September 8, 2010 August 11, 2010 June 21, 2010 February 2, 2010 September 9, 2009 July 31, 2009 June 17, 2009 November 20, 2008 September 12, 2008 July 11, 2008 January 15, 2008
                     
Accessibility FreeType Application Sandbox CoreAudio CoreAudio CoreTelephony CoreGraphics CoreGraphics Application Sandbox CFNetwork Foundation
CVE-ID: CVE-2010-1809 CVE-ID: CVE-2010-1797 CVE-ID: CVE-2010-1751 CVE-ID: CVE-2010-0036 CVE-ID: CVE-2009-2206 CVE-ID: CVE-2009-2204 CVE-ID: CVE-2008-3623 CVE-ID: CVE-2008-2321 CVE-ID: CVE-2008-3631 CVE-ID: CVE-2008-0050 CVE-ID: CVE-2008-0035
Available for: iOS 3.0 through 4.0.2 for iPhone 3GS and later, iOS 3.0 through 4.0.2 for iPod touch (3rd generation) Available for: iOS 2.0 through 4.0.1 for iPhone 3G and later, iOS 2.1 through 4.0 for iPod touch (2nd generation) and later; iOS 3.2 and 3.2.1 for iPad Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later Available for: iPhone OS 1.0 through 3.1.2, iPhone OS for iPod touch 1.1 through 3.1.2 Available for: iPhone OS 1.0 through 3.0.1, iPhone OS for iPod touch 1.1 through 3.0 Available for: iPhone OS 1.0 through iPhone OS 3.0 Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1 Available for: iPhone OS 1.0 through 2.1, iPhone OS for iPod touch 1.1 through 2.1 Available for: iPhone v2.0 through v2.0.2 Available for: iPhone v1.0 through v1.1.4, iPod touch v1.1 through v1.1.4 Available for: iPhone v1.0 through v1.1.2, iPod touch v1.1 through 1.1.2
Impact: An application's use of location services may not be announced through VoiceOver Impact: Viewing a PDF document with maliciously crafted embedded fonts may allow arbitrary code execution Impact: An application may be able to infer the user's location without authorization Impact: Playing a maliciously crafted mp4 audio file may lead to an unexpected application termination or arbitrary code execution Impact: Opening a maliciously crafted AAC or MP3 file may lead to an unexpected application termination or arbitrary code execution Impact: Receiving a maliciously crafted SMS message may lead to an unexpected service interruption or arbitrary code execution Impact: Viewing a maliciously crafted image may lead to an unexpected application termination or arbitrary code execution Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Impact: An application may be able to read another application's files Impact: A malicious proxy server may spoof secure websites Impact: Accessing a maliciously crafted URL may lead to an application termination or arbitrary code execution
Description: A user interface accessibility issue exists in the settings panel for Location Services. VoiceOver does not announce the presence of the location services icon that is shown next to an application that has requested the user's location within the last 24 hours. This issue is addressed by ensuring that VoiceOver announces the presence of the icon. Credit to Robin Kipp of Forever Living Products Europe for reporting this issue. Description: A stack buffer overflow exists in FreeType's handling of CFF opcodes. Viewing a PDF document with maliciously crafted embedded fonts may allow arbitrary code execution. This issue is addressed through improved bounds checking. Description: The Application Sandbox does not prevent applications from directly accessing the user's photo library. This may allow an application to determine visited locations without authorization. This issue is addressed by modifying the Application Sandbox to prevent direct access to the user's photo library. Credit to Zac White for reporting this issue. Description: A buffer overflow exists in the handling of mp4 audio files. Playing a maliciously crafted mp4 audio file may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved bounds checking. Credit to Tobias Klein of trapkit.de for reporting this issue. Description: A heap buffer overflow exists in the handling of AAC or MP3 files. Opening a maliciously crafted AAC or MP3 file may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved bounds checking. Credit to Tobias Klein of trapkit.de for reporting this issue. Description: A memory corruption issue exists in the decoding of SMS messages. Receiving a maliciously crafted SMS message may lead to an unexpected service interruption or arbitrary code execution. This update addresses the issue through improved error handling. Credit to Charlie Miller of Independent Security Evaluators, and Collin Mulliner of Technical University Berlin for reporting this issue. Description: A heap buffer overflow exists in the handling of color spaces within CoreGraphics. Viewing a maliciously crafted image may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved bounds checking. Credit: Apple. Description: CoreGraphics contains memory corruption issues in the processing of arguments. Passing untrusted input to CoreGraphics via an application, such as a web browser, may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved bounds checking. Credit to Michal Zalewski of Google for reporting this issue. Description: The Application Sandbox does not properly enforce access restrictions between third-party applications. This may allow a third-party application to read files in another third-party application's sandbox, and lead to the disclosure of sensitive information. This update addresses the issue by enforcing the proper access restrictions between application sandboxes. Credit to Nicolas Seriot of Sen:te and Bryce Cogswell for reporting this issue. This issue does not affect iPhone versions prior to v2.0. Description: A malicious HTTPS proxy server may return arbitrary data to CFNetwork in a 502 Bad Gateway error, which could allow a secure website to be spoofed. This update addresses the issue by not returning the proxy-supplied data on an error condition. Description: A memory corruption issue exists in Safari's handling of URLs. By enticing a user to access a maliciously crafted URL, an attacker may cause an unexpected application termination or arbitrary code execution. This update addresses the issue by performing additional validation of URLs.
                     
FaceTime IOSurface CFNetwork ImageIO Exchange Support   CoreGraphics ImageIO CoreGraphics Kernel Passcode Lock
CVE-ID: CVE-2010-1810 CVE-ID: CVE-2010-2973 CVE-ID: CVE-2010-1752 CVE-ID: CVE-2009-2285 CVE-ID: CVE-2009-2794   CVE-ID: CVE-2009-0145 CVE-ID: CVE-2008-2327 CVE-ID: CVE-2008-1806, CVE-2008-1807, CVE-2008-1808 CVE-ID: CVE-2008-0177 CVE-ID: CVE-2008-0034
Available for: iOS 2.0 through 4.0.2 for iPhone 3G and later, iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later Available for: iOS 2.0 through 4.0.1 for iPhone 3G and later, iOS 2.1 through 4.0 for iPod touch (2nd generation) and later; iOS 3.2 and 3.2.1 for iPad Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later Available for: iPhone OS 1.0 through 3.1.2, iPhone OS for iPod touch 1.1 through 3.1.2 Available for: iPhone OS 1.0 through 3.0.1, iPhone OS for iPod touch 1.1 through 3.0   Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1 Available for: iPhone OS 1.0 through 2.1, iPhone OS for iPod touch 1.1 through 2.1 Available for: iPhone v1.0 through v2.0.2 Available for: iPhone v1.0 through v1.1.4, iPod touch v1.1 through v1.1.4 Available for: iPhone v1.0 through v1.1.2
Impact: An attacker in a privileged network position may be able to redirect FaceTime calls Impact: Malicious code running as the user may gain system privileges Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Impact: Viewing a maliciously crafted TIFF image may lead to an unexpected application termination or arbitrary code execution Impact: A person with physical access to a device may be able to use it after the timeout period specified by an Exchange administrator   Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Impact: Viewing a maliciously crafted TIFF image may lead to an unexpected application termination or arbitrary code execution Impact: Multiple vulnerabilities in FreeType v2.3.5 Impact: A remote attacker may be able to cause an unexpected device reset Impact: An unauthorized user may bypass the Passcode Lock and launch iPhone applications
Description: An issue in the handling of invalid certificates may allow an attacker in a privileged network position to redirect FaceTime calls. This issue is addressed through improved handling of certificates. Credit to Aaron Sigel of vtty.com for reporting this issue. Description: An integer overflow exists in the handling of IOSurface properties, which may allow malicious code running as the user to gain system privileges. This issue is addressed through improved bounds checking. Description: A stack overflow exists in CFNetwork's URL handling code. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory handling. Credit to Laurent OUDOT of TEHTRI-Security for reporting this issue. Description: A buffer underflow exists in ImageIO's handling of TIFF images. Viewing a maliciously crafted TIFF image may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved bounds checking. Description: iPhone OS provides the ability to communicate via services provided by a Microsoft Exchange server. An administrator of an Exchange server has the ability to specify a "Maximum inactivity time lock" setting. This requires the user to reenter their passcode after the expiration of the inactivity time in order to use the Exchange services. iPhone OS allows a user to specify a "Require Passcode" setting that may extend up to 4 hours. The "Require Passcode" setting is not affected by the "Maximum inactivity time lock" setting. If the user has "Require Passcode" set to a value higher than the "Maximum inactivity time lock" setting, this would allow a window of time for a person with physical access to use the device, including Exchange services. This update addresses the issue by disabling user choices for "Require Passcode" values greater than the "Maximum inactivity time lock" setting. This issue only affects iPhone OS 2.0 and later, and iPhone OS for iPod touch 2.0 and later. Credit to Allan Steven, Robert Duran, Jeff Beckham of PepsiCo, Joshua Levitsky, Michael Breton of Intel Corporation, Mike Karban of Edward Jones, and Steve Moriarty of Agilent Technologies for reporting this issue.   Description: Multiple memory corruption issues exist in CoreGraphics' handling of PDF files. Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution. This update addresses the issues through improved bounds and error checking. Description: Multiple uninitialized memory access issues exist in libTIFF's handling of LZW-encoded TIFF images. Viewing a maliciously crafted TIFF image may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through proper memory initialization and additional validation of TIFF images. Description: Multiple vulnerabilities exist in FreeType v2.3.5, the most serious of which may lead to arbitrary code execution when accessing maliciously crafted font data. This update addresses the issue by incorporating the security fixes from version 2.3.6 of FreeType. Further information is available via the FreeType site at http://www.freetype.org/ Description: An undetected failure condition exists in the handling of packets with an IPComp header. Sending a maliciously crafted packet to a system configured to use IPSec or IPv6 may cause an unexpected device reset. This update addresses the issue by properly detecting the failure condition. Description: The Passcode Lock feature is designed to prevent applications from being launched unless the correct passcode is entered. An implementation issue in the handling of emergency calls allows users with physical access to an iPhone to launch an application without the passcode. This update addresses the issue through an improved check on the state of the Passcode Lock.
                     
