SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Web Browser)  >   Apple Safari Vendors:   Apple Computer
Safari for Windows Bug with IE Trusted Zone Sites Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1020329
SecurityTracker URL:  http://securitytracker.com/id/1020329
CVE Reference:   CVE-2008-2306   (Links to External Site)
Date:  Jun 19 2008
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 3.1.2
Description:   A vulnerability was reported in Safari. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create specially crafted HTML that, when loaded by the target user, will cause an executable file to be downloaded and executed on the target user's system. The code will run with the privileges of the target user.

Websites in an Internet Explorer 7 zone with the "Launching applications and unsafe files" setting set to "Enable" or websites in the Internet Explorer 6 "Local intranet" or "Trusted sites" zone on the target user's system can exploit this vulnerability.

Only Windows-based systems are affected.

Will Dormann of CERT/CC reported this vulnerability.

Impact:   A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   The vendor has issued a fixed version (3.1.2 for Windows), available via the Apple Software Update application, or Apple's Safari download site at:

http://www.apple.com/safari/download/

Safari for Windows XP or Vista
The download file is named: "SafariSetup.exe"
Its SHA-1 digest is: c63db818658532d3ff2762378b0b7b7e6aace0d6

Safari+QuickTime for Windows XP or Vista
The file is named: "SafariQuickTimeSetup.exe"
Its SHA-1 digest is: 22ebca0a88b5814e22f015daea1be27489e6e7be

Vendor URL:  support.apple.com/kb/HT1222 (Links to External Site)
Cause:   Access control error
Underlying OS:   Windows (Vista), Windows (XP)

Message History:   None.


 Source Message Contents

Date:  Thu, 19 Jun 2008 13:58:03 -0700
Subject:  APPLE-SA-2008-06-19 Safari v3.1.2 for Windows

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2008-06-19 Safari v3.1.2 for Windows

Safari v3.1.2 for Windows is now available and addresses the
following issues:

Safari
CVE-ID:  CVE-2008-1573
Available for:  Windows XP or Vista
Impact:  Viewing a maliciously crafted BMP or GIF image may lead to
information disclosure
Description:  An out-of-bounds memory read may occur in the handling
of BMP and GIF images, which may lead to the disclosure of memory
contents. This update addresses the issue by performing additional
validation of BMP and GIF images. This issue is addressed in systems
running Mac OS X v10.5.3, and in Mac OS X v10.4.11 with Security
Update 2008-003. Credit to Gynvael Coldwind of Hispasec for reporting
this issue.

Safari
CVE-ID:  CVE-2008-2540
Available for:  Windows XP or Vista
Impact:  Saving untrusted files to the Windows desktop may lead to
the execution of arbitrary code
Description:  An issue exists in how the Windows desktop handles
executables. Saving an untrusted file to the Windows desktop may
trigger the issue, and lead to the execution of arbitrary code. Web
browsers are a means by which files may be saved to the desktop. To
help mitigate this issue, the Safari browser has been updated to
prompt the user prior to saving a download file. Also, the default
download location is changed to the user's Downloads folder on
Windows Vista, and to the user's Documents folder on Windows XP. This
issue does not exist on systems running Mac OS X. Additional
information is available from
http://www.microsoft.com/technet/security/advisory/953818.mspx which
credits Aviv Raff with reporting the issue.

Safari
CVE-ID:  CVE-2008-2306
Available for:  Windows XP or Vista
Impact:  Visiting a malicious website which is in a trusted Internet
Explorer zone may lead to the automatic execution of arbitrary code
Description:  If a website is in an Internet Explorer 7 zone with the
"Launching applications and unsafe files" setting set to "Enable", or
if a website is in the Internet Explorer 6 "Local intranet" or
"Trusted sites" zone, Safari will automatically launch executable
files that are downloaded from the site. This update addresses the
issue by not automatically launching downloaded executable files, and
by prompting the user before downloading a file if the "always
prompt" setting is enabled. This issue does not exist on systems
running Mac OS X. Credit to Will Dormann of CERT/CC for reporting
this issue.

WebKit
CVE-ID:  CVE-2008-2307
Available for:  Windows XP or Vista
Impact:  Visiting a maliciously crafted website may lead to an
unexpected application termination or arbitrary code execution
Description:  A memory corruption issue exists in WebKit's handling
of JavaScript arrays. Visiting a maliciously crafted website may lead
to an unexpected application termination or arbitrary code execution.
This update addresses the issue through improved bounds checking.
Credit to James Urquhart for reporting this issue.

Safari v3.1.2 for Windows is available via the Apple Software Update
application, or Apple's Safari download site at:
http://www.apple.com/safari/download/

Safari for Windows XP or Vista
The download file is named:  "SafariSetup.exe"
Its SHA-1 digest is:  c63db818658532d3ff2762378b0b7b7e6aace0d6

Safari+QuickTime for Windows XP or Vista
The file is named:  "SafariQuickTimeSetup.exe"
Its SHA-1 digest is:  22ebca0a88b5814e22f015daea1be27489e6e7be

Information will also be posted to the Apple Security Updates
web site:  http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key,
and details are available at:
http://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
Version: 9.7.2.1608

wsBVAwUBSFqRZHkodeiKZIkBAQgxiAf9HapNeskNLM++Bjfc3T37jpGOe1LRPdMc
GNuCnUIrHzVcr5ZenYRwndz1LtH0Ui6kCo7sazGYAbqEZjNmFUusdByOIo6KikKf
ejntmZsgRGLh7qlTOCwBO/9DptAfrGWQZMqhES1u/enfKjBgg/2ijq/DZhhBlTrA
QQBp6xtDk8aIiIui8UdYFSauyoSOAuomaHTtMU2Wis6h2hHE8rmwG9/9TRZo5Woc
SkzeDi0pjxpyCrEQ3LARBxMd3eEaZx/+2PQeY30m3VKKpenUuj+G7D7Ejz+Uu7Nk
ej6u3zdHmnHAcoAE9gmOPxKCZ0XemzuULzi824EN+aLkqHz0CgWNSg==
=iDKS
-----END PGP SIGNATURE-----

 _______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list      (Security-announce@lists.apple.com)
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC