Vulnerability Name:

CVE-2010-0647 (CCN-56214)

Assigned:2010-02-10
Published:2010-02-10
Updated:2017-09-19
Summary:WebKit before r53525, as used in Google Chrome before 4.0.249.89, allows remote attackers to execute arbitrary code in the Chrome sandbox via a malformed RUBY element, as demonstrated by a <ruby>><table><rt> sequence.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-94
Vulnerability Consequences:Gain Access
References:Source: CONFIRM
Type: UNKNOWN
http://code.google.com/p/chromium/issues/detail?id=31692

Source: MITRE
Type: CNA
CVE-2010-0647

Source: CCN
Type: Google Chrome Releases
Stable Channel Update

Source: CONFIRM
Type: Patch
http://googlechromereleases.blogspot.com/2010/02/stable-channel-update.html

Source: SUSE
Type: UNKNOWN
SUSE-SR:2011:002

Source: CCN
Type: SA38545
Google Chrome Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
38545

Source: SECUNIA
Type: UNKNOWN
41856

Source: SECUNIA
Type: UNKNOWN
43068

Source: CCN
Type: SECTRACK ID: 1023583
Google Chrome Bugs Let Remote Users Execute Arbitrary Code and Obtain Information

Source: SECTRACK
Type: UNKNOWN
1023583

Source: CONFIRM
Type: Vendor Advisory
http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs

Source: CONFIRM
Type: UNKNOWN
http://trac.webkit.org/changeset/53525

Source: CCN
Type: Google Web site
Google Chrome Frame-Bring open web technologies to your browser

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2011:039

Source: OSVDB
Type: UNKNOWN
62317

Source: CCN
Type: OSVDB ID: 62317
Google Chrome ruby Tag Handling Arbitrary Code Execution

Source: BID
Type: UNKNOWN
38177

Source: CCN
Type: BID-38177
Google Chrome prior to 4.0.249.89 Multiple Security Vulnerabilities

Source: UBUNTU
Type: UNKNOWN
USN-1006-1

Source: VUPEN
Type: Vendor Advisory
ADV-2010-0361

Source: VUPEN
Type: UNKNOWN
ADV-2010-2722

Source: VUPEN
Type: UNKNOWN
ADV-2011-0212

Source: VUPEN
Type: UNKNOWN
ADV-2011-0552

Source: CONFIRM
Type: UNKNOWN
https://bugs.webkit.org/show_bug.cgi?id=33266

Source: XF
Type: UNKNOWN
googlechrome-ruby-tags-code-exec(56214)

Source: XF
Type: UNKNOWN
googlechrome-ruby-tags-code-exec(56214)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:14094

Source: SUSE
Type: SUSE-SR:2011:002
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:apple:webkit:*:*:*:*:*:*:*:* (Version <= r53475)
  • AND
  • cpe:/a:google:chrome:0.2.149.27:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:0.2.149.29:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:0.2.149.30:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:0.2.152.1:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:0.2.153.1:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:0.3.154.0:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:0.3.154.3:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:0.4.154.18:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:0.4.154.22:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:0.4.154.31:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:0.4.154.33:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:1.0.154.36:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:1.0.154.39:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:1.0.154.42:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:1.0.154.43:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:1.0.154.46:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:1.0.154.48:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:1.0.154.52:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:1.0.154.53:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:1.0.154.59:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:1.0.154.65:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:2.0.156.1:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:2.0.157.0:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:2.0.157.2:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:2.0.158.0:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:2.0.159.0:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:2.0.169.0:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:2.0.169.1:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:2.0.170.0:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:2.0.172:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:2.0.172.2:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:2.0.172.8:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:2.0.172.27:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:2.0.172.28:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:2.0.172.30:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:2.0.172.31:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:2.0.172.33:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:2.0.172.37:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:2.0.172.38:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:3.0.182.2:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:3.0.190.2:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:3.0.193.2:beta:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:3.0.195.21:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:3.0.195.24:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:3.0.195.32:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:3.0.195.33:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:4.0.244.0:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:*:*:*:*:*:*:*:* (Version <= 4.0.249.78)

  • Configuration CCN 1:
  • cpe:/a:google:chrome:0.2.149.27:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:0.2.149.29:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:0.2.149.30:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:1.0.154.36:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:1.0.154.53:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:1.0.154.46:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:1.0.154.59:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:1.0.154.48:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:1.0.154.64:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:1.0.154.65:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:2.0.172.30:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:2.0.172.31:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:2.0.172.33:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:2.0.172.37:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:3.0.195.24:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:3.0.195.33:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20100647
    V
    CVE-2010-0647
    2015-11-16
    oval:org.mitre.oval:def:14094
    V
    WebKit before r53525, as used in Google Chrome before 4.0.249.89, allows remote attackers to execute arbitrary code in the Chrome sandbox via a malformed RUBY element.
    2014-04-07
    BACK
    apple webkit *
    google chrome 0.2.149.27
    google chrome 0.2.149.29
    google chrome 0.2.149.30
    google chrome 0.2.152.1
    google chrome 0.2.153.1
    google chrome 0.3.154.0
    google chrome 0.3.154.3
    google chrome 0.4.154.18
    google chrome 0.4.154.22
    google chrome 0.4.154.31
    google chrome 0.4.154.33
    google chrome 1.0.154.36
    google chrome 1.0.154.39
    google chrome 1.0.154.42
    google chrome 1.0.154.43
    google chrome 1.0.154.46
    google chrome 1.0.154.48
    google chrome 1.0.154.52
    google chrome 1.0.154.53
    google chrome 1.0.154.59
    google chrome 1.0.154.65
    google chrome 2.0.156.1
    google chrome 2.0.157.0
    google chrome 2.0.157.2
    google chrome 2.0.158.0
    google chrome 2.0.159.0
    google chrome 2.0.169.0
    google chrome 2.0.169.1
    google chrome 2.0.170.0
    google chrome 2.0.172
    google chrome 2.0.172.2
    google chrome 2.0.172.8
    google chrome 2.0.172.27
    google chrome 2.0.172.28
    google chrome 2.0.172.30
    google chrome 2.0.172.31
    google chrome 2.0.172.33
    google chrome 2.0.172.37
    google chrome 2.0.172.38
    google chrome 3.0.182.2
    google chrome 3.0.190.2
    google chrome 3.0.193.2 beta
    google chrome 3.0.195.21
    google chrome 3.0.195.24
    google chrome 3.0.195.32
    google chrome 3.0.195.33
    google chrome 4.0.244.0
    google chrome *
    google chrome 0.2.149.27
    google chrome 0.2.149.29
    google chrome 0.2.149.30
    google chrome 1.0.154.36
    google chrome 1.0.154.53
    google chrome 1.0.154.46
    google chrome 1.0.154.59
    google chrome 1.0.154.48
    google chrome 1.0.154.64
    google chrome 1.0.154.65
    google chrome 2.0.172.30
    google chrome 2.0.172.31
    google chrome 2.0.172.33
    google chrome 2.0.172.37
    google chrome 3.0.195.24
    google chrome 3.0.195.33