-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                          ESB-2008.0635 -- [Win]
                         Safari v3.1.2 for Windows
                               20 June 2008

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Safari
Publisher:            Apple
Operating System:     Windows
Impact:               Execute Arbitrary Code/Commands
                      Access Confidential Data
Access:               Remote/Unauthenticated
CVE Names:            CVE-2008-2540 CVE-2008-2307 CVE-2008-2306
                      CVE-2008-1573

Ref:                  ESB-2008.0560

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2008-06-19 Safari v3.1.2 for Windows

Safari v3.1.2 for Windows is now available and addresses the
following issues:

Safari
CVE-ID:  CVE-2008-1573
Available for:  Windows XP or Vista
Impact:  Viewing a maliciously crafted BMP or GIF image may lead to
information disclosure
Description:  An out-of-bounds memory read may occur in the handling
of BMP and GIF images, which may lead to the disclosure of memory
contents. This update addresses the issue by performing additional
validation of BMP and GIF images. This issue is addressed in systems
running Mac OS X v10.5.3, and in Mac OS X v10.4.11 with Security
Update 2008-003. Credit to Gynvael Coldwind of Hispasec for reporting
this issue.

Safari
CVE-ID:  CVE-2008-2540
Available for:  Windows XP or Vista
Impact:  Saving untrusted files to the Windows desktop may lead to
the execution of arbitrary code
Description:  An issue exists in how the Windows desktop handles
executables. Saving an untrusted file to the Windows desktop may
trigger the issue, and lead to the execution of arbitrary code. Web
browsers are a means by which files may be saved to the desktop. To
help mitigate this issue, the Safari browser has been updated to
prompt the user prior to saving a download file. Also, the default
download location is changed to the user's Downloads folder on
Windows Vista, and to the user's Documents folder on Windows XP. This
issue does not exist on systems running Mac OS X. Additional
information is available from
http://www.microsoft.com/technet/security/advisory/953818.mspx which
credits Aviv Raff with reporting the issue.

Safari
CVE-ID:  CVE-2008-2306
Available for:  Windows XP or Vista
Impact:  Visiting a malicious website which is in a trusted Internet
Explorer zone may lead to the automatic execution of arbitrary code
Description:  If a website is in an Internet Explorer 7 zone with the
"Launching applications and unsafe files" setting set to "Enable", or
if a website is in the Internet Explorer 6 "Local intranet" or
"Trusted sites" zone, Safari will automatically launch executable
files that are downloaded from the site. This update addresses the
issue by not automatically launching downloaded executable files, and
by prompting the user before downloading a file if the "always
prompt" setting is enabled. This issue does not exist on systems
running Mac OS X. Credit to Will Dormann of CERT/CC for reporting
this issue.

WebKit
CVE-ID:  CVE-2008-2307
Available for:  Windows XP or Vista
Impact:  Visiting a maliciously crafted website may lead to an
unexpected application termination or arbitrary code execution
Description:  A memory corruption issue exists in WebKit's handling
of JavaScript arrays. Visiting a maliciously crafted website may lead
to an unexpected application termination or arbitrary code execution.
This update addresses the issue through improved bounds checking.
Credit to James Urquhart for reporting this issue.

Safari v3.1.2 for Windows is available via the Apple Software Update
application, or Apple's Safari download site at:
http://www.apple.com/safari/download/

Safari for Windows XP or Vista
The download file is named:  "SafariSetup.exe"
Its SHA-1 digest is:  c63db818658532d3ff2762378b0b7b7e6aace0d6

Safari+QuickTime for Windows XP or Vista
The file is named:  "SafariQuickTimeSetup.exe"
Its SHA-1 digest is:  22ebca0a88b5814e22f015daea1be27489e6e7be

Information will also be posted to the Apple Security Updates
web site:  http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key,
and details are available at:
http://www.apple.com/support/security/pgp/

- -----BEGIN PGP SIGNATURE-----
Version: 9.7.2.1608

wsBVAwUBSFqRZHkodeiKZIkBAQgxiAf9HapNeskNLM++Bjfc3T37jpGOe1LRPdMc
GNuCnUIrHzVcr5ZenYRwndz1LtH0Ui6kCo7sazGYAbqEZjNmFUusdByOIo6KikKf
ejntmZsgRGLh7qlTOCwBO/9DptAfrGWQZMqhES1u/enfKjBgg/2ijq/DZhhBlTrA
QQBp6xtDk8aIiIui8UdYFSauyoSOAuomaHTtMU2Wis6h2hHE8rmwG9/9TRZo5Woc
SkzeDi0pjxpyCrEQ3LARBxMd3eEaZx/+2PQeY30m3VKKpenUuj+G7D7Ejz+Uu7Nk
ej6u3zdHmnHAcoAE9gmOPxKCZ0XemzuULzi824EN+aLkqHz0CgWNSg==
=iDKS
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBSFr1yih9+71yA2DNAQI3rAP/TOeLcJMk9fqSXof3hBF1dgZbHIc6JUVN
EA2FZrlMll0xGysR1zewFX9w05tAvs7Vb+OWnXhEqSnYkSOdtruNtMp9rtS8rFj5
Gdrn5GXT9XzNHHyzl3BKcaTie09NB6WpxAwkA1oY27pvQ/fYuui3cBVHME9FA3yg
Onpa/Yc7ahg=
=zKVm
-----END PGP SIGNATURE-----