TippingPoint Zero Day Initiative

Apple Webkit Anchor Tag Mouse Click Event Dispatch Remote Code Execution Vulnerability

ZDI-10-146: August 9th, 2010


CVSS Score

Affected Vendors

Affected Products

TippingPoint™ IPS Customer Protection

TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 10141. For further product information on the TippingPoint IPS:

Vulnerability Details

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari's Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the library's support for mouse events on a particular element. If a mouse event is dispatched to an element when one of it's attributes is undefined, the library will dereference a memory pointer pointing to arbitrary data. Usage of this element can then lead to code execution under the context of the application.

Vendor Response

Apple states:


Disclosure Timeline

    2010-06-01 - Vulnerability reported to vendor
    2010-08-09 - Coordinated public release of advisory


This vulnerability was discovered by:
    wushi of team509