SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Web Browser)  >   Apple Safari Vendors:   Apple Computer
Apple Safari WebKit Bug in Procesing Numeric Character References Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1022526
SecurityTracker URL:  http://securitytracker.com/id/1022526
CVE Reference:   CVE-2009-1725   (Links to External Site)
Date:  Jul 8 2009
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 4.0.2
Description:   A vulnerability was reported in Apple Safari. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create specially crafted HTML containing numeric character references that, when loaded by the target user, will trigger a memory corruption error in WebKit and execute arbitrary code on the target system. The code will run with the privileges of the target user.

Chris Evans reported this vulnerability.

Impact:   A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   The vendor has issued a fix (4.0.2), available via the Apple Software Update application or Apple's Safari download site at:

http://www.apple.com/safari/download/

Safari for Mac OS X v10.5.7
The download file is named: Safari4.0.2Leo.dmg
Its SHA-1 digest is: 48676afbb5c5bacac8610ba13f6851d3b266cb69

Safari for Mac OS X v10.4.11
The download file is named: Safari4.0.2Ti.dmg
Its SHA-1 digest is: 930bf2b49182fb69ebc51467bee69c906c8f4786

Safari for Windows XP or Vista
The download file is named: SafariSetup.exe
Its SHA-1 digest is: 327fdef36dcdc3005627d58f6a43e7847811fa7f

Safari+QuickTime for Windows XP or Vista
The file is named: SafariQuickTimeSetup.exe
Its SHA-1 digest is: f32209e1db90979a33d22f644569328b8f57125c

The vendor's advisory is available at:

http://support.apple.com/kb/HT3666

Vendor URL:  support.apple.com/kb/HT3666 (Links to External Site)
Cause:   Access control error
Underlying OS:   UNIX (OS X), Windows (Vista), Windows (XP)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Sep 9 2009 (Apple Issues Fix for iPhone) Apple Safari WebKit Bug in Procesing Numeric Character References Lets Remote Users Execute Arbitrary Code
Apple has issued a fix for iPhone.



 Source Message Contents

Date:  Wed, 8 Jul 2009 13:10:07 -0700
Subject:  APPLE-SA-2009-07-08-1 Safari 4.0.2

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

APPLE-SA-2009-07-08-1 Safari 4.0.2

Safari 4.0.2 is now available and addresses the following:

WebKit
CVE-ID:  CVE-2009-1724
Available for:  Mac OS X v10.4.11, Mac OS X Server v10.4.11,
Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista
Impact:  Visiting a maliciously crafted website may lead to a cross-
site scripting attack
Description:  An issue in WebKit's handling of the parent and top
objects may result in a cross-site scripting attack when visiting a
maliciously crafted website. This update addresses the issue through
improved handling of parent and top objects.

WebKit
CVE-ID:  CVE-2009-1725
Available for:  Mac OS X v10.4.11, Mac OS X Server v10.4.11,
Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista
Impact:  Visiting a maliciously crafted website may lead to an
unexpected application termination or arbitrary code execution
Description:  A memory corruption issue exists in WebKit's handling
of numeric character references. Visiting a maliciously crafted
website may lead to an unexpected application termination or
arbitrary code execution. This update addresses the issue through
improved handling of numeric character references. Credit to Chris
Evans for reporting this issue.


Safari 4.0.2 is available via the Apple Software Update application,
or Apple's Safari download site at:
http://www.apple.com/safari/download/

Safari for Mac OS X v10.5.7
The download file is named: Safari4.0.2Leo.dmg
Its SHA-1 digest is: 48676afbb5c5bacac8610ba13f6851d3b266cb69

Safari for Mac OS X v10.4.11
The download file is named: Safari4.0.2Ti.dmg
Its SHA-1 digest is: 930bf2b49182fb69ebc51467bee69c906c8f4786

Safari for Windows XP or Vista
The download file is named: SafariSetup.exe
Its SHA-1 digest is: 327fdef36dcdc3005627d58f6a43e7847811fa7f

Safari+QuickTime for Windows XP or Vista
The file is named: SafariQuickTimeSetup.exe
Its SHA-1 digest is: f32209e1db90979a33d22f644569328b8f57125c

Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (Darwin)

iQEcBAEBAgAGBQJKVNoRAAoJEHkodeiKZIkBH1QH/3l5KhsXT0KV3QDJ7slhIEHA
eDgWiJZ1V5gh4zpedJ5i7FdZ5GHJ7fGYUZPqro156uvt2G9Q8SrgusMtaeICblOw
T/StjfxGqVP7Ikjuc2HCsEnZCcY2g+L90VUUSkWrYr1SoLDMxky9SGiD4r6lmk2P
pUKcTTllWcENbAc9BWH07Dgd47ujA2LCgrfX0lyQWLaPEbB0uDPM52N8tWq6gD+Z
dL2mlSMwBSG5S2cbuCQGj7OIMsF2b2+4zPlEZKcewnQR/KJM9XXfpvBBe+9ebld5
Ay4PdZFh2hzv6HyyK7Nn1enVh02JBA61HLreJLwfe9Kka/K8cGdbmuZZwt8c378=
=A/0Q
-----END PGP SIGNATURE-----
 _______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list      (Security-announce@lists.apple.com)
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC