---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ International Partner Manager - Project Sales in the IT-Security Industry: http://corporate.secunia.com/about_secunia/64/ ---------------------------------------------------------------------- TITLE: Apple Safari Cross-Domain Cookie Injection Vulnerability SECUNIA ADVISORY ID: SA31128 VERIFY ADVISORY: http://secunia.com/advisories/31128/ CRITICAL: Less critical IMPACT: Security Bypass WHERE: >From remote SOFTWARE: Safari 3.x http://secunia.com/product/17989/ Safari for Windows 3.x http://secunia.com/product/17978/ DESCRIPTION: A vulnerability has been discovered in Apple Safari, which can be exploited by malicious people to bypass certain security restrictions. The problem is that websites are allowed to set cookies for certain country-specific secondary top-level domains. This can e.g. be exploited to fix a session by setting a known session ID in a cookie, which the browser sends to all web sites operating under an affected domain (e.g. co.uk, com.au). The vulnerability is confirmed in Apple Safari for Windows 3.1.2. Other versions may also be affected. SOLUTION: Do not browse untrusted web sites or follow untrusted links. PROVIDED AND/OR DISCOVERED BY: kuza55 ORIGINAL ADVISORY: http://kuza55.blogspot.com/2008/07/some-random-safari-notes.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------