Use-after-free vulnerability in WebKit, as used in Apple Safari before 5.0.5; iOS before 4.3.2 for iPhone, iPod, and iPad; iOS before 4.2.7 for iPhone 4 (CDMA); and possibly other products allows remote attackers to execute arbitrary code by adding children to a WBR tag and then removing the tag, related to text nodes, as demonstrated by Chaouki Bekrar during a Pwn2Own competition at CanSecWest 2011.
https://exchange.xforce.ibmcloud.com/vulnerabilities/66061
http://www.zerodayinitiative.com/advisories/ZDI-11-135
http://www.zdnet.com/blog/security/safarimacbook-first-to-fall-at-pwn2own-2011/8358
http://www.vupen.com/english/advisories/2011/0984
http://www.securitytracker.com/id?1025363
http://www.securityfocus.com/bid/46822
http://www.securityfocus.com/archive/1/517517/100/0/threaded
http://www.securityfocus.com/archive/1/517505/100/0/threaded
http://www.computerworld.com/s/article/9214002/Safari_IE_hacked_first_at_Pwn2Own
http://twitter.com/aaronportnoy/statuses/45632544967901187
http://support.apple.com/kb/HT4607
http://support.apple.com/kb/HT4596
http://secunia.com/advisories/44154
http://secunia.com/advisories/44151
http://lists.apple.com/archives/security-announce/2011//Apr/msg00002.html
http://lists.apple.com/archives/security-announce/2011//Apr/msg00001.html
http://lists.apple.com/archives/security-announce/2011//Apr/msg00000.html