ImageIO   Find My iPhone Recovery Mode MobileMail   CoreGraphics ImageIO mDNSResponder Safari Safari
CVE-ID: CVE-2010-1811   CVE-ID: CVE-2010-1776 CVE-ID: CVE-2010-0038 CVE-ID: CVE-2009-2207   CVE-ID: CVE-2009-0146, CVE-2009-0147, CVE-2009-0165 CVE-ID: CVE-2008-1586 CVE-ID: CVE-2008-1447 CVE-ID: CVE-2008-1588 CVE-ID: CVE-2007-5858
Available for: iOS 2.0 through 4.0.2 for iPhone 3G and later, iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later   Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later Available for: iPhone OS 1.0 through 3.1.2, iPhone OS for iPod touch 1.1 through 3.1.2 Available for: iPhone OS 1.0 through 3.0.1, iPhone OS for iPod touch 1.1 through 3.0   Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1 Available for: iPhone OS 1.0 through 2.1, iPhone OS for iPod touch 1.1 through 2.1 Available for: iPhone v1.0 through v2.0.2 Available for: iPhone v1.0 through v1.1.4, iPod touch v1.1 through v1.1.4 Available for: iPhone v1.0 through v1.1.2, iPod touch v1.1 through 1.1.2
Impact: Processing a maliciously crafted TIFF image may lead to an unexpected application termination or arbitrary code execution   Impact: A device with a MobileMe account configured may be remotely wiped, even if "Find My iPhone" is disabled Impact: A person with physical access to a locked device may be able to access the user's data Impact: Deleted email messages may still be visible through a Spotlight search   Impact: Viewing or downloading a PDF file containing a maliciously crafted JBIG2 stream may lead to an unexpected application termination or arbitrary code execution Impact: Viewing a maliciously crafted TIFF image may lead to an unexpected device reset Impact: mDNSResponder is susceptible to DNS cache poisoning and may return forged information Impact: Unicode ideographic spaces may be used to spoof a website Impact: Visiting a malicious website may result in the disclosure of sensitive information
Description: A memory corruption issue exists in the handling of TIFF images. Processing a maliciously crafted TIFF image may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of TIFF images. Credit: Apple.   Description: A user may configure their device to use MobileMe. Individual MobileMe services may be enabled or disabled via the Settings app. Disabling the "Find My iPhone" service prevents the device from being located via MobileMe, but does not prevent the phone from being wiped. An attacker with access to the password of the configured MobileMe account may be able to wipe the device. This issue is addressed by disabling remote wipe and message display when the "Find My iPhone" service is disabled on the device. Description: A memory corruption issue exists in the handling of a certain USB control message. A person with physical access to the device could use this to bypass the passcode and access the user's data. This issue is addressed through improved handling of the USB control message. Description: Spotlight finds and allows access to deleted messages in Mail folders on the device. This would allow a person with access to the device to view the deleted messages. This update addresses the issue by not including the deleted email in the Spotlight search result. This issue only affects iPhone OS 3.0, iPhone OS 3.0.1, and iPhone OS for iPod touch 3.0. Credit to Clickwise Software and Tony Kavadias for reporting this issue.   Description: Multiple heap buffer overflows exist in CoreGraphics' handling of PDF files containing JBIG2 streams. Viewing or downloading a PDF file containing a maliciously crafted JBIG2 stream may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved bounds checking. Credit to Apple, Alin Rad Pop of Secunia Research, and Will Dormann of CERT/CC for reporting this issue. Description: A memory exhaustion issue exists in the handling of TIFF images. Viewing a maliciously crafted TIFF image may lead to an unexpected device reset. This update addresses the issue by limiting the amount of memory allocated to open a TIFF image. Credit to Sergio 'shadown' Alvarez of Recurity Labs GmbH for reporting this issue. Description: mDNSResponder provides translation between host names and IP addresses for applications that use its unicast DNS resolution API. A weakness in the DNS protocol may allow a remote attacker to perform DNS cache poisoning attacks. As a result, applications that rely on mDNSResponder for DNS may receive forged information. This update addresses the issue by implementing source port and transaction ID randomization to improve resilience against cache poisoning attacks. Credit to Dan Kaminsky of IOActive for reporting this issue. Description: When Safari displays the current URL in the address bar, Unicode ideographic spaces are rendered. This allows a maliciously crafted website to direct the user to a spoofed site that visually appears to be a legitimate domain. This update addresses the issue by not rendering Unicode ideographic spaces in the address bar. Description: WebKit allows a page to navigate the subframes of any other page. Visiting a maliciously crafted web page could trigger a cross-site scripting attack, which may lead to the disclosure of sensitive information. This update addresses the issue by implementing a stricter frame navigation policy.
                     
ImageIO   ImageIO WebKit Recovery Mode   CoreGraphics Networking Networking Safari  
CVE-ID: CVE-2010-1817   CVE-ID: CVE-2010-0041 CVE-ID: CVE-2009-3384 CVE-ID: CVE-2009-2795   CVE-ID: CVE-2009-0155 CVE-ID: CVE-2008-4227 CVE-ID: CVE-2008-3612 CVE-ID: CVE-2008-1589  
Available for: iOS 2.0 through 4.0.2 for iPhone 3G and later, iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later   Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later Available for: iPhone OS 1.0 through 3.1.2, iPhone OS for iPod touch 1.1 through 3.1.2 Available for: iPhone OS 1.0 through 3.0.1, iPhone OS for iPod touch 1.1 through 3.0   Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1 Available for: iPhone OS 1.0 through 2.1, iPhone OS for iPod touch 1.1 through 2.1 Available for: iPhone v1.0 through v2.0.2 Available for: iPhone v1.0 through v1.1.4, iPod touch v1.1 through v1.1.4  
Impact: Processing a maliciously crafted GIF image may lead to an unexpected application termination or arbitrary code execution   Impact: Visiting a maliciously crafted website may result in sending data from Safari's memory to the website Impact: Accessing a maliciously crafted FTP server could result in an unexpected application termination, information disclosure, or arbitrary code execution Impact: A person with physical access to a locked device may be able to access the user's data   Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Impact: The encryption level for PPTP VPN connections may be lower than expected Impact: Predictable TCP initial sequence numbers generation may lead to TCP spoofing or session hijacking Impact: Visiting a maliciously crafted website may lead to the disclosure of sensitive information  
Description: A buffer overflow exists in the handling of GIF images. Processing a maliciously crafted GIF image may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved bounds checking. Credit to Tom Ferris of Adobe PSIRT for reporting this issue.   Description: An uninitialized memory access issue exists in ImageIO's handling of BMP images. Visiting a maliciously crafted website may result in sending data from Safari's memory to the website. This issue is addressed through improved memory initialization and additional validation of BMP images. Credit to Matthew 'j00ru' Jurczyk of Hispasec for reporting this issue. Description: Multiple input validation issues exist in WebKit's handling of FTP directory listings. Accessing a maliciously crafted FTP server may lead to information disclosure, unexpected application termination, or execution of arbitrary code. This update addresses the issues through improved parsing of FTP directory listings. Credit to Michal Zalewski of Google Inc. for reporting these issues. Description: A heap buffer overflow exists in Recovery Mode command parsing. This may allow another person with physical access to the device to bypass the passcode, and access the user's data. This update addresses the issue through improved bounds checking.   Description: An integer underflow in CoreGraphics' handling of PDF files may result in a heap buffer overflow. Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved bounds checking. Credit to Barry K. Nathan for reporting this issue. Description: The encryption level for PPTP VPN connections may revert to a previous lower setting. This update addresses the issue by properly setting the encryption preferences. Credit to Stephen Butler of the University of Illinois of Urbana-Champaign for reporting this issue. Description: TCP initial sequence numbers are sequentially generated. Predictable initial sequence numbers may allow a remote attacker to create a spoofed TCP connection or insert data into an existing TCP connection. This update addresses the issue by generating random TCP initial sequence numbers. Description: When Safari accesses a website that uses a self-signed or invalid certificate, it prompts the user to accept or reject the certificate. If the user presses the menu button while at the prompt, then on the next visit to the site, the certificate is accepted with no prompt. This may lead to the disclosure of sensitive information. This update addresses the issue through improved handling of certificates. Credit to Hiromitsu Takagi for reporting this issue.  
                     
WebKit   ImageIO WebKit Telephony   CoreGraphics Office Viewer Passcode Lock Safari  
CVE-ID: CVE-2010-1786   CVE-ID: CVE-2010-0042 CVE-ID: CVE-2009-2841 CVE-ID: CVE-2009-2815   CVE-ID: CVE-2009-1179 CVE-ID: CVE-2008-4211 CVE-ID: CVE-2008-3633 CVE-ID: CVE-2008-2303  
Available for: iOS 2.0 through 4.0.2 for iPhone 3G and later, iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later   Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later Available for: iPhone OS 1.0 through 3.1.2, iPhone OS for iPod touch 1.1 through 3.1.2 Available for: iPhone OS 1.0 through 3.0.1   Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1 Available for: iPhone OS 1.0 through 2.1, iPhone OS for iPod touch 1.1 through 2.1 Available for: iPhone v2.0 through v2.0.2 Available for: iPhone v1.0 through v1.1.4, iPod touch v1.1 through v1.1.4  
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution   Impact: Visiting a maliciously crafted website may result in sending data from Safari's memory to the website Impact: Mail may load remote audio and video content when remote image loading is disabled Impact: Receiving a maliciously crafted SMS message may lead to an unexpected service interruption   Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Impact: Viewing a maliciously crafted Microsoft Excel file may lead to an unexpected application termination or arbitrary code execution Impact: An unauthorized user may bypass the Passcode Lock and launch iPhone applications Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution  
Description: A use after free issue exists in WebKit's handling of "foreignObject" elements in SVG documents. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through additional validation of SVG documents. Credit to wushi of team509, working with TippingPoint's Zero Day Initiative for reporting this issue.   Description: An uninitialized memory access issue exists in ImageIO's handling of TIFF images. Visiting a maliciously crafted website may result in sending data from Safari's memory to the website. This issue is addressed through improved memory initialization and additional validation of TIFF images. Credit to Matthew 'j00ru' Jurczyk of Hispasec for reporting this issue. Description: When WebKit encounters an HTML 5 Media Element pointing to an external resource, it does not issue a resource load callback to determine if the resource should be loaded. This may result in undesired requests to remote servers. As an example, the sender of an HTML-formatted email message could use this to determine that the message was read. This issue is addressed by generating resource load callbacks when WebKit encounters an HTML 5 Media Element. Description: A null pointer dereference issue exists in the handling of SMS arrival notifications. Receiving a maliciously crafted SMS message may lead to an unexpected service interruption. This update addresses the issue through improved handling of incoming SMS messages. Credit to Charlie Miller of Independent Security Evaluators, and Collin Mulliner of Technical University Berlin for reporting this issue.   Description: An integer overflow in CoreGraphics' handling of PDF files may result in a heap buffer overflow. Opening a PDF file containing a maliciously crafted JBIG2 stream may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved bounds checking. Credit to Will Dormann of CERT/CC for reporting this issue. Description: A signedness issue in Office Viewer's handling of columns in Microsoft Excel files may result in an out-of-bounds memory access. Viewing a maliciously crafted Microsoft Excel file may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue by ensuring that the affected index values are not negative. Credit: Apple. Description: The Passcode Lock feature is designed to prevent applications from being launched unless the correct passcode is entered. An implementation issue in the handling of emergency calls allows users with physical access to an iPhone to launch an application without the passcode by double clicking the home button in emergency call. This update addresses the issue through improved handling of emergency calls. Credit to Matthew Yohe of The University of Iowa's Department of Electrical and Computer Engineering for reporting this issue. This issue does not affect iPhone versions prior to v2.0. Description: A signedness issue in Safari's handling of JavaScript array indices may result in an out-of-bounds memory access. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue by performing additional validation of JavaScript array indices. Credit to SkyLined of Google for reporting this issue.  
                     
WebKit   ImageIO   UIKit   CoreGraphics Passcode Lock WebKit Safari  
CVE-ID: CVE-2010-1770   CVE-ID: CVE-2010-0043   CVE-ID: CVE-2009-2796   CVE-ID: CVE-2009-0946 CVE-ID: CVE-2008-4228 CVE-ID: CVE-2008-3632 CVE-ID: CVE-2006-2783  
Available for: iOS 2.0 through 4.0.2 for iPhone 3G and later, iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later   Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later   Available for: iPhone OS 1.0 through 3.0.1, iPhone OS for iPod touch 1.1 through 3.0   Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1 Available for: iPhone OS 1.0 through 2.1, iPhone OS for iPod touch 1.1 through 2.1 Available for: iPhone v1.0 through v2.0.2 Available for: iPhone v1.0 through v1.1.4, iPod touch v1.1 through v1.1.4  
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution   Impact: Processing a maliciously crafted TIFF image may lead to an unexpected application termination or arbitrary code execution   Impact: Passwords may be made visible   Impact: Multiple vulnerabilities in FreeType v2.3.8 Impact: Emergency calls are not restricted to emergency numbers Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Impact: Visiting a maliciously crafted website may lead to cross-site scripting  
Description: A type checking issue exists in WebKit's handling of text nodes. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved type checking. Credit to wushi of team509, working with TippingPoint's Zero Day Initiative for reporting this issue.   Description: A memory corruption issue exists in the handling of TIFF images. Processing a maliciously crafted TIFF image may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory handling. Credit to Gus Mueller of Flying Meat for reporting this issue.   Description: When a character in a password is deleted, and the deletion is undone, the character is briefly made visible. This may allow a person with physical access to the device to read a password, one character at a time. This update addresses the issue by preventing the character from being made visible. This issue only affects iPhone OS 3.0 and iPhone OS 3.0.1. Credit to Abraham Vegh for reporting this issue.   Description: Multiple integer overflows exist in FreeType v2.3.8, which may lead to an unexpected application termination or arbitrary code execution. This update addresses the issues through improved bounds checking. Credit to Tavis Ormandy of the Google Security Team for reporting these issues. Description: iPhone provides the ability to make an emergency call when locked. Currently, an emergency call may be placed to any number. A person with physical access to an iPhone may take advantage of this feature to place arbitrary calls which are charged to the iPhone owner. This update addresses the issue by restricting emergency calls to a limited set of phone numbers. Description: A use-after-free issue exists in WebKit's handling of CSS import statements. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved handling of document references. Description: Safari ignores Unicode byte order mark sequences when parsing web pages. Certain websites and web content filters attempt to sanitize input by blocking specific HTML tags. This approach to filtering may be bypassed and lead to cross-site scripting when encountering maliciously-crafted HTML tags containing byte order mark sequences. This update addresses the issue through improved handling of byte order mark sequences. Credit to Chris Weber of Casaba Security, LLC for reporting this issue.  
                     
WebKit   ImageIO   WebKit   Exchange Passcode Lock   Safari  
CVE-ID: CVE-2010-1785   CVE-ID: CVE-2010-1753   CVE-ID: CVE-2009-2797   CVE-ID: CVE-2009-0958 CVE-ID: CVE-2008-4229   CVE-ID: CVE-2008-2307  
Available for: iOS 2.0 through 4.0.2 for iPhone 3G and later, iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later   Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later   Available for: iPhone OS 1.0 through 3.0.1, iPhone OS for iPod touch 1.1 through 3.0   Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1 Available for: iPhone OS 1.0 through 2.1, iPhone OS for iPod touch 1.1 through 2.1   Available for: iPhone v1.0 through v1.1.4, iPod touch v1.1 through v1.1.4  
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution   Impact: Processing a maliciously crafted JPEG image may lead to an unexpected application termination or arbitrary code execution   Impact: User names and passwords in URLs may be disclosed to linked sites   Impact: Connecting to a malicious Exchange server may lead to the disclosure of sensitive information Impact: Restoring a device from backup may not re-enable the Passcode Lock   Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution  
Description: An uninitialized memory access issue exists in WebKit's handling of the ":first-letter" and ":first-line" pseudo-elements in SVG text elements. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed by not rendering ":first-letter" or ":first-line" pseudo-elements in SVG text elements. Credit to wushi of team509, working with TippingPoint's Zero Day Initiative for reporting this issue.   Description: A memory corruption issue exists in the handling of JPEG images. Processing a maliciously crafted JPEG image may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory handling. Credit to Ladd Van Tol of Critical Path Software for reporting this issue.   Description: Safari includes the user name and password from the original URL in the referer header. This may lead to the disclosure of sensitive information. This update addresses the issue by not including user names and passwords in referer headers. Credit to James A. T. Rice of Jump Networks Ltd for reporting this issue.   Description: Accepting an untrusted Exchange server certificate results in storing an exception on a per-hostname basis. On the next visit to an Exchange server contained in the exception list, its certificate is accepted with no prompt and validation. This may lead to the disclosure of credentials or application data. This update addresses the issue through improved handling of untrusted certificate exceptions. Credit to FD of Securus Global for reporting this issue. Description: The Passcode Lock feature is designed to prevent applications from being launched unless the correct passcode is entered. A race condition in the handling of device settings may cause the Passcode Lock to be removed when the device is restored from backup. This may allow a person with physical access to the device to launch applications without the passcode. This update addresses the issue by improving the system's ability to recognize missing preferences. This issue does not affect systems prior to iPhone OS 2.0 or iPhone OS for iPod touch 2.0. Credit to Nolen Scaife for reporting this issue.   Description: A memory corruption issue exists in WebKit's handling of JavaScript arrays. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved bounds checking. Credit to James Urquhart for reporting this issue.  
                     
WebKit   LibSystem   WebKit   ImageIO Passcode Lock   Safari  
CVE-ID: CVE-2010-1780   CVE-ID: CVE-2009-0689   CVE-ID: CVE-2009-1725   CVE-ID: CVE-2009-0040 CVE-ID: CVE-2008-4230   CVE-ID: CVE-2008-2317  
Available for: iOS 2.0 through 4.0.2 for iPhone 3G and later, iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later   Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later   Available for: iPhone OS 1.0 through 3.0.1, iPhone OS for iPod touch 1.1 through 3.0   Impact: Processing a maliciously crafted PNG image may lead to an unexpected application termination or arbitrary code execution Available for: iPhone OS 1.0 through 2.1, iPhone OS for iPod touch 1.1 through 2.1   Available for: iPhone v1.0 through v1.1.4, iPod touch v1.1 through v1.1.4  
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution   Impact: Applications that convert untrusted data between binary floating point and text may be vulnerable to an unexpected application termination or arbitrary code execution   Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution   Description: An uninitialized pointer issue exists in the handling of PNG images. Processing a maliciously crafted PNG image may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through additional validation of PNG images. Credit to Tavis Ormandy of Google Security Team for reporting this issue. Impact: Short Message Service (SMS) messages may be revealed before the passcode is entered   Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution  
Description: A use after free issue exists in WebKit's handling of element focus. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of element focus. Credit to Tony Chang of Google, Inc. for reporting this issue.   Description: A buffer overflow exists in the floating point binary to text conversion code within Libsystem. An attacker who can cause an application to convert a floating point value into a long string, or to parse a maliciously crafted string as a floating point value, may be able to cause an unexpected application termination or arbitrary code execution. This issue is addressed through improved bounds checking. Credit to Maksymilian Arciemowicz of SecurityReason.com for reporting this issue.   Description: A memory corruption issue exists in WebKit's handling of numeric character references. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved handling of numeric character references. Credit to Chris Evans for reporting this issue.   Description: An uninitialized pointer issue exists in the handling of PNG images. Processing a maliciously crafted PNG image may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through additional validation of PNG images. Credit to Tavis Ormandy of Google Security Team for reporting this issue. Description: If an SMS message arrives while the emergency call screen is visible, the entire SMS message is displayed, even if the "Show SMS Preview" preference was set to "OFF". This update addresses the issue by, in this situation, displaying only a notification that a SMS message has arrived, and not its content.   Description: A memory corruption issue exists in WebCore's handling of style sheet elements. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved garbage collection. Credit to an anonymous researcher working with the TippingPoint Zero Day Initiative for reporting this issue.  
                     
WebKit   libxml   WebKit   International Components for Unicode Safari   Safari  
CVE-ID: CVE-2010-1793   CVE-ID: CVE-2009-2414, CVE-2009-2416   CVE-ID: CVE-2009-1724   CVE-ID: CVE-2009-0153 CVE-ID: CVE-2008-4231   CVE-ID: CVE-2007-6284  
Available for: iOS 2.0 through 4.0.2 for iPhone 3G and later, iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later   Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later   Available for: iPhone OS 1.0 through 3.0.1, iPhone OS for iPod touch 1.1 through 3.0   Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1 Available for: iPhone OS 1.0 through 2.1, iPhone OS for iPod touch 1.1 through 2.1   Available for: iPhone v1.0 through v1.1.4, iPod touch v1.1 through v1.1.4  
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution   Impact: Parsing maliciously crafted XML content may lead to an unexpected application termination   Impact: Visiting a maliciously crafted website may lead to a cross-site scripting attack   Impact: Maliciously crafted content may bypass website filters and result in cross-site scripting Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution   Impact: Processing an XML document may lead to a denial of service  
Description: A use after free issue exists in WebKit's handling of "font-face" and "use" elements in SVG documents. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of "font-face" and "use" elements in SVG documents. Credit to Aki Helin of OUSPG for reporting this issue.   Description: Multiple use after free issues exist in libxml2, the most serious of which may lead to an unexpected application termination. The issues are addressed through improved memory handling. Credit to Rauli Kaksonen and Jukka Taimisto from the CROSS project at Codenomicon Ltd. for reporting these issues.   Description: An issue in WebKit's handling of the parent and top objects may result in a cross-site scripting attack when visiting a maliciously crafted website. This update addresses the issue through improved handling of parent and top objects.   Description: An implementation issue exists in ICU's handling of certain character encodings. Using ICU to convert invalid byte sequences to Unicode may result in over-consumption, where trailing bytes are considered part of the original character. This may be leveraged by an attacker to bypass filters on websites that attempt to mitigate cross-site scripting. This update addresses the issue through improved handling of invalid byte sequences. Credit to Chris Weber of Casaba Security for reporting this issue. Description: A memory corruption issue exists in the handling of HTML table elements. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved handling of HTML table elements. Credit to Haifei Li of Fortinet's FortiGuard Global Security Research Team for reporting this issue.   Description: A memory consumption issue exists in the handling of XML documents containing invalid UTF-8 sequences, which may lead to a denial of service. This update addresses the issue by updating the libxml2 system library to version 2.6.16.  
                     
WebKit   Passcode Lock   WebKit   IPSec Safari   Safari  
CVE-ID: CVE-2010-1421   CVE-ID: CVE-2010-1754   CVE-ID: CVE-2009-2199   CVE-ID: CVE-2008-3651, CVE-2008-3652 CVE-ID: CVE-2008-4232   CVE-ID: CVE-2008-1767  
Available for: iOS 2.0 through 4.0.2 for iPhone 3G and later, iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later   Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later   Available for: iPhone OS 1.0 through 3.0.1, iPhone OS for iPod touch 1.1 through 3.0   Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1 Available for: iPhone OS 1.0 through 2.1, iPhone OS for iPod touch 1.1 through 2.1   Available for: iPhone v1.0 through v1.1.4, iPod touch v1.1 through v1.1.4  
Impact: Visiting a maliciously crafted website may change the contents of the clipboard   Impact: Remote Lock via MobileMe may not be effective in preventing access   Impact: Look-alike characters in a URL could be used to masquerade a website   Impact: Multiple vulnerabilities in the racoon daemon may lead to a denial of service Impact: Websites with embedded iframe elements may be vulnerable to user interface spoofing   Impact: Processing an XML document may lead to an unexpected application termination or arbitrary code execution  
Description: A design issue exists in the implementation of the JavaScript execCommand function. A maliciously crafted web page can modify the contents of the clipboard without user interaction. This issue is addressed by only allowing clipboard commands to be executed if initiated by the user. Credit: Apple.   Description: If the device is unlocked in response to an alert, such as receiving a text message or voicemail, and MobileMe is then used to Remote Lock the device, then the next unlock of the device will have the passcode already entered. A person with physical access to the device will not require the passcode in this situation. This issue is addressed by properly clearing the passcode. Credit to Sidney San Martin of DeepTech, Inc. for reporting this issue.   Description: The International Domain Name (IDN) support and Unicode fonts embedded in Safari could be used to create a URL which contains look-alike characters. These could be used in a malicious website to direct the user to a spoofed site that visually appears to be a legitimate domain. This update addresses the issue by supplementing WebKit's list of known look-alike characters. Look-alike characters are rendered in Punycode in the address bar. Credit to Chris Weber of Casaba Security, LLC for reporting this issue.   Description: Multiple memory leaks exist in the racoon daemon in ipsec-tools before 0.7.1, which may lead to a denial of service. This update addresses the issues through improved memory management. Description: Safari allows an iframe element to display content outside its boundaries, which may lead to user interface spoofing. This update addresses the issue by not allowing iframe elements to display content outside their boundaries. This issue does not affect systems prior to iPhone OS 2.0 or iPhone OS for iPod touch 2.0. Credit to John Resig of Mozilla Corporation for reporting this issue.   Description: A memory corruption issue exists in the libxslt library. Viewing a maliciously crafted HTML page may lead to an unexpected application termination or arbitrary code execution. Further information on the patch applied is available via the xmlsoft.org website http://xmlsoft.org/XSLT/ Credit to Anthony de Almeida Lopes of Outpost24 AB, and Chris Evans of Google Security Team for reporting this issue.  
                     
WebKit   Passcode Lock       libxml Safari   WebKit  
CVE-ID: CVE-2010-1422   CVE-ID: CVE-2010-1775       CVE-ID: CVE-2008-3281, CVE-2008-3529, CVE-2008-4409, CVE-2008-4225, CVE-2008-4226 CVE-ID: CVE-2008-4233   CVE-ID: CVE-2008-1590  
Available for: iOS 2.0 through 4.0.2 for iPhone 3G and later, iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later   Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later       Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1 Available for: iPhone OS 1.0 through 2.1, iPhone OS for iPod touch 1.1 through 2.1   Available for: iPhone v1.0 through v1.1.4, iPod touch v1.1 through v1.1.4  
Impact: Interacting with a maliciously crafted website may result in unexpected actions on other sites   Impact: A person with physical access to a device may be able to access the user's data       Impact: Multiple vulnerabilities in libxml2 version 2.6.16 Impact: Visiting a maliciously crafted website may initiate a phone call without user interaction   Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution  
Description: An implementation issue exists in WebKit's handling of keyboard focus. If the keyboard focus changes during the processing of key presses, WebKit may deliver an event to the newly-focused frame, instead of the frame that had focus when the key press occurred. A maliciously crafted website may be able to manipulate a user into taking an unexpected action, such as initiating a purchase. This issue is addressed by preventing the delivery of key press events if the keyboard focus changes during processing. Credit to Michal Zalewski of Google, Inc. for reporting this issue.   Description: A device with a passcode set may only be paired with a computer if the device is unlocked. A race condition permits pairing for a short period after the initial boot, if the device was unlocked before powering down. If the device was shut down from a locked state, this issue does not occur. This issue is addressed through improved checking for the locked state.       Description: Multiple vulnerabilities in libxml2 version 2.6.16, the most serious of which may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue by updating the libxml2 system library to version 2.7.3. Description:  If an application is launched via Safari while a call approval dialog is shown, the call will be placed. This may allow a maliciously crafted website to initiate a phone call without user interaction. Additionally, under certain circumstances it may be possible for a maliciously crafted website to block the user's ability to cancel dialing for a short period of time. This update addresses the issue by properly dismissing Safari's call approval dialog when an application is being launched via Safari. Credit to Collin Mulliner of Fraunhofer SIT for reporting this issue.    Description: A memory corruption issue exists in JavaScriptCore's handling of runtime garbage collection. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved garbage collection. Credit to Itzik Kotler and Jonathan Rom of Radware for reporting this issue.  
                     
