Release date:
Updated on:
Affected Systems:
WebKit Open Source Project WebKit r82222
WebKit Open Source Project WebKit r77705
WebKit Open Source Project WebKit r52833
WebKit Open Source Project WebKit r52401
WebKit Open Source Project WebKit r51295
WebKit Open Source Project WebKit r38566
WebKit Open Source Project WebKit 1.2.X
Description:
--------------------------------------------------------------------------------
Bugtraq id: 48820
Cve id: CVE-2011-0223
WebKit is an open-source Web browser engine and is currently used by browsers such as Safari and Chrome.
WebKit has a memory corruption vulnerability in the implementation of the framework set. Remote attackers can exploit this vulnerability to leak information, execute arbitrary code, or cause DOS.
This vulnerability occurs when parsing framework set elements with malicious style attributes. When the fill attribute is set to some values, the heap memory corruption vulnerability may be triggered, resulting in arbitrary code execution.
<* Source: Jose A. Vazquez
Link: http://labs.idefense.com/intelligence/vulnerabilities/display.php? Id = 932
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
WebKit Open Source Project
--------------------------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://webkit.org/