Name | CVE-2010-1807 |
Description | WebKit in Apple Safari 4.x before 4.1.2 and 5.x before 5.0.2; Android before 2.2; and webkitgtk before 1.2.6; does not properly validate floating-point data, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted HTML document, related to non-standard NaN representation. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 599830 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
chromium-browser (PTS) | jessie, jessie (lts) | 57.0.2987.98-1~deb8u1 | fixed |
| stretch (security), stretch (lts), stretch | 71.0.3578.80-1~deb9u1 | fixed |
The information below is based on the following data on fixed versions.
Notes
[lenny] - webkit <no-dsa> (Unmaintained in Lenny, only affects fringe apps)
http://trac.webkit.org/changeset/64706
https://bugs.webkit.org/show_bug.cgi?id=43461
the problem is that the standard-library strtod()
parses "NAN(payload)" as a NaN with a user-defined payload, which is bad for the nan-boxing
scheme used by webkit (and mozilla). The fix is not to accept "NAN(payload)".
test-case: -parseFloat("NAN(ffffeeeeeff0f)")
reproduced with epiphany