WebKit   Safari       Mail Webkit   WebKit  
CVE-ID: CVE-2010-1771   CVE-ID: CVE-2010-1755       CVE-ID: CVE-2009-0960 CVE-ID: CVE-2008-3644   CVE-ID: CVE-2008-1025  
Available for: iOS 2.0 through 4.0.2 for iPhone 3G and later, iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later   Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later       Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1 Available for: iPhone OS 1.0 through 2.1, iPhone OS for iPod touch 1.1 through 2.1   Available for: iPhone v1.0 through v1.1.4, iPod touch v1.1 through v1.1.4  
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution   Impact: Cookies may be set by third-party sites even when the Accept Cookies preference is set to "From visited" or "Never"       Impact: Users do not have control over the loading of remote images in HTML messages Impact: Sensitive information may be disclosed to a person with physical access to an unlocked device   Impact: Accessing a maliciously crafted URL may result in cross-site scripting  
Description: A use after free issue exists in WebKit's handling of fonts. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of fonts. Credit: Apple.   Description: An implementation issue exists in the handling of cookie preferences. Cookie preferences are not applied until Safari is restarted. Cookies may be set by third-party sites even when the Accept Cookies preference is set to "From visited" or "Never". This issue is addressed by applying the Accept Cookies preference. Credit to Jason Dent o Street Side Software for reporting this issue.       Description: Mail does not provide a preference to turn off the automatic loading of remote images. Opening an HTML email containing a remote image will automatically request it. The server hosting a remote image can determine that the email was read, and the network address of the device. This update addresses the issue by adding a preference to turn off the automatic loading of remote images. Credit to Ronald C.F. Antony of Cubiculum Systems, Stefan Seiz of ERNI Electronics GmbH, Oskar Lissheim-Boethius of iPhone development house OLB Productions, Meyer Consulting, Oliver Quas, Christian Schmitz of MonkeybreadSoftware, Thomas Adams of TynTec, Aviv Raff of aviv.raffon.net, and Collin Mulliner of Fraunhofer SIT for reporting this issue. Description: Disabling autocomplete on a form field may not prevent the data in the field from being stored in the browser page cache. This may lead to the disclosure of sensitive information to a person with physical access to an unlocked device. This update addresses the issue by properly clearing the form data. Credit to an anonymous researcher for reporting this issue.   Description: An issue exists in WebKit's handling of URLs containing a colon character in the host name. Accessing a maliciously crafted URL may lead to a cross-site scripting attack. This update addresses the issue through improved handling of URLs. Credit to Robert Swiecki of the Google Security Team, and David Bloom for reporting this issue.  
                     
WebKit   Safari       Mail     WebKit  
CVE-ID: CVE-2010-1783   CVE-ID: CVE-2010-1384       CVE-ID: CVE-2009-0961     CVE-ID: CVE-2008-1026  
Available for: iOS 2.0 through 4.0.2 for iPhone 3G and later, iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later   Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later       Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1     Available for: iPhone v1.0 through v1.1.4, iPod touch v1.1 through v1.1.4  
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution   Impact: A maliciously crafted URL may be obfuscated, making phishing attacks more effective       Impact: An application that causes an alert to apear may initiate a phone call without user interaction     Impact: Viewing a maliciously crafted web page may lead to an unexpected application termination or arbitrary code execution  
Description: A memory corruption issue exists in WebKit's handling of dynamic modifications to text nodes. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory management.   Description: Safari supports the inclusion of user information in URLs, which allows the URL to specify a username and password to authenticate the user to the named server. These URLs are often used to confuse users, which can potentially aid phishing attacks. Safari is updated to display a warning before navigating to an HTTP or HTTPS URL containing user information. Credit to Abhishek Arya of Google, Inc. for reporting this issue.       Description: If an application causes an alert to apear while Mail's call approval dialog is shown, the call will be placed without user interaction. This update addresses the issue by not dismissing the call approval dialog when other alerts appear. Credit to Collin Mulliner of Fraunhofer SIT for reporting this issue.     Description: A heap buffer overflow exists in WebKit's handling of JavaScript regular expressions. The issue may be triggered via JavaScript when processing regular expressions with large, nested repetition counts. This may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue by performing additional validation of JavaScript regular expressions. Credit to Charlie Miller of Independent Security Evaluators for reporting this issue.  
                     
WebKit   Safari       MPEG-4 Video Codec        
CVE-ID: CVE-2010-1764   CVE-ID: CVE-2009-1723       CVE-ID: CVE-2009-0959        
Available for: iOS 2.0 through 4.0.2 for iPhone 3G and later, iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later   Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later       Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1        
Impact: Visiting a website that redirects form submissions may lead to an information disclosure   Impact: A maliciously crafted website may control the displayed website URL while a certificate warning is displayed       Impact: Viewing a maliciously crafted MPEG-4 video file may lead to an unexpected device reset        
Description: A design issue exists in WebKit's handling of HTTP redirects. When a form submission is redirected to a website that also does a redirection, the information contained in the submitted form may be sent to the third site. This issue is addressed through improved handling of HTTP redirects. Credit to Marc Worrell of WhatWebWhat for reporting this issue.   Description: When Safari reaches a website via a 302 redirection and a certificate warning is displayed, the URL bar will contain the original website URL instead of the current website URL. This may allow a maliciously crafted website that is reached via an open redirector on a user-trusted website to control the displayed website URL while a certificate warning is displayed. This issue is addressed by returning the correct URL in the underlying CFNetwork layer. Credit to Kevin Day of Your.Org, and Jason Mueller of Indiana University for reporting this issue.       Description: An input validation issue exists in the handling of MPEG-4 video files. Viewing a maliciously crafted MPEG-4 video file may lead to an unexpected device reset. This update addresses the issue through improved handling of MPEG-4 video files. Credit to Si Brindley for reporting this issue.        
                     
WebKit   Settings       Profiles        
CVE-ID: CVE-2010-1782   CVE-ID: CVE-2010-1756       CVE-ID: CVE-2009-1679        
Available for: iOS 2.0 through 4.0.2 for iPhone 3G and later, iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later   Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later       Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1        
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution   Impact: A user may be misled as to the actual operational wireless network       Impact: Installing a configuration profile may weaken the passcode policy defined by Exchange ActiveSync        
Description: A memory corruption issue exists in WebKit's rendering of inline elements. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved bounds checking. Credit to wushi of team509 for reporting this issue.   Description: A design issue exists in the Settings application. When connected a hidden wireless network, the Settings application may incorrectly indicate another wireless network. This issue is addressed by properly displaying the active wireless network. Credit to Wilfried Teiken for reporting this issue.       Description: An issue in the handling of configuration profiles may allow a weaker passcode policy to overwrite the passcode policy already set via Exchange ActiveSync. This may allow a person with physical access to the device to bypass the passcode policy set via Exchange ActiveSync. This update addresses the issue through improved handling of configuration profiles.        
                     
WebKit   WebKit       Safari        
CVE-ID: CVE-2010-1781   CVE-ID: CVE-2009-2195       CVE-ID: CVE-2009-1680        
Available for: iOS 2.0 through 4.0.2 for iPhone 3G and later, iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later   Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later       Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1        
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution   Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution       Impact: Clearing Safari's history via the Settings application does not prevent disclosure of the search history to a person with physical access to the device        
Description: A double free issue exists in WebKit's rendering of inline elements. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory management. Credit to James Robinson of Google, Inc. for reporting this issue.   Description: A buffer overflow exists in WebKit's parsing of floating point numbers. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. The issue is addressed through improved bounds checking. Credit: Apple.       Description: Clearing Safari's history via the Settings application does not reset the search history. In this case, another person with physical access to the device may be able to view the search history. This update addresses the issue by removing the search history when Safari's history is cleared via the Settings application. Credit to Joshua Belsky for reporting this issue.        
                     
