---------------------------------------------------------------------- Do you need accurate and reliable IDS / IPS / AV detection rules? Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/ ---------------------------------------------------------------------- TITLE: Apple Safari Multiple Vulnerabilities SECUNIA ADVISORY ID: SA32706 VERIFY ADVISORY: http://secunia.com/advisories/32706/ CRITICAL: Highly critical IMPACT: Exposure of sensitive information, DoS, System access WHERE: >From remote SOFTWARE: Safari 3.x http://secunia.com/advisories/product/17989/ Safari for Windows 3.x http://secunia.com/advisories/product/17978/ DESCRIPTION: Some vulnerabilities have been reported in Apple Safari, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose sensitive information or compromise a user's system. 1) A vulnerability is caused due to insecure zlib code. For more information: SA15949 2) A vulnerability is caused due to insecure libxslt code. For more information: SA30315 3) An unspecified error in CoreGraphics within the processing of handling of color spaces can be exploited to cause a heap-based buffer overflow via a specially crafted image. Successful exploitation may allow execution of arbitrary code. 4) A vulnerability in the processing of TIFF images can potentially be exploited to execute arbitrary code. For more information: SA31610 5) A vulnerability in the processing of TIFF images can potentially be exploited to execute arbitrary code. For more information: SA31882 6) A vulnerability in the processing of JPEG images can potentially be exploited to execute arbitrary code. For more information: SA31882 7) A vulnerability in the handling of images with an embedded ICC profile can be exploited to execute arbitrary code. For more information: SA32222 8) Data supplied to form fields may be exposed via the browser page cache, although the "Autocomplete" feature is disabled. 9) A signedness error in Safari when handling Javascript array indices can be exploited to execute arbitrary code. For more information: SA31074 10) A vulnerability in the handling of style sheet elements can be exploited to execute arbitrary code. For more information: SA31074 11) An error in the plugin interface in Webkit can be exploited to disclose sensitive information by launching local files. SOLUTION: Update to version 3.2. Safari 3.2 for Windows: http://www.apple.com/support/downloads/safari32forwindows.html Safari 3.2 for Tiger: http://www.apple.com/support/downloads/safari32fortiger.html Safari 3.2 for Leopard: http://www.apple.com/support/downloads/safari32forleopard.html PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1) Robbie Joosten of bioinformatics@school and David Gunnells of the University of Alabama at Birmingham 2) Anthony de Almeida Lopes of Outpost24 AB and Chris Evans of the Google Security Team 5) Robert Swiecki of the Google Security Team 8) an anonymous researcher 9) SkyLined of Google 10) an anonymous researcher working with the TippingPoint Zero Day Initiative 11) Billy Rios of Microsoft and Nitesh Dhanjani of Ernst & Young ORIGINAL ADVISORY: http://support.apple.com/kb/HT3298 OTHER REFERENCES: SA15949: http://secunia.com/advisories/15949/ SA30315: http://secunia.com/advisories/30315/ SA31074: http://secunia.com/advisories/31074/ SA31610: http://secunia.com/advisories/31610/ SA31882: http://secunia.com/advisories/31882/ SA32222: http://secunia.com/advisories/32222/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------