Skip to main content

Apple Safari for Mac OS X Multiple Vulnerabilities

Last Update Date: 27 Jul 2012 13:57 Release Date: 27 Jul 2012 5169 Views

RISK: High Risk

TYPE: Clients - Browsers

TYPE: Browsers

Multiple vulnerabilities have been identified in Apple Safari for Mac OS X, which can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose sensitive information, bypass certain security restrictions, and compromise a user's system.

  1. An error when handling "feed:" URLs can be exploited to conduct cross-site scripting attacks.
  2. An access control error within the handling of the "feed:" URLs can be exploited to upload arbitrary files to a server by tricking the user to visiting a malicious site.
  3. An error within the autocomplete feature can be exploited to bypass the attribute and autocomplete passwords.
  4. An error when handling the HTTP "Content-Disposition" header can be exploited to open an attachment without showing the "Open" dialog prompt and conduct cross-site scripting attacks.
  5. Multiple errors exist due to a bundled vulnerable version of WebKit.
  6. Multiple errors in the WebKit component can be exploited to execute arbitrary code.
  7. A cross-origin error in the WebKit component when handling drag and drop events can be exploited to bypass the same-origin policy and disclose certain text by tricking the user into visiting a malicious website.
  8. A cross-origin error in the WebKit component when handling drag and drop events can be exploited to bypass the same-origin policy and disclose certain files by tricking the user into visiting a malicious website.
  9. A cross-origin error in the WebKit component when handling CSS property values can be exploited to bypass the same-origin policy and disclose certain information by tricking the user into visiting a malicious website.
  10. An error exists within the cross-origin policy when parenting pop-up windows.
  11. A cross-origin error can be exploited to disclose the iFrame fragment ID.
  12. An error within the International Domain Name (IDN) support feature can be exploited to spoof a URL containing look-alike characters and trick a user into visiting a malicious website.
  13. An error within the WebKit component when handling drag and drop events can be exploited to disclose filesystem path of certain files.
  14. A canonicalization error within the handling of URLs can be exploited to conduct cross-site scripting attacks via a specially crafted "location.href" property.
  15. An error when handling WebSockets can be exploited to conduct HTTP request splitting attacks.
  16. An error within the history handling can be exploited to spoof the URL bar.
  17. An error exists within the WebProcess and can be exploited to bypass the sandbox restrictions.
  18. An error when handling SVG images can be exploited to disclose the contents of arbitrary memory locations

Impact

  • Cross-Site Scripting
  • Security Restriction Bypass
  • Information Disclosure
  • Spoofing

System / Technologies affected

  • Safari versions prior to 6.0 on OS X Lion version 10.7.4 and OS X Lion Server version 10.7.4.

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • Upgrade to Safari version 6.0 via Apple Software Update.

Vulnerability Identifier


Source


Related Link