SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Browser)  >   Apple Safari Vendors:   Apple
Apple Safari Multiple Bugs Let Remote Users Obtain Potentially Sensitive Information, Deny Service, Execute Arbitrary Code, and Spoof User Interface Elements
SecurityTracker Alert ID:  1036343
SecurityTracker URL:  http://securitytracker.com/id/1036343
CVE Reference:   CVE-2016-4583, CVE-2016-4584, CVE-2016-4585, CVE-2016-4586, CVE-2016-4589, CVE-2016-4590, CVE-2016-4591, CVE-2016-4592, CVE-2016-4622, CVE-2016-4623, CVE-2016-4624, CVE-2016-4651   (Links to External Site)
Date:  Jul 19 2016
Impact:   Denial of service via network, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of system information, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 9.1.2
Description:   Multiple vulnerabilities were reported in Apple Safari. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can consume excessive memory on the target system. A remote user can obtain potentially sensitive information on the target system. A remote user can spoof user interface elements.

A remote user can create a specially crafted web site that, when loaded by the target user, will trigger a memory corruption error in WebKit to execute arbitrary code on the target user's system [CVE-2016-4589, CVE-2016-4622, CVE-2016-4623, CVE-2016-4624, CVE-2016-4586].

A remote user can create a web site with a specially crafted SVG image that, when loaded by the target user, will access potentially sensitive image data from a different web site [CVE-2016-4583].

A remote user can create a specially crafted web site that, when loaded by the target user, will consume excessive memory resources on the target system and deny service [CVE-2016-4592].

A remote user can create a specially crafted web site that, when loaded by the target user, will trigger a permissions flaw in handling the location variable to obtain information about the file system on the target system [CVE-2016-4591].

A remote user can create a specially crafted web site to exploit a flaw in the parsing of 'about:' URLs and spoof user interface elements [CVE-2016-4590].

A remote user can exploit a cross-protocol cross-site scripting flaw in the submission of forms to non-HTTP services that are compatible with HTTP/0.9 to cause arbitrary scripting code to be executed by the target user's browser in the context of the target site [CVE-2016-4651].

A remote user can exploit a URL redirection flaw to cause arbitrary scripting code to be executed by the target user's browser [CVE-2016-4585]. The code will run in the security context of the target site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

A remote user can create a specially crafted web site that, when loaded by the target user, will trigger a memory corruption error in WebKit to execute arbitrary code on the target user's system [CVE-2016-4584].

Tongbo Luo and Bo Qu of Palo Alto Networks, Samuel Gross (via Trend Micro's Zero Day), Roeland Krak, Mikhail, ma.la of LINE Corporation, xisigr of Tencent's Xuanwu Lab (www.tencent.com), Obscure, Takeshi Terada of Mitsui Bussan Secure Directions, Inc. (www.mbsd.jp), and Chris Vienneau reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can consume excessive memory resources on the target system.

A remote user can obtain potentially sensitive information on the target system.

A remote user can spoof user interface elements.

Solution:   The vendor has issued a fix (9.1.2).

The vendor's advisory is available at:

https://support.apple.com/en-us/HT206900

Vendor URL:  support.apple.com/en-us/HT206900 (Links to External Site)
Cause:   Access control error, Authentication error, Input validation error
Underlying OS:  UNIX (macOS/OS X)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jul 19 2016 (Apple Issues Fix for Apple iOS) Apple Safari Multiple Bugs Let Remote Users Obtain Potentially Sensitive Information, Deny Service, Execute Arbitrary Code, and Spoof User Interface Elements
Apple has issued a fix for Apple iOS.
Jul 19 2016 (Apple Issues Fix for Apple TV) Apple Safari Multiple Bugs Let Remote Users Obtain Potentially Sensitive Information, Deny Service, Execute Arbitrary Code, and Spoof User Interface Elements
Apple has issued a fix for Apple TV.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC