Apple Safari Plug-in Unloading Vulnerability
RISK: High Risk
TYPE: Clients - Browsers
A vulnerability has been identified in Apple Safari, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to plug-ins being unloaded when navigating to a new page while the user interacts with the plug-in (e.g. displays the context menu). If the plug-in has called a blocking function (e.g. TrackPopupMenu) before Safari navigates to another page, the API call may block until after Safari unloaded the plug-in, which can lead to the API call returning to freed memory.
NOTE: Currently, there is no patch available for this vulnerability.
Impact
- Remote Code Execution
System / Technologies affected
- Apple Safari 5.x
Solutions
NOTE: Currently, there is no patch available for this vulnerability.
Vulnerability Identifier
Source
Related Link
Share with