Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2007.0915 -- [Win] Safari 3 Beta Update 3.0.4 (Windows) 15 November 2007 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Safari WebCore WebKit Publisher: Apple Operating System: Windows Impact: Execute Arbitrary Code/Commands Cross-site Scripting Access Confidential Data Access: Remote/Unauthenticated CVE Names: CVE-2007-4812 CVE-2007-4698 CVE-2007-4692 CVE-2007-4671 CVE-2007-3760 CVE-2007-3758 CVE-2007-3756 CVE-2007-2754 CVE-2007-1352 CVE-2007-1351 Ref: ESB-2007.0913 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2007-11-14 Safari 3 Beta Update 3.0.4 (Windows) Safari 3 Beta Update 3.0.4 (Windows) is now available and addresses the following issues: Safari CVE-ID: CVE-2007-4692 Available for: Windows XP or Vista Impact: An issue in Safari Tabbed browsing may lead to the disclosure of user credentials Description: An implementation issue exists in the Tabbed browsing feature of Safari. If HTTP authentication is used by a site being loaded in a tab other than the active tab, an authentication sheet may be displayed although the tab and its corresponding page are not visible. The user may consider the sheet to come from the currently active page, which may lead to the disclosure of user credentials. This update addresses the issue through improved handling of authentication sheets. Credit to Michael Roitzsch of Technical University Dresden for reporting this issue. Safari CVE-ID: CVE-2007-1351, CVE-2007-1352, CVE-2007-2754 Available for: Windows XP or Vista Impact: Multiple vulnerabilities in FreeType v2.2.1 Description: Multiple vulnerabilities exist in FreeType v2.2.1, the most serious of which may lead to arbitrary code execution. This update addresses the issue by updating FreeType to version 2.3.5. Further information is available via the FreeType site at http://www.freetype.org/ WebCore CVE-ID: CVE-2007-3758 Available for: Windows XP or Vista Impact: Visiting a malicious website may lead to cross-site scripting Description: A cross-site scripting issue in Safari allows malicious websites to set JavaScript window properties of websites served from a different domain. By enticing a user to visit a maliciously crafted web page, an attacker may be able to get or set the window status and location of pages served from other websites. This update addresses the issue by providing improved access controls on these properties. Credit to Michal Zalewski of Google Inc. for reporting this issue. WebCore CVE-ID: CVE-2007-3760 Available for: Windows XP or Vista Impact: Visiting a malicious website may lead to cross-site scripting Description: A cross-site scripting issue in Safari allows a malicious website to bypass the same origin policy by hosting embedded objects with javascript URLs. By enticing a user to visit a maliciously crafted web page, an attacker may cause the execution of JavaScript in the context of another site. This update addresses the issue by restricting the use of the javascript URL scheme and adding additional origin validation for these URLs. Credit to Michal Zalewski of Google Inc. and Secunia Research for reporting this issue. WebCore CVE-ID: CVE-2007-3756 Available for: Windows XP or Vista Impact: Visiting a malicious website may lead to the disclosure of URL contents Description: Safari may allow a web page to read the URL that is currently being viewed in its parent window. By enticing a user to visit a maliciously crafted web page, an attacker may be able to obtain the URL of an unrelated page. This update addresses the issue through an improved cross-domain security check. Credit to Michal Zalewski of Google Inc. and Secunia Research for reporting this issue. WebKit CVE-ID: CVE-2007-4671 Available for: Windows XP or Vista Impact: JavaScript on websites may access or manipulate the contents of documents served over HTTPS Description: An issue in Safari allows content served over HTTP to alter or access content served over HTTPS in the same domain. By enticing a user to visit a maliciously crafted web page, an attacker may cause the execution of JavaScript in the context of HTTPS web pages in that domain. This update addresses the issue by preventing JavaScript access from HTTP to HTTPS frames. Credit to Keigo Yamazaki of LAC Co., Ltd. (Little eArth Corporation Co., Ltd.) for reporting this issue. WebKit CVE-ID: CVE-2007-4698 Available for: Windows XP or Vista Impact: Visiting a malicious website may lead to cross-site scripting Description: Safari allows JavaScript events to be associated with the wrong frame. By enticing a user to visit a maliciously crafted web page, an attacker may cause the execution of JavaScript in the context of another site. This update addresses the issue by associating JavaScript events with the correct source frame. WebKit CVE-ID: CVE-2007-4812 Available for: Windows XP or Vista Impact: Visiting a malicious website may lead to arbitrary code execution Description: A buffer overflow exists in Safari's handling of the status bar. By enticing a user to visit a maliciously crafted web page, an attacker may cause arbitrary code execution. This update addresses the issue by re-implementing the status bar handling. Safari 3 Beta Update 3.0.4 (Windows) is available via the Apple Software Update application, or Apple's Safari download site at: http://www.apple.com/safari/download/ Safari for Windows XP or Vista The download file is named: "SafariSetup.exe" Its SHA-1 digest is: 54f68120298fd628255474d13e10562fcdbf2a14 Safari+QuickTime for Windows XP or Vista The download file is named: "SafariQuickTimeSetup.exe" Its SHA-1 digest is: a8afe488e2afcc8ccc9425792d5fc74ac9e25d10 This message is signed with Apple's Product Security PGP key, and details are available at: http://www.apple.com/support/security/pgp/ - -----BEGIN PGP SIGNATURE----- Version: 9.7.0.867 wsBVAwUBRztc8MgAoqu4Rp5tAQi2PQgAsBkFgf2vdsiiPOvdOLJ9kWiZaw9Q4lfd V5ntJlzUR09257XFZWYckraUZXaeZkuBbcSZsrCijiZuk9vj7a5F5uw4nSAvT/hp cNkPHd6GK5jYvyQVyrTOfFTRWwXQlNMN5UEZuS9puLZqUwDCVcoQGA/ex/qFsjH1 baR5Cl05StMdTN0KBhocY8HZNr+iWDEx57t1VdEyQVZqfImbxh94DmzKJ/EJhWZ8 tgi1EisLjMBnA/OlTDyScdCQTdJmXF4BRf+4/pCvJAJPWkLcRFV7GcE5Cby9RJK7 GYtjFV9GKuYiBNmX/Ku/C5y2KqfSXJqiSSHs7YkEGeURKuK4sbJLqw== =iPVV - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBRzu/qSh9+71yA2DNAQIHBQP/QPvJ8uwV9rK0DWhG42aD+1JfDH1YTJPA IPBxH/UijyMpHyLNfvUaICHTlMAZkCkv4xlW+2GTZnnqAt2rdbSSra60RXfdrkA6 nDee6jV7SfU1Vc759of6z5qbWwGg3hvmiHeJkbWgoGcicy4fte76M61mAEgkOUBc CJucTlTeKa8= =KyUm -----END PGP SIGNATURE-----