Rapid7 Vulnerability & Exploit Database

Gentoo Linux: CVE-2010-3813: Multiple packages, Multiple vulnerabilities fixed in 2011

Back to Search

Gentoo Linux: CVE-2010-3813: Multiple packages, Multiple vulnerabilities fixed in 2011

Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
Published
11/22/2010
Created
07/25/2018
Added
10/30/2017
Modified
04/05/2018

Description

The WebCore::HTMLLinkElement::process function in WebCore/html/HTMLLinkElement.cpp in WebKit, as used in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4; webkitgtk before 1.2.6; and possibly other products does not verify whether DNS prefetching is enabled when processing an HTML LINK element, which allows remote attackers to bypass intended access restrictions, as demonstrated by an HTML e-mail message that uses a LINK element for X-Confirm-Reading-To functionality.

Solution(s)

  • gentoo-linux-upgrade-app-admin-syslog-ng
  • gentoo-linux-upgrade-app-misc-ca-certificates
  • gentoo-linux-upgrade-app-office-gnucash
  • gentoo-linux-upgrade-dev-db-unixodbc
  • gentoo-linux-upgrade-dev-libs-xmlsec
  • gentoo-linux-upgrade-dev-php-pear-mail
  • gentoo-linux-upgrade-dev-php-pear-pear
  • gentoo-linux-upgrade-dev-util-oprofile
  • gentoo-linux-upgrade-dev-util-qt-creator
  • gentoo-linux-upgrade-dev-vcs-gitolite
  • gentoo-linux-upgrade-games-sports-racer-bin
  • gentoo-linux-upgrade-gnome-base-gdm
  • gentoo-linux-upgrade-media-libs-fmod
  • gentoo-linux-upgrade-media-libs-xine-lib
  • gentoo-linux-upgrade-media-sound-lastfmplayer
  • gentoo-linux-upgrade-net-analyzer-sflowtool
  • gentoo-linux-upgrade-net-libs-libsoup
  • gentoo-linux-upgrade-net-libs-webkit-gtk
  • gentoo-linux-upgrade-net-misc-mrouted
  • gentoo-linux-upgrade-net-misc-rsync
  • gentoo-linux-upgrade-net-misc-vino
  • gentoo-linux-upgrade-sys-apps-shadow
  • gentoo-linux-upgrade-sys-cluster-resource-agents
  • gentoo-linux-upgrade-sys-fs-lvm2
  • gentoo-linux-upgrade-x11-apps-xrdb

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;