Ravens PHP Scripts

Safari Address Bar Spoofing and Memory Corruption Vulnerabilities
Date: Monday, March 24, 2008 @ 20:36:21 CET
Topic: Security


SECUNIA ADVISORY ID: SA29483

VERIFY ADVISORY: http://secunia.com/advisories/29483/

CRITICAL: Highly critical

IMPACT: Spoofing, System access

SOFTWARE: Safari for Windows 3.x: http://secunia.com/product/17978/

DESCRIPTION: Juan Pablo Lopez Yacubian has discovered two vulnerabilities in Safari, which can be exploited by malicious people to conduct spoofing attacks or potentially compromise a user's system. The vulnerabilities are confirmed in version 3.1 for Windows. Other versions may also be affected.




1) An error when downloading e.g. a .ZIP file with an overly long filename can be exploited to cause a memory corruption. Successful exploitation may allow execution of arbitrary code.

2) An error in the handling of windows can be exploited to display arbitrary content while showing the URL of a trusted web site in the address bar.

SOLUTION: Do not browse untrusted web sites.

PROVIDED AND/OR DISCOVERED BY: Juan Pablo Lopez Yacubian

ORIGINAL ADVISORY:
http://archives.neohapsis.com/archives/bugtraq/2008-03/0332.html
http://archives.neohapsis.com/archives/bugtraq/2008-03/0324.html






This article comes from Ravens PHP Scripts
http://www.ravenphpscripts.com

The URL for this story is:
http://www.ravenphpscripts.com/modules.php?name=News&file=article&sid=3282