Overview
Apple Safari contains a vulnerability in the handling of window objects, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Description
Apple Safari fails to properly handle references to window objects. Safari can allow a window object to be deleted, while references to the object may still exist. If JavaScript code then attempts to use the deleted window object, this can result in the use of an invalid pointer. This pointer can be controlled by an attacker through the use of JavaScript. Exploit code for this vulnerability is publicly available. We have confirmed Apple Safari 4.0.5 on the Windows platform to be vulnerable. Other versions may also be affected. |
Impact
By convincing a victim to view an HTML document (webpage, HTML email, or email attachment) with Apple Safari, an attacker could run arbitrary code with the privileges of the user running the application. |
Solution
Apply an update |
Disable JavaScript
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was publicly disclosed by Krystian Kloskowski.
This document was written by Will Dormann.
Other Information
CVE IDs: | CVE-2010-1939, CVE-2010-1750 |
Severity Metric: | 20.41 |
Date Public: | 2010-05-07 |
Date First Published: | 2010-05-10 |
Date Last Updated: | 2010-07-27 11:56 UTC |
Document Revision: | 17 |