SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Browser)  >   Apple Safari Vendors:   Apple
Apple Safari Multiple WebKit Bugs Let Remote Users Execute Arbitrary Code, Access Files, and Spoof Interface Elements
SecurityTracker Alert ID:  1032270
SecurityTracker URL:  http://securitytracker.com/id/1032270
CVE Reference:   CVE-2015-1152, CVE-2015-1153, CVE-2015-1154, CVE-2015-1155, CVE-2015-1156   (Links to External Site)
Date:  May 7 2015
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to versions 6.2.6, 7.1.6, 8.0.6
Description:   Multiple vulnerabilities were reported in Apple Safari. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially sensitive information on the target system. A remote user can spoof user interface elements.

A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error in WebKit and execute arbitrary code on the target system [CVE-2015-1152, CVE-2015-1153, CVE-2015-1154]. The code will run with the privileges of the target user.

A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a state management issue in WebKit History and access contents on the target user's filesystem [CVE-2015-1155].

Joe Vennix of Rapid7 Inc. (via HP's Zero Day Initiative) reported this vulnerability.

A remote user can create a specially crafted URL that, when loaded by the target user, will trigger a flaw in the handling of the 'rel' attribute in 'anchor' elements and spoof user interface elements [CVE-2015-1156].

Zachary Durber of Moodle reported this vulnerability.

Impact:   A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can create HTML that, when loaded by the target user, will access files on the target user's system.

A remote user can create a URL that, when loaded by the target user, will spoof user interface elements.

Solution:   The vendor has issued a fix (6.2.6, 7.1.6, 8.0.6).

The vendor's advisory is available at:

https://support.apple.com/en-us/HT204826

Vendor URL:  support.apple.com/en-us/HT204826 (Links to External Site)
Cause:   Access control error, State error
Underlying OS:  UNIX (macOS/OS X)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Sep 16 2015 (Apple Issues Fix for Apple iTunes) Apple Safari Multiple WebKit Bugs Let Remote Users Execute Arbitrary Code, Access Files, and Spoof Interface Elements
Apple has issued a fix for Apple iTunes for Windows.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC