari before 5.0.5, allows remote attackers to execute arbitrary code via unknown vectors related to CSS "style handling," nodesets, and a length value, as demonstrated by Vincenzo Iozzo, Willem Pinckaers, and Ralf-Philipp Weinmann during a Pwn2Own competition at CanSecWest 2011.
References
http://www.vupen.com/english/advisories/2011/0654 vdb-entry, x_refsource_VUPEN
http://googlechromereleases.blogspot.com/2011/03/stable-and-beta-channel-updates.html x_refsource_CONFIRM
http://secunia.com/advisories/44151 third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/46849 vdb-entry, x_refsource_BID
http://www.securitytracker.com/id?1025212 vdb-entry, x_refsource_SECTRACK
http://support.apple.com/kb/HT4596 x_refsource_CONFIRM
http://osvdb.org/71182 vdb-entry, x_refsource_OSVDB
http://www.debian.org/security/2011/dsa-2192 vendor-advisory, x_refsource_DEBIAN
http://lists.apple.com/archives/security-announce/2011//Apr/msg00002.html vendor-advisory, x_refsource_APPLE
http://lists.apple.com/archives/security-announce/2011//Apr/msg00001.html vendor-advisory, x_refsource_APPLE
http://www.zerodayinitiative.com/advisories/ZDI-11-104 x_refsource_MISC
http://www.blackberry.com/btsc/KB26132 x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2011/0984 vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2011/0645 vdb-entry, x_refsource_VUPEN
http://dvlabs.tippingpoint.com/blog/2011/02/02/pwn2own-2011 x_refsource_MISC
http://secunia.com/advisories/43782 third-party-advisory, x_refsource_SECUNIA
http://support.apple.com/kb/HT4607 x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2011/0671 vdb-entry, x_refsource_VUPEN
http://lists.apple.com/archives/security-announce/2011//Apr/msg00000.html vendor-advisory, x_refsource_APPLE
http://www.zdnet.com/blog/security/pwn2own-2011-blackberry-falls-to-webkit-browser-attack/8401 x_refsource_MISC
http://secunia.com/advisories/43748 third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/517513/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/44154 third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/66052 vdb-entry, x_refsource_XF
http://secunia.com/advisories/43735 third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:21:34.187Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2011-0654",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0654"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2011/03/stable-and-beta-channel-updates.html"
          },
          {
            "name": "44151",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44151"
          },
          {
            "name": "46849",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/46849"
          },
          {
            "name": "1025212",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025212"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT4596"
          },
          {
            "name": "71182",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/71182"
          },
          {
            "name": "DSA-2192",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2192"
          },
          {
            "name": "APPLE-SA-2011-04-14-3",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2011//Apr/msg00002.html"
          },
          {
            "name": "APPLE-SA-2011-04-14-2",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2011//Apr/msg00001.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-104"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.blackberry.com/btsc/KB26132"
          },
          {
            "name": "ADV-2011-0984",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0984"
          },
          {
            "name": "ADV-2011-0645",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0645"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://dvlabs.tippingpoint.com/blog/2011/02/02/pwn2own-2011"
          },
          {
            "name": "43782",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43782"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT4607"
          },
          {
            "name": "ADV-2011-0671",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0671"
          },
          {
            "name": "APPLE-SA-2011-04-14-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2011//Apr/msg00000.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.zdnet.com/blog/security/pwn2own-2011-blackberry-falls-to-webkit-browser-attack/8401"
          },
          {
            "name": "43748",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43748"
          },
          {
            "name": "20110414 ZDI-11-104: (Pwn2Own) Webkit CSS Text Element Count Remote Code Execution Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/517513/100/0/threaded"
          },
          {
            "name": "44154",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44154"
          },
          {
            "name": "google-webkit-style-code-execution(66052)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66052"
          },
          {
            "name": "43735",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43735"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-03-10T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in WebKit, as used on the Research In Motion (RIM) BlackBerry Torch 9800 with firmware 6.0.0.246, in Google Chrome before 10.0.648.133, and in Apple Safari before 5.0.5, allows remote attackers to execute arbitrary code via unknown vectors related to CSS \"style handling,\" nodesets, and a length value, as demonstrated by Vincenzo Iozzo, Willem Pinckaers, and Ralf-Philipp Weinmann during a Pwn2Own competition at CanSecWest 2011."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-09T18:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2011-0654",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0654"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2011/03/stable-and-beta-channel-updates.html"
        },
        {
          "name": "44151",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44151"
        },
        {
          "name": "46849",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/46849"
        },
        {
          "name": "1025212",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025212"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT4596"
        },
        {
          "name": "71182",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/71182"
        },
        {
          "name": "DSA-2192",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2192"
        },
        {
          "name": "APPLE-SA-2011-04-14-3",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2011//Apr/msg00002.html"
        },
        {
          "name": "APPLE-SA-2011-04-14-2",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2011//Apr/msg00001.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-104"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.blackberry.com/btsc/KB26132"
        },
        {
          "name": "ADV-2011-0984",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0984"
        },
        {
          "name": "ADV-2011-0645",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0645"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://dvlabs.tippingpoint.com/blog/2011/02/02/pwn2own-2011"
        },
        {
          "name": "43782",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43782"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT4607"
        },
        {
          "name": "ADV-2011-0671",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0671"
        },
        {
          "name": "APPLE-SA-2011-04-14-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2011//Apr/msg00000.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.zdnet.com/blog/security/pwn2own-2011-blackberry-falls-to-webkit-browser-attack/8401"
        },
        {
          "name": "43748",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43748"
        },
        {
          "name": "20110414 ZDI-11-104: (Pwn2Own) Webkit CSS Text Element Count Remote Code Execution Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/517513/100/0/threaded"
        },
        {
          "name": "44154",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44154"
        },
        {
          "name": "google-webkit-style-code-execution(66052)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66052"
        },
        {
          "name": "43735",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43735"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-1290",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer overflow in WebKit, as used on the Research In Motion (RIM) BlackBerry Torch 9800 with firmware 6.0.0.246, in Google Chrome before 10.0.648.133, and in Apple Safari before 5.0.5, allows remote attackers to execute arbitrary code via unknown vectors related to CSS \"style handling,\" nodesets, and a length value, as demonstrated by Vincenzo Iozzo, Willem Pinckaers, and Ralf-Philipp Weinmann during a Pwn2Own competition at CanSecWest 2011."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2011-0654",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0654"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2011/03/stable-and-beta-channel-updates.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2011/03/stable-and-beta-channel-updates.html"
            },
            {
              "name": "44151",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44151"
            },
            {
              "name": "46849",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/46849"
            },
            {
              "name": "1025212",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025212"
            },
            {
              "name": "http://support.apple.com/kb/HT4596",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT4596"
            },
            {
              "name": "71182",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/71182"
            },
            {
              "name": "DSA-2192",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2192"
            },
            {
              "name": "APPLE-SA-2011-04-14-3",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2011//Apr/msg00002.html"
            },
            {
              "name": "APPLE-SA-2011-04-14-2",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2011//Apr/msg00001.html"
            },
            {
              "name": "http://www.zerodayinitiative.com/advisories/ZDI-11-104",
              "refsource": "MISC",
              "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-104"
            },
            {
              "name": "http://www.blackberry.com/btsc/KB26132",
              "refsource": "CONFIRM",
              "url": "http://www.blackberry.com/btsc/KB26132"
            },
            {
              "name": "ADV-2011-0984",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0984"
            },
            {
              "name": "ADV-2011-0645",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0645"
            },
            {
              "name": "http://dvlabs.tippingpoint.com/blog/2011/02/02/pwn2own-2011",
              "refsource": "MISC",
              "url": "http://dvlabs.tippingpoint.com/blog/2011/02/02/pwn2own-2011"
            },
            {
              "name": "43782",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43782"
            },
            {
              "name": "http://support.apple.com/kb/HT4607",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT4607"
            },
            {
              "name": "ADV-2011-0671",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0671"
            },
            {
              "name": "APPLE-SA-2011-04-14-1",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2011//Apr/msg00000.html"
            },
            {
              "name": "http://www.zdnet.com/blog/security/pwn2own-2011-blackberry-falls-to-webkit-browser-attack/8401",
              "refsource": "MISC",
              "url": "http://www.zdnet.com/blog/security/pwn2own-2011-blackberry-falls-to-webkit-browser-attack/8401"
            },
            {
              "name": "43748",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43748"
            },
            {
              "name": "20110414 ZDI-11-104: (Pwn2Own) Webkit CSS Text Element Count Remote Code Execution Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/517513/100/0/threaded"
            },
            {
              "name": "44154",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44154"
            },
            {
              "name": "google-webkit-style-code-execution(66052)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66052"
            },
            {
              "name": "43735",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43735"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-1290",
    "datePublished": "2011-03-11T21:00:00.000Z",
    "dateReserved": "2011-03-06T00:00:00.000Z",
    "dateUpdated": "2024-08-06T22:21:34.187Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…