SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Web Browser)  >   Apple Safari Vendors:   Apple Computer
Apple Safari Bugs Permit Cross-Domain Scripting Attacks
SecurityTracker Alert ID:  1022344
SecurityTracker URL:  http://securitytracker.com/id/1022344
CVE Reference:   CVE-2009-1684, CVE-2009-1685, CVE-2009-1688, CVE-2009-1689, CVE-2009-1691, CVE-2009-1695, CVE-2009-1697, CVE-2009-1702, CVE-2009-1714, CVE-2009-1715   (Links to External Site)
Date:  Jun 8 2009
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 4.0
Description:   Several vulnerabilities were reported in Apple Safari. A remote user can conduct cross-domain scripting attacks.

A remote user can create a specially crafted HTML that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser in the context of another domain or site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

An event handler can execute a script in the security context of the next web page that is loaded in its window or frame [CVE-2009-1684]. Michal Zalewski of Google Inc. reported this vulnerability.

A remote user can overwrite the 'document.implementation' property of an embedded or parent document served from a different security zone [CVE-2009-1685]. Dean McNamee of Google Inc. reported this vulnerability.

WebKit does not properly determine the security context associated with scripts [CVE-2009-1688]. Adam Barth of UC Berkeley and Collin Jackson of Stanford University reported this vulnerability.

A form submitted to 'about:blank' can synchronously replace the target document's security context, allowing currently-executing scripts to run in the new security context [CVE-2009-1689]. Adam Barth of UC Berkeley and Collin Jackson of Stanford University reported this vulnerability.

A remote user can modify standard JavaScript prototypes of web sites served from a different domain [CVE-2009-1691].

The contents of a frame can be accessed by an HTML document after a page transition has occurred [CVE-2009-1695]. Feng Qian of Google Inc. reported this vulnerability.

A web site can bypass the same-origin policy by issuing an XMLHttpRequest that does not contain an HTTP Host header [CVE-2009-1697]. Per von Zweigbergk reported this vulnerability.

The handling of Location and History objects may permit cross-site scripting attacks [CVE-2009-1702]. Adam Barth and Joel Weinberger of UC Berkeley reported this vulnerability.

A flaw in Web Inspector in the processing of HTML attributes allows a page being inspected to run injected script with elevated privileges and can read the target user's file system [CVE-2009-1714]. Pengsu Cheng of Wuhan University reported this vulnerability.

A flaw in Web Inspector allows a page being inspected to run injected script with elevated privileges and can read the target user's file system [CVE-2009-1715]. Collin Jackson of Stanford University and Adam Barth of UC Berkeley reported this vulnerability.

Impact:   A remote user can access the target user's cookies (including authentication cookies), if any, associated with a target site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Solution:   The vendor has issued a fix (4.0), available via the Apple Software Update application, or Apple's Safari download site at:

http://www.apple.com/safari/download/

Safari for Mac OS X v10.5.7
The download file is named: Safari4.0Leo.dmg
Its SHA-1 digest is: 9b18e8dad3b3acd91b7d4208f295422bf8e735ed

Safari for Mac OS X v10.4.11
The download file is named: Safari4.0Ti.dmg
Its SHA-1 digest is: c5298f24aa9c824a930ba3656487687630d2420a

Safari for Windows XP or Vista
The download file is named: SafariSetup.exe
Its SHA-1 digest is: 46951d6c13bf847a54d033cec2cdf3383e31d1e1

Safari+QuickTime for Windows XP or Vista
The file is named: SafariQuickTimeSetup.exe
Its SHA-1 digest is: 6c421eb66d521dd03744f76c7e44a40d132379fc

Vendor URL:  www.apple.com/safari (Links to External Site)
Cause:   Access control error
Underlying OS:   UNIX (OS X), Windows (Vista), Windows (XP)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jun 17 2009 (Apple Issues Fix for iPhone) Apple Safari Bugs Permit Cross-Domain Scripting Attacks
Apple has issued a fix for iPhone OS.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC