Search for vulnerabilities
Vulnerability details: VCID-g3pw-gxca-aaan
Vulnerability ID VCID-g3pw-gxca-aaan
Aliases CVE-2010-3812
Summary Integer overflow in the Text::wholeText method in dom/Text.cpp in WebKit, as used in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4; webkitgtk before 1.2.6; and possibly other products allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving Text objects.
Status Published
Exploitability 0.5
Weighted Severity 8.4
Risk 4.2
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
generic_textual Low http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2010/CVE-2010-3812.html
rhas Moderate https://access.redhat.com/errata/RHSA-2011:0177
epss 0.06326 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06326 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06326 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06326 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06326 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06326 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06326 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06326 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06326 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06326 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06326 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.06675 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.08781 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.08796 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.08796 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.08796 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
epss 0.08796 https://api.first.org/data/v1/epss?cve=CVE-2010-3812
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3812
cvssv2 9.3 https://nvd.nist.gov/vuln/detail/CVE-2010-3812
generic_textual Low https://ubuntu.com/security/notices/USN-1195-1
generic_textual Low http://support.apple.com/kb/HT4456
Reference id Reference type URL
http://lists.apple.com/archives/security-announce/2010//Nov/msg00002.html
http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052906.html
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://people.canonical.com/~ubuntu-security/cve/2010/CVE-2010-3812.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3812.json
https://api.first.org/data/v1/epss?cve=CVE-2010-3812
https://bugs.webkit.org/show_bug.cgi?id=46848
https://bugzilla.redhat.com/show_bug.cgi?id=667022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3812
http://secunia.com/advisories/42314
http://secunia.com/advisories/43068
http://secunia.com/advisories/43086
https://exchange.xforce.ibmcloud.com/vulnerabilities/63350
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11689
https://ubuntu.com/security/notices/USN-1195-1
http://support.apple.com/kb/HT4455
http://support.apple.com/kb/HT4456
http://trac.webkit.org/changeset/68705
http://www.mandriva.com/security/advisories?name=MDVSA-2011:039
http://www.redhat.com/support/errata/RHSA-2011-0177.html
http://www.securityfocus.com/bid/44960
http://www.vupen.com/english/advisories/2010/3046
http://www.vupen.com/english/advisories/2011/0212
http://www.vupen.com/english/advisories/2011/0216
http://www.vupen.com/english/advisories/2011/0552
http://www.zerodayinitiative.com/advisories/ZDI-10-257/
CVE-2010-3812 https://nvd.nist.gov/vuln/detail/CVE-2010-3812
GLSA-201412-09 https://security.gentoo.org/glsa/201412-09
RHSA-2011:0177 https://access.redhat.com/errata/RHSA-2011:0177
USN-1195-1 https://usn.ubuntu.com/1195-1/
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2010-3812
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.93834
EPSS Score 0.06326
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.