2024-04-04 08:46:00 +00:00

144 lines
4.1 KiB
JSON

{
"id": "CVE-2010-1386",
"sourceIdentifier": "product-security@apple.com",
"published": "2010-08-19T22:00:01.750",
"lastModified": "2011-08-23T04:00:00.000",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "page/Geolocation.cpp in WebCore in WebKit before r56188 and before 1.2.5 does not properly restrict access to the lastPosition function, which has unspecified impact and remote attack vectors, aka rdar problem 7746357."
},
{
"lang": "es",
"value": "En el archivo page/Geolocation.cpp en WebCore en WebKit anterior a r56188 y anterior a versi\u00f3n 1.2.5 no restringe apropiadamente el acceso a la funci\u00f3n lastPosition, que tiene un impacto no especificado y vectores de ataque remoto, tambi\u00e9n se conoce como rdar problem 7746357."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": true,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*",
"versionEndIncluding": "r56187",
"matchCriteriaId": "CE9F8416-9CBB-4165-9507-C13F599B1F05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:webkit:r50173:*:*:*:*:*:*:*",
"matchCriteriaId": "74950329-ADB0-4C00-B021-83689FFEAFDA"
}
]
}
]
}
],
"references": [
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html",
"source": "product-security@apple.com"
},
{
"url": "http://secunia.com/advisories/41856",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/43068",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://security-tracker.debian.org/tracker/CVE-2010-1386",
"source": "product-security@apple.com"
},
{
"url": "http://trac.webkit.org/changeset/56188",
"source": "product-security@apple.com"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:039",
"source": "product-security@apple.com"
},
{
"url": "http://www.securityfocus.com/bid/42500",
"source": "product-security@apple.com"
},
{
"url": "http://www.ubuntu.com/usn/USN-1006-1",
"source": "product-security@apple.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/2722",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2011/0212",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2011/0552",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://bugs.webkit.org/show_bug.cgi?id=36255",
"source": "product-security@apple.com"
}
]
}