Skip to main content

Apple Safari for Mac and Windows Code Execution Vulnerabilities

Last Update Date: 28 Jan 2011 Release Date: 14 May 2009 4774 Views

RISK: Medium Risk

Multiple vulnerabilities have been identified in Apple Safari for Mac and Windows, which could be exploited by attackers to compromise a vulnerable system.

The first issue is caused by input validation errors within the handling of "feed:" URLs, which could allow attackers to inject arbitrary JavaScript code.

The second vulnerability is caused by a memory corruption error in WebKit's handling of SVGList objects, which could be exploited to execute arbitrary code via a specially crafted web page.


System / Technologies affected

  • Apple Safari versions prior to 3.2.3 for Mac and Windows
  • Apple Safari versions prior to 4 Public Beta for Mac and Windows

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

Upgrade to Apple Safari version 3.2.3 or 4 Public Beta :
http://www.apple.com/safari/download/


Vulnerability Identifier


Source


Related Link