WebKit   WebKit       Safari        
CVE-ID: CVE-2010-1784   CVE-ID: CVE-2009-2816       CVE-ID: CVE-2009-1681        
Available for: iOS 2.0 through 4.0.2 for iPhone 3G and later, iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later   Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later       Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1        
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution   Impact: Visiting a maliciously crafted website may result in unexpected actions on other websites       Impact: Interacting with a maliciously crafted website may result in unexpected actions on other sites        
Description: A memory corruption issue exists in WebKit's handling of CSS counters. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory management. Credit to wushi of team509, working with TippingPoint's Zero Day Initiative for reporting this issue.   Description: An issue exists in WebKit's implementation of Cross-Origin Resource Sharing. Before allowing a page from one origin to access a resource in another origin, WebKit sends a preflight request to the latter server for access to the resource. WebKit includes custom HTTP headers specified by the requesting page in the preflight request. This can facilitate cross-site request forgery. This issue is addressed by removing custom HTTP headers from preflight requests. Credit: Apple.       Description: A design issue exists in the same-origin policy mechanism used to limit interactions between websites. This policy allows websites to load pages from third-party websites into a subframe. This frame may be positioned to entice the user to click a particular element within the frame, an attack referred to as "clickjacking". A maliciously crafted website may be able to manipulate a user into taking an unexpected action, such as initiating a purchase. This update addresses the issue through adoption of the industry-standard 'X-Frame-Options' extension header, that allows individual web pages to opt out of being displayed within a subframe.        
                     
WebKit   WebKit       Telephony        
CVE-ID: CVE-2010-1787   CVE-ID: CVE-2010-0544       CVE-ID: CVE-2009-1683        
Available for: iOS 2.0 through 4.0.2 for iPhone 3G and later, iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later   Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later       Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1        
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution   Impact: Visiting a maliciously crafted website may result in a cross-site scripting attack       Impact: A remote attacker may cause an unexpected device reset        
Description: A memory corruption issue exists in WebKit's handling of floating elements in SVG documents. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory management.   Description: An issue in Webkit's handling of malformed URLs may result in a cross-site scripting attack when visiting a maliciously crafted website. This issue is addressed through improved handling of URLs. Credit to Michal Zalewski of Google, Inc. for reporting this issue.       Description: A logic issue in the handling of ICMP echo request packets may cause an assertion to be triggered. By sending a maliciously crafted ICMP echo request packet, a remote attacker may be able to cause an unexpected device reset. This update addresses the issue by removing the assertion. Credit to Masaki Yoshida for reporting this issue.        
                     
WebKit   WebKit       WebKit        
CVE-ID: CVE-2010-1791   CVE-ID: CVE-2010-1395       CVE-ID: CVE-2008-2320        
Available for: iOS 2.0 through 4.0.2 for iPhone 3G and later, iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later   Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later       Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1        
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution   Impact: Visiting a malicious site may lead to a cross-site scripting attack       Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution        
Description: A signedness issue exists in WebKit's handling of JavaScript arrays. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of JavaScript array indices. Credit to Natalie Silvanovich for reporting this issue.   Description: A scope management issue exists in WebKit's handling of event objects. Visiting a malicious site may lead to a cross-site scripting attack. This issue is addressed through improved handling of event objects. Credit to Gianni "gf3" Chiappetta of Runlevel6 for reporting this issue.       Description: A memory corruption issue exists in WebKit's handling of invalid color strings in Cascading Style Sheets. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved sanitization of color strings. Credit to Thomas Raffetseder of the International Secure Systems Lab for reporting this issue.        
                     
WebKit   WebKit       WebKit        
CVE-ID: CVE-2010-1788   CVE-ID: CVE-2010-0051       CVE-ID: CVE-2009-0945        
Available for: iOS 2.0 through 4.0.2 for iPhone 3G and later, iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later   Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later       Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1        
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution   Impact: Visiting a maliciously crafted website may lead to the disclosure of sensitive information       Impact: Visiting a maliciously crafted website may lead to arbitrary code execution        
Description: A memory corruption issue exists in WebKit's handling of "use" elements in SVG documents. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of "use" elements in SVG documents. Credit to Justin Schuh of Google, Inc. for reporting this issue.   Description: An implementation issue exists in WebKit's handling of cross-origin stylesheet requests. Visiting a maliciously crafted website may disclose the content of protected resources on another website. This issue is addressed by performing additional validation on stylesheets that are loaded during a cross-origin request.       Description: A memory corruption issue exists in WebKit's handling of SVGList objects. Visiting a maliciously crafted website may lead to arbitrary code execution. This update addresses the issue through improved bounds checking. Credit to Nils working with TippingPoint's Zero Day Initiative for reporting this issue.        
                     
WebKit   WebKit       WebKit        
CVE-ID: CVE-2010-1812   CVE-ID: CVE-2010-1390       CVE-ID: CVE-2009-1684        
Available for: iOS 2.0 through 4.0.2 for iPhone 3G and later, iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later   Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later       Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1        
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution   Impact: Visiting a website using UTF-7 encoding may lead to a cross-site scripting attack       Impact: Visiting a maliciously crafted website may result in cross-site scripting        
Description: A use after free issue exists in WebKit's handling of selections. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of selections. Credit to Ojan Vafai of Google, Inc. for reporting this issue.   Description: A canonicalization issue exists in WebKit's handling of UTF-7 encoded text. An HTML quoted string may be left unterminated, leading to a cross-site scripting attack or other issues. This issue is addressed by removing support for UTF-7 encoding in WebKit. Credit to Masahiro Yamada for reporting this issue.       Description: A cross-site scripting issue exists in the separation of JavaScript contexts. A maliciously crafted web page may use an event handler to execute a script in the security context of the next web page that is loaded in its window or frame. This update addresses the issue by ensuring that event handlers are not able to directly affect an in-progress page transition. Credit to Michal Zalewski of Google Inc. for reporting this issue.        
                     
WebKit   WebKit       WebKit        
CVE-ID: CVE-2010-1813   CVE-ID: CVE-2010-0047       CVE-ID: CVE-2009-1685        
Available for: iOS 2.0 through 4.0.2 for iPhone 3G and later, iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later   Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later       Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1        
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution   Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution       Impact: Visiting a maliciously crafted website may result in cross-site scripting        
Description: A memory corruption issue exists in WebKit's rendering of HTML object outlines. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory management. Credit to Jose A. Vazquez of spa-s3c.blogspot.com for reporting this issue.   Description: A use-after-free issue exists in the handling of HTML object element fallback content. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory reference tracking. Credit to wushi of team509, working with TippingPoint's Zero Day Initiative for reporting this issue.       Description: A cross-site scripting issue exists in the separation of JavaScript contexts. By enticing a user to visit a maliciously crafted web page, the attacker may overwrite the 'document.implementation' of an embedded or parent document served from a different security zone. This update addresses the issue by ensuring that changes to 'document.implementation' do not affect other documents. Credit to Dean McNamee of Google Inc. for reporting this issue.        
                     
WebKit   WebKit       WebKit        
CVE-ID: CVE-2010-1814   CVE-ID: CVE-2010-0053       CVE-ID: CVE-2009-1686        
Available for: iOS 2.0 through 4.0.2 for iPhone 3G and later, iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later   Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later       Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1        
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution   Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution       Impact: Visiting a maliciously crafted website may lead to arbitrary code execution        
Description: A memory corruption issue exists in WebKit's handling of form menus. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is fixed through improved handling of form menus. Credit to Csaba Osztrogonac of University of Szeged for reporting this issue.   Description: A use-after-free issue exists in the rendering of content with a CSS display property set to 'run-in'. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory reference tracking. Credit to wushi of team509, working with TippingPoint's Zero Day Initiative for reporting this issue.       Description: A type conversion issue exists in WebKit's JavaScript exception handling. When an attempt is made to assign the exception to a variable that is declared as a constant, an object is cast to an invalid type, causing memory corruption. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue by ensuring that assignment in a const declaration writes to the variable object. Credit to Jesse Ruderman of Mozilla Corporation for reporting this issue.        
                     
WebKit   WebKit       WebKit        
CVE-ID: CVE-2010-1815   CVE-ID: CVE-2010-0050       CVE-ID: CVE-2009-1687        
Available for: iOS 2.0 through 4.0.2 for iPhone 3G and later, iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later   Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later       Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1        
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution   Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution       Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution        
Description: A use after free issue exists in WebKit's handling of scrollbars. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory management. Credit to Tony Chang of Google, Inc for reporting this issue.   Description: A use-after-free issue exists in WebKit's handling of incorrectly nested HTML tags. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory reference tracking. Credit to wushi&Z of team509 working with TippingPoint's Zero Day Initiative for reporting this issue.       Description: A memory corruption issue exists in WebKit's JavaScript garbage collector implementation. If an allocation fails, a memory write to an offset of a NULL pointer may result, leading to an unexpected application termination or arbitrary code execution. This update addresses the issue by checking for allocation failure. Credit to SkyLined of Google Inc. for reporting this issue.        
                     
    WebKit       WebKit        
    CVE-ID: CVE-2010-1406       CVE-ID: CVE-2009-1688, CVE-2009-1689        
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later       Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1        
    Impact: Visiting an HTTPS site which redirects to an HTTP site may lead to an information disclosure       Impact: Visiting a maliciously crafted website may result in a cross-site scripting attack        
    Description: When WebKit is redirected from an HTTPS site to an HTTP site, the Referer header is passed to the HTTP site. This can lead to the disclosure of sensitive information contained in the URL of the HTTPS site. This issue is addressed by not passing the Referer header when an HTTPS site redirects to an HTTP site. Credit to Colin Percival of Tarsnap for reporting this issue.       Description: Multiple issues in WebKit's handling of javascript objects may lead to a cross-site scripting attack. This update addresses the issues through improved handling of cross-site interaction with javascript objects. Credit to Adam Barth of UC Berkeley, and Collin Jackson of Stanford University for reporting these issues.        
                     
    WebKit       WebKit        
    CVE-ID: CVE-2010-0048       CVE-ID: CVE-2009-1690        
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later       Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1        
    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution       Impact: Visiting a maliciously crafted website may result in an unexpected application termination or arbitrary code execution        
    Description: A use-after-free issue exists in WebKit's parsing of XML documents. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory reference tracking.       Description: A memory corruption issue exists in WebKit's handling of recursion in certain DOM event handlers. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved memory management. Credit to SkyLined of Google Inc. for reporting this issue.        
                     
    WebKit       WebKit        
    CVE-ID: CVE-2010-0046       CVE-ID: CVE-2009-1691        
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later       Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1        
    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution       Impact: Visiting a maliciously crafted website may lead to cross-site scripting        
    Description: A memory corruption issue exists in WebKit's handling of CSS format() arguments. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of CSS format() arguments. Credit to Robert Swiecki of Google Inc. for reporting this issue.       Description: A cross-site scripting issue in Safari allows a maliciously crafted website to alter standard JavaScript prototypes of websites served from a different domain. By enticing a user to visit a maliciously crafted web page, an attacker may be able to alter the execution of JavaScript served from other websites. This update addresses the issue through improved access controls on these prototypes.        
                     
    WebKit       WebKit        
    CVE-ID: CVE-2010-0052       CVE-ID: CVE-2009-1692        
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later       Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1        
    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution       Impact: Visiting a maliciously crafted website may lead to an unexpected device reset        
    Description: A use-after-free issue exists in WebKit's handling of callbacks for HTML elements. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory reference tracking. Credit: Apple.       Description: A memory consumption issue exists in the handling of HTMLSelectElement objects. Visiting a maliciously crafted webpage containing an HTMLSelectElement with a very large length attribute may lead to an unexpected device reset. This update addresses the issue through improved handling of HTMLSelectElement objects. Credit to Thierry Zoller of G-SEC (www.g-sec.lu) for reporting this issue.        
                     
    WebKit       WebKit        
    CVE-ID: CVE-2010-1397       CVE-ID: CVE-2009-1693        
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later       Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1        
    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution       Impact: Visiting a maliciously crafted website may disclose images from other sites        
    Description: A use after free issue exists in WebKit's rendering of a selection when the layout changes. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of selections. Credit to wushi&Z of team509, working with TippingPoint's Zero Day Initiative for reporting this issue.       Description: A cross-site image capture issue exists in WebKit. By using a canvas with an SVG image, a maliciously crafted website may load and capture an image from another website. This update addresses the issue by restricting the reading of canvases that have images loaded from other websites. Credit to Chris Evans of Google Inc. for reporting this issue.        
                     
    WebKit       WebKit        
    CVE-ID: CVE-2010-0049       CVE-ID: CVE-2009-1694        
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later       Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1        
    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution       Impact: Visiting a maliciously crafted website may disclose images from other sites        
    Description: A use-after-free issue exists in the handling of HTML elements containing right-to-left displayed text. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory reference tracking. Credit to wushi&Z of team509 for reporting this issue.       Description: A cross-site image capture issue exists in WebKit. By using a canvas and a redirect, a maliciously crafted website may load and capture an image from another website. This update addresses the issue through improving the handling of redirects. Credit to Chris Evans of for reporting this issue.        
                     
    WebKit       WebKit        
    CVE-ID: CVE-2010-1393       CVE-ID: CVE-2009-1695        
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later       Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1        
    Impact: Visiting a maliciously crafted website may lead to an information disclosure       Impact: Visiting a maliciously crafted website may result in a cross-site scripting attack        
    Description: An information disclosure issue exists in WebKit's handling of Cascading Stylesheets. If a stylesheet's HREF attribute is set to a URL that causes a redirection, scripts on the page may be able to access the redirected URL. Visiting a maliciously crafted website may lead to the disclosure of sensitive URLs on another site. This issue is addressed by returning the original URL to scripts, rather than the redirected URL.       Description: An issue in WebKit allows the contents of a frame to be accessed by an HTML document after a page transition has taken place. This may allow a maliciously crafted website to perform a cross-site scripting attack. This update addresses the issue through an improved domain check. Credit to Feng Qian of Google Inc. for reporting this issue.        
                     
    WebKit       WebKit        
    CVE-ID: CVE-2010-0054       CVE-ID: CVE-2009-1696        
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later       Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1        
    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution       Impact: Websites may surreptitiously track users        
    Description: A use-after-free issue exists in WebKit's handling of HTML image elements. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory reference tracking. Credit: Apple.       Description: Safari generates random numbers for JavaScript applications using a predictable algorithm. This could allow a website to track a particular Safari session without using cookies, hidden form elements, IP addresses, or other techniques. This update addresses the issue by using a better random number generator. Credit to Amit Klein of Trusteer for reporting this issue.        
                     
    WebKit       WebKit        
    CVE-ID: CVE-2010-1119       CVE-ID: CVE-2009-1697        
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later       Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1        
    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution       Impact: Visiting a maliciously crafted website may result in a cross-site scripting attack        
    Description: A use after free issue exists in WebKit's handling of attribute manipulation. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory reference tracking. Credit to Vincenzo Iozzo and Ralf Philipp Weinmann working with TippingPoint's Zero Day Initiative, and Michal Zalewski of Google, Inc., for reporting this issue.       Description: A CRLF injection issue exists in the handling of XMLHttpRequest headers in WebKit. This may allow a malicious website to bypass the same-origin policy by issuing an XMLHttpRequest that does not contain a Host header. XMLHttpRequests without a Host header may reach other websites on the same server, and allow attacker-supplied JavaScript to interact with those sites. This update addresses the issue through improved handling of XMLHttpRequest headers. Credit to Per von Zweigbergk for reporting this issue.        
                     
    WebKit       WebKit        
    CVE-ID: CVE-2010-1387       CVE-ID: CVE-2009-1698        
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later       Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1        
    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution       Impact: Viewing a maliciously crafted web page may lead to an unexpected application termination or arbitrary code execution        
    Description: A use after free issue exists in JavaScriptCore during page transitions. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory management.       Description: An uninitialized pointer issue exists in the handling of the CSS 'attr' function. Viewing a maliciously crafted web page may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through additional validation of CSS elements. Credit to Thierry Zoller working with TippingPoint's Zero Day Initiative, and Robert Swiecki of the Google Security Team for reporting this as a security issue.        
                     
    WebKit       WebKit        
    CVE-ID: CVE-2010-1400       CVE-ID: CVE-2009-1699        
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later       Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1        
    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution       Impact: Visiting a maliciously crafted website may result in an information disclosure        
    Description: A use after free issue exists in WebKit's handling of caption elements. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of caption elements. Credit to regenrecht working with iDefense for reporting this issue.       Description: An XML External Entity issue exists in WebKit's handling of XML. Visiting a maliciously crafted website may result in the website being able to read files from the user's system. This update addresses the issue by not loading external entities across origins. Credit to Chris Evans of Google Inc. for reporting this issue.        
                     
    WebKit       WebKit        
    CVE-ID: CVE-2010-1409       CVE-ID: CVE-2009-1700        
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later       Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1        
    Impact: Visiting a maliciously crafted website may allow remotely specified data to be sent to an IRC server       Impact: Visiting a maliciously crafted website may result in the disclosure of sensitive information        
    Description: Common IRC service ports are not included in WebKit's port blacklist. Visiting a maliciously crafted website may allow remotely specified data to be sent to an IRC server. This may cause the server to take unintended actions on the user's behalf. This issue is addressed by adding the affected ports to WebKit's port blacklist.       Description: WebKit does not properly handle redirects when processing Extensible Stylesheet Language Transformations (XSLT). This allows a maliciously crafted website to retrieve XML content from pages on other websites, which could result in the disclosure of sensitive information. This update addresses the issue by ensuring that documents referenced in transformations are downloaded from the same domain as the transformation itself. Credit to Chris Evans of Google Inc. for reporting this issue.        
                     
    WebKit       WebKit        
    CVE-ID: CVE-2010-1398       CVE-ID: CVE-2009-1701        
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later       Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1        
    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution       Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution        
    Description: A memory corruption issue exists in WebKit's handling of ordered list insertions. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of list insertions. Credit to wushi of team509, working with TippingPoint's Zero Day Initiative for reporting this issue.       Description: A use-after-free issue exists in WebKit's handling of the JavaScript DOM. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved handling of document elements. Credit to wushi & ling of team509 working with TippingPoint's Zero Day Initiative for reporting this issue.        
                     
    WebKit       WebKit        
    CVE-ID: CVE-2010-1402       CVE-ID: CVE-2009-1702        
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later       Available for: iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1        
    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution       Impact: Visiting a malicious website may lead to a cross-site scripting attack        
    Description: A double free issue exists in WebKit's handling of event listeners in SVG images. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of SVG images. Credit to wushi of team509, working with TippingPoint's Zero Day Initiative for reporting this issue.       Description: An issue in WebKit's handling of Location and History objects may result in a cross-site scripting attack when visiting a malicious website. This update addresses the issue through improved handling of Location and History objects. Credit to Adam Barth and Joel Weinberger of UC Berkeley for reporting this issue.        
                     
    WebKit                
    CVE-ID: CVE-2010-1394                
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later                
    Impact: Visiting a maliciously crafted website may lead to a cross-site scripting attack                
    Description: A design issue exists in WebKit's handling of HTML document fragments. The contents of HTML document fragments are processed before a fragment is actually added to a document. Visiting a maliciously crafted website could lead to a cross-site scripting attack if a legitimate website attempts to manipulate a document fragment containing untrusted data. This issue is addressed by ensuring that initial fragment parsing has no side effects on the document that created the fragment. Credit to Eduardo Vela Nava (sirdarckcat) of Google Inc. for reporting this issue.                
                     
    WebKit                
    CVE-ID: CVE-2010-1399                
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later                
    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution                
    Description: An uninitialized memory access issue exists in WebKit's handling of selection changes on form input elements. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of selections. Credit to wushi of team509, working with TippingPoint's Zero Day Initiative for reporting this issue.                
                     
    WebKit                
    CVE-ID: CVE-2010-1396                
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later                
    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution                
    Description: A use after free issue exists in WebKit's handling of the removal of container elements. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory reference tracking. Credit to wushi of team509, working with TippingPoint's Zero Day Initiative for reporting this issue.                
                     
    WebKit                
    CVE-ID: CVE-2010-1401                
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later                
    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution                
    Description: A use after free issue exists in WebKit's handling of the ':first-letter' pseudo-element in cascading stylesheets. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of the ':first-letter' pseudo-element. Credit to wushi of team509, working with TippingPoint's Zero Day Initiative for reporting this issue.                
                     
    WebKit                
    CVE-ID: CVE-2010-1403                
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later                
    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution                
    Description: An uninitialized memory access issue exists in WebKit's handling of malformed XML when rendering SVG images. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of SVG images. Credit to wushi of team509, working with TippingPoint's Zero Day Initiative, for reporting this issue.                
                     
    WebKit                
    CVE-ID: CVE-2010-1404                
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later                
    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution                
    Description: A use after free issue exists in WebKit's handling of SVG images with multiple 'use' elements. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of 'use' elements in SVG images. Credit to wushi of team509, working with TippingPoint's Zero Day Initiative for reporting this issue.                
                     
    WebKit                
    CVE-ID: CVE-2010-1410                
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later                
    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution                
    Description: A memory corruption issue exists in WebKit's handling of malformed XML in SVG images. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of XML in SVG images. Credit to Aki Helin of OUSPG for reporting this issue.                
                     
    WebKit                
    CVE-ID: CVE-2010-1391                
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later                
    Impact: Visiting a maliciously crafted website may cause files to be created in arbitrary user-writable locations                
    Description: A path traversal issue exists in WebKit's support for Local Storage and Web SQL databases. If accessed from an application-defined scheme containing '%2f' (/) or '%5c' (\) and '..' in the host section of the URL, a maliciously crafted website may cause database files to be created outside of the designated directory. This issue is addressed by encoding characters that may have special meaning in pathnames. This issue does not affect sites served from http: or https: schemes. Credit: Apple.                
                     
    WebKit                
    CVE-ID: CVE-2010-1408                
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later                
    Impact: Visiting a maliciously crafted website may result in sending remotely specified data to arbitrary TCP ports                
    Description: An integer truncation issue exists in WebKit's handling of requests to non-default TCP ports. Visiting a maliciously crafted website may result in sending remotely specified data to arbitrary TCP ports. This issue is addressed by ensuring that port numbers are within the valid range.                
                     
    WebKit                
    CVE-ID: CVE-2010-1392                
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later                
    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution                
    Description: A use after free issue exists in WebKit's rendering of HTML buttons. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory management. Credit to Matthieu Bonetti of VUPEN Vulnerability Research Team for reporting this issue.                
                     
    WebKit                
    CVE-ID: CVE-2010-1405                
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later                
    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution                
    Description: A use after free issue exists in WebKit's handling of HTML elements with custom vertical positioning. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory reference tracking. Credit to Ojan Vafai of Google Inc. for reporting this issue.                
                     
    WebKit                
    CVE-ID: CVE-2010-1407                
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later                
    Impact: Visiting a maliciously crafted website may result in an information disclosure                
    Description: An information disclosure issue exists in WebKit's handling of the 'history.replaceState' method. Within an iframe, calls to replaceState affect the parent frame even if the parent is in a separate origin. Visiting a maliciously crafted website may result in an information disclosure. This issue is addressed by restricting the operation of replaceState calls to the current frame. Credit to Darin Fisher of Google Inc. for reporting this issue.                
                     
    WebKit                
    CVE-ID: CVE-2010-1757                
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later                
    Impact: Websites with embedded iframe elements may be vulnerable to user interface spoofing                
    Description: Safari allows an iframe element to display content outside its boundaries, which may lead to user interface spoofing. This issue is addressed by not allowing iframe elements to display content outside their boundaries. Credit to Wayne Pan of AdMob, Inc. for reporting this issue.                
                     
    WebKit                
    CVE-ID: CVE-2010-1413                
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later                
    Impact: A user's NTLM credentials may be exposed to a man in the middle attacker                
    Description: In certain circumstances, WebKit may send NTLM credentials in plain text. This would allow a man in the middle attacker to view the NTLM credentials. This issue is addressed through improved handling of NTLM credentials. Credit: Apple.                
                     
    WebKit                
    CVE-ID: CVE-2010-1389                
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later                
    Impact: Dragging or pasting a selection may lead to a cross-site scripting attack                
    Description: Dragging or pasting a selection from one site to another may allow scripts contained in the selection to be executed in the context of the new site. This issue is addressed through additional validation of content before a paste or a drag and drop operation. Credit to Paul Stone of Context Information Security for reporting this issue.                
                     
    WebKit                
    CVE-ID: CVE-2010-0544                
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later                
    Impact: Visiting a maliciously crafted website may result in a cross-site scripting attack                
    Description: An issue in Webkit's handling of malformed URLs may result in a cross-site scripting attack when visiting a maliciously crafted website. This issue is addressed through improved handling of URLs. Credit to Michal Zalewski of Google, Inc. for reporting this issue.                
                     
    WebKit                
    CVE-ID: CVE-2010-1417                
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later                
    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution                
    Description: A memory corruption issue exists in WebKit's rendering of CSS-styled HTML content with multiple :after pseudo-selectors. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved rendering of HTML content. Credit to wushi of team509 for reporting this issue.                
                     
    WebKit                
    CVE-ID: CVE-2010-1414                
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later                
    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution                
    Description: A use after free issue exists in WebKit's handling of the removeChild DOM method. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of child element removal. Credit to Mark Dowd of Azimuth Security for reporting this issue.                
                     
    WebKit                
    CVE-ID: CVE-2010-1418                
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later                
    Impact: Visiting a maliciously crafted website may lead to a cross-site scripting attack                
    Description: An input validation issue exists in WebKit's handling of the src attribute of the frame element. An attribute with a javascript scheme and leading spaces is considered valid. Visiting a maliciously crafted website could lead to a cross-site scripting attack. This update addresses the issue by properly validating frame.src before the URL is dereferenced. Credit to Sergey Glazunov for reporting this issue.                
                     
    WebKit                
    CVE-ID: CVE-2010-1416                
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later                
    Impact: Visiting a maliciously crafted website may disclose images from other sites                
    Description: A cross-site image capture issue exists in WebKit. By using a canvas with an SVG image pattern, a maliciously crafted website may load and capture an image from another website. This issue is addressed by restricting the reading of canvases that contain patterns loaded from other websites. Credit to Chris Evans of Google Inc. for reporting this issue.                
                     
    WebKit                
    CVE-ID: CVE-2010-1415                
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later                
    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution                
    Description: An API abuse issue exists in WebKit's handling of libxml contexts. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of libxml context objects. Credit to Aki Helin of OUSPG for reporting this issue.                
                     
    WebKit                
    CVE-ID: CVE-2010-1758                
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later                
    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution                
    Description: A use after free issue exists in WebKit's handling of DOM Range objects. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of DOM Range objects. Credit to Yaar Schnitman of Google Inc. for reporting this issue.                
                     
    WebKit                
    CVE-ID: CVE-2010-1759                
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later                
    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution                
    Description: A use after free issue exists in WebKit's handling of the Node.normalize method. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of the Node.normalize method. Credit to Mark Dowd for reporting this issue.                
                     
    WebKit                
    CVE-ID: CVE-2010-1761                
    Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.2 or later, Mac OS X Server v10.6.2 or later, Windows 7, Vista, XP SP2 or later                
    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution                
    Description: A use after free issue exists in WebKitĘs rendering of HTML document subtrees. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved rendering of HTML document subtrees. Credit to James Robinson of Google Inc. for reporting this issue.                
                     
    WebKit                
    CVE-ID: CVE-2010-1762                
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later                
    Impact: Visiting a maliciously crafted website may lead to a cross-site scripting attack                
    Description: A design issue exists in the handling of HTML contained in textarea elements. Visiting a maliciously crafted website may lead to a cross-site scripting attack. This issue is addressed through improved validation of textarea elements. Credit to Eduardo Vela Nava (sirdarckcat) of Google Inc. for reporting this issue.                
                     
    WebKit                
    CVE-ID: CVE-2010-1769                
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later                
    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution                
    Description: An out of bounds memory access issue exists in WebKit's handling of tables. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved bounds checking. Credit to wushi of team509 for reporting this issue.                
                     
    WebKit                
    CVE-ID: CVE-2010-1774                
    Available for: iOS 2.0 through 3.1.3 for iPhone 3G and later, iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later                
    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution                
    Description: An out of bounds memory access issue exists in WebKit's handling of HTML tables. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved bounds checking. Credit to wushi of team509 for reporting this issue.