Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2008.0635 -- [Win] Safari v3.1.2 for Windows 20 June 2008 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Safari Publisher: Apple Operating System: Windows Impact: Execute Arbitrary Code/Commands Access Confidential Data Access: Remote/Unauthenticated CVE Names: CVE-2008-2540 CVE-2008-2307 CVE-2008-2306 CVE-2008-1573 Ref: ESB-2008.0560 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2008-06-19 Safari v3.1.2 for Windows Safari v3.1.2 for Windows is now available and addresses the following issues: Safari CVE-ID: CVE-2008-1573 Available for: Windows XP or Vista Impact: Viewing a maliciously crafted BMP or GIF image may lead to information disclosure Description: An out-of-bounds memory read may occur in the handling of BMP and GIF images, which may lead to the disclosure of memory contents. This update addresses the issue by performing additional validation of BMP and GIF images. This issue is addressed in systems running Mac OS X v10.5.3, and in Mac OS X v10.4.11 with Security Update 2008-003. Credit to Gynvael Coldwind of Hispasec for reporting this issue. Safari CVE-ID: CVE-2008-2540 Available for: Windows XP or Vista Impact: Saving untrusted files to the Windows desktop may lead to the execution of arbitrary code Description: An issue exists in how the Windows desktop handles executables. Saving an untrusted file to the Windows desktop may trigger the issue, and lead to the execution of arbitrary code. Web browsers are a means by which files may be saved to the desktop. To help mitigate this issue, the Safari browser has been updated to prompt the user prior to saving a download file. Also, the default download location is changed to the user's Downloads folder on Windows Vista, and to the user's Documents folder on Windows XP. This issue does not exist on systems running Mac OS X. Additional information is available from http://www.microsoft.com/technet/security/advisory/953818.mspx which credits Aviv Raff with reporting the issue. Safari CVE-ID: CVE-2008-2306 Available for: Windows XP or Vista Impact: Visiting a malicious website which is in a trusted Internet Explorer zone may lead to the automatic execution of arbitrary code Description: If a website is in an Internet Explorer 7 zone with the "Launching applications and unsafe files" setting set to "Enable", or if a website is in the Internet Explorer 6 "Local intranet" or "Trusted sites" zone, Safari will automatically launch executable files that are downloaded from the site. This update addresses the issue by not automatically launching downloaded executable files, and by prompting the user before downloading a file if the "always prompt" setting is enabled. This issue does not exist on systems running Mac OS X. Credit to Will Dormann of CERT/CC for reporting this issue. WebKit CVE-ID: CVE-2008-2307 Available for: Windows XP or Vista Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue exists in WebKit's handling of JavaScript arrays. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved bounds checking. Credit to James Urquhart for reporting this issue. Safari v3.1.2 for Windows is available via the Apple Software Update application, or Apple's Safari download site at: http://www.apple.com/safari/download/ Safari for Windows XP or Vista The download file is named: "SafariSetup.exe" Its SHA-1 digest is: c63db818658532d3ff2762378b0b7b7e6aace0d6 Safari+QuickTime for Windows XP or Vista The file is named: "SafariQuickTimeSetup.exe" Its SHA-1 digest is: 22ebca0a88b5814e22f015daea1be27489e6e7be Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: http://www.apple.com/support/security/pgp/ - -----BEGIN PGP SIGNATURE----- Version: 9.7.2.1608 wsBVAwUBSFqRZHkodeiKZIkBAQgxiAf9HapNeskNLM++Bjfc3T37jpGOe1LRPdMc GNuCnUIrHzVcr5ZenYRwndz1LtH0Ui6kCo7sazGYAbqEZjNmFUusdByOIo6KikKf ejntmZsgRGLh7qlTOCwBO/9DptAfrGWQZMqhES1u/enfKjBgg/2ijq/DZhhBlTrA QQBp6xtDk8aIiIui8UdYFSauyoSOAuomaHTtMU2Wis6h2hHE8rmwG9/9TRZo5Woc SkzeDi0pjxpyCrEQ3LARBxMd3eEaZx/+2PQeY30m3VKKpenUuj+G7D7Ejz+Uu7Nk ej6u3zdHmnHAcoAE9gmOPxKCZ0XemzuULzi824EN+aLkqHz0CgWNSg== =iDKS - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBSFr1yih9+71yA2DNAQI3rAP/TOeLcJMk9fqSXof3hBF1dgZbHIc6JUVN EA2FZrlMll0xGysR1zewFX9w05tAvs7Vb+OWnXhEqSnYkSOdtruNtMp9rtS8rFj5 Gdrn5GXT9XzNHHyzl3BKcaTie09NB6WpxAwkA1oY27pvQ/fYuui3cBVHME9FA3yg Onpa/Yc7ahg= =zKVm -----END PGP SIGNATURE-----