Skip to main content

Apple Safari Code Execution and Information Disclosure Vulnerabilities

Last Update Date: 28 Jan 2011 Release Date: 30 Jul 2010 5005 Views

RISK: Medium Risk

Multiple vulnerabilities have been identified in Apple Safari, which could be exploited by attackers to gain knowledge of sensitive information or compromise a vulnerable system.

These issues are caused by memory corruptions, use-after-free and information disclosure errors related to RSS feeds, AutoFill feature, and WebKit's handling of element focus, inline elements, dynamic modifications to text nodes, CSS counters, the :first-letter and :first-line pseudo-elements in SVG text elements, foreignObject elements in SVG documents, floating elements in SVG documents, "use" elements in SVG documents, JavaScript string objects, just-in-time compiled JavaScript stubs, JavaScript arrays, regular expressions, and "font-face" and "use" elements in SVG documents, which could be exploited to cause files from the user's system to be sent to a remote server, disclose information to websites without user interaction, or execute arbitrary code by tricking a user into visiting a specially crafted web page.


Impact

  • Remote Code Execution
  • Information Disclosure

System / Technologies affected

  • Apple Safari versions prior to 5.0.1
  • Apple Safari versions prior to 4.1.1

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.


Vulnerability Identifier


Source


Related Link