SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Web Browser)  >   Apple Safari Vendors:   Apple Computer
Apple Safari WebKit Flaw Lets Remote Users Bypass Cross-Origin Resource Sharing Controls
SecurityTracker Alert ID:  1023165
SecurityTracker URL:  http://securitytracker.com/id/1023165
CVE Reference:   CVE-2009-2816   (Links to External Site)
Date:  Nov 12 2009
Impact:   Disclosure of system information, Disclosure of user information, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 4.0.4
Description:   A vulnerability was reported in Apple Safari. A remote user can bypass cross-origin resource sharing controls.

A remote user can create specially crafted HTML that, when loaded by the target user, will cause the target user's browser to take actions on other web sites.

The vulnerability resides in WebKit.

Impact:   A remote user can cause the target user's browser to take actions on other web sites.
Solution:   The vendor has issued a fix (4.0.4), available via the Apple Software Update application, or Apple's Safari download site at:

http://www.apple.com/safari/download/

Safari for Mac OS X v10.6.1 and v10.6.2
The download file is named: Safari4.0.4SnowLeopard.dmg
Its SHA-1 digest is: 445df542b183fa65fd9df1f7ff4c6af306e6c0b9

Safari for Mac OS X v10.5.7
The download file is named: Safari4.0.4Leopard.dmg
Its SHA-1 digest is: 0aeb54208cdebcafb3206baf11d8649836273f33

Safari for Mac OS X v10.4.11
The download file is named: Safari4.0.4Tiger.dmg
Its SHA-1 digest is: 4ddfd70420e27bab98864a45f291f688d86f5963

Safari for Windows 7, Vista or XP
The download file is named: SafariSetup.exe
Its SHA-1 digest is: 236cfb9556dd369d95c5b45ddce740b15f2cb267

Safari+QuickTime for Windows 7, Vista or XP
The file is named: SafariQuickTimeSetup.exe
Its SHA-1 digest is: d95d61f2f804576b5d31fc8f47ac310438bc44dc

The vendor's advisory is available at:

http://support.apple.com/kb/HT3949

Vendor URL:  support.apple.com/kb/HT3949 (Links to External Site)
Cause:   Access control error
Underlying OS:   UNIX (OS X), Windows (7), Windows (Vista), Windows (XP)

Message History:   None.


 Source Message Contents

Date:  Thu, 12 Nov 2009 03:11:35 +0000
Subject:  Apple Safari


APPLE-SA-2009-11-11-1 Safari 4.0.4


WebKit
CVE-ID:  CVE-2009-2816
Available for:  Mac OS X v10.4.11, Mac OS X Server v10.4.11,
Mac OS X v10.5.8, Mac OS X Server v10.5.8,
Mac OS X v10.6.1 and v10.6.2, Mac OS X Server v10.6.1 and v10.6.2,
Windows 7, Vista, XP
Impact:  Visiting a maliciously crafted website may result in
unexpected actions on other websites
Description:  An issue exists in WebKit's implementation of Cross-
Origin Resource Sharing. Before allowing a page from one origin to
access a resource in another origin, WebKit sends a preflight request
to the latter server for access to the resource. WebKit includes
custom HTTP headers specified by the requesting page in the preflight
request. This can facilitate cross-site request forgery. This issue
is addressed by removing custom HTTP headers from preflight requests.
Credit: Apple.

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC