Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2009.0541 -- [Win][Mac][OSX] Safari: Multiple Vulnerabilities 11 June 2009 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Safari Publisher: Apple Operating System: Mac OS X Windows XP Windows Vista Impact: Execute Arbitrary Code/Commands Increased Privileges Cross-site Scripting Read-only Data Access Provide Misleading Information Denial of Service Access: Remote/Unauthenticated CVE Names: CVE-2009-1718 CVE-2009-1716 CVE-2009-1715 CVE-2009-1714 CVE-2009-1713 CVE-2009-1712 CVE-2009-1711 CVE-2009-1710 CVE-2009-1709 CVE-2009-1708 CVE-2009-1707 CVE-2009-1706 CVE-2009-1705 CVE-2009-1704 CVE-2009-1703 CVE-2009-1702 CVE-2009-1701 CVE-2009-1700 CVE-2009-1699 CVE-2009-1698 CVE-2009-1697 CVE-2009-1696 CVE-2009-1695 CVE-2009-1694 CVE-2009-1693 CVE-2009-1691 CVE-2009-1690 CVE-2009-1689 CVE-2009-1688 CVE-2009-1687 CVE-2009-1686 CVE-2009-1685 CVE-2009-1684 CVE-2009-1682 CVE-2009-1681 CVE-2009-1179 CVE-2009-0946 CVE-2009-0153 CVE-2009-0145 ESB-2009.0144 CVE-2009-0040 CVE-2008-4409 CVE-2008-4231 CVE-2008-4226 CVE-2008-4225 CVE-2008-3632 CVE-2008-3529 CVE-2008-3281 CVE-2008-2321 CVE-2008-2320 CVE-2008-1588 CVE-2006-2783 Ref: ESB-2009.0514 ESB-2009.0513 ESB-2009.0504 ESB-2009.0469 ESB-2009.0459 ESB-2009.0444 ESB-2009.0438 ESB-2009.0425 ESB-2009.0421 ESB-2009.0398 ESB-2009.0381 ESB-2009.0379 ESB-2009.0373 ESB-2009.0260 ESB-2009.0220 ESB-2009.0204 ESB-2008.1065 ESB-2008.1014 ESB-2008.0874 ESB-2008.0861 ESB-2008.0761 ESB-2008.0691 Revision History: June 11 2009: Document number changed from ESB-2009.0698 to ESB-2009.0541 June 9 2009: Initial Release - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2009-06-08-1 Safari 4.0 Safari 4.0 is now available and addresses the following: CFNetwork CVE-ID: CVE-2009-1704 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Downloaded image files may be misidentified as HTML, leading to JavaScript execution without warning the user Description: Image files are 'safe' types that, once downloaded, are displayed by Safari without warning the user. An issue in Safari may cause it to be unable to identify the file type of certain local image files. In this case, Safari will examine the content of those files and may treat them as HTML. If a file contains JavaScript, it will be executed in the local context. For a downloaded file, this should not occur without first prompting the user. This issue is addressed by treating files of unknown type as generic binary data, and by correctly identifying the image file types known to have this issue. Credit to Sergio 'shadown' Alvarez of Recurity Labs GmbH for reporting this issue. CFNetwork CVE-ID: CVE-2009-1716 Available for: Windows XP or Vista Impact: A local user may be able to read the contents of files being downloaded by other users Description: CFNetwork creates temporary files insecurely when downloading. A local user may be able to access another user's files as they are downloaded, leading to the disclosure of sensitive information. This update addresses the issue by downloading files to the user's secure temporary directory location. For Mac OS X systems, this issue is addressed in Mac OS X v10.5.6. Credit to Billy Rios and Microsoft Vulnerability Research for reporting this issue. CoreGraphics CVE-ID: CVE-2008-2321 Available for: Windows XP or Vista Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: CoreGraphics contains memory corruption issues in the processing of arguments. Passing untrusted input to CoreGraphics via an application, such as a web browser, may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved bounds checking. For Mac OS X systems, this issue is addressed in Security Update 2008-005. Credit to Michal Zalewski of Google Inc. for reporting this issue. CoreGraphics CVE-ID: CVE-2009-1705 Available for: Windows XP or Vista Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue exists in the handling of TrueType fonts. An arithmetic issue in the automatic hinting of fonts may cause memory corruption. Visiting a maliciously crafted website with embedded fonts may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved input validation of TrueType font data. This issue does not affect Mac OS X systems. Credit to Clint Ruoho of Laconic Security and Tavis Ormandy of Google Security Team for reporting this issue. CoreGraphics CVE-ID: CVE-2009-0946 Available for: Windows XP or Vista Impact: Multiple vulnerabilities in FreeType v2.3.8 Description: Multiple integer overflows exist in FreeType v2.3.8, that may lead to an unexpected application termination or arbitrary code execution. This update addresses the issues through improved bounds checking. These issues do not affect CoreGraphics on Mac OS X systems. Credit to Tavis Ormandy of the Google Security Team for reporting these issues. CoreGraphics CVE-ID: CVE-2009-0145 Available for: Windows XP or Vista Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues exist in CoreGraphics' handling of PDF files. Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution. This update addresses the issues through improved bounds and error checking. For Mac OS X v10.5 systems, this issue is addressed in Mac OS X v10.5.7. For Mac OS X v10.4.11 systems, this issue is addressed in Security Update 2009-002. CoreGraphics CVE-ID: CVE-2009-1179 Available for: Windows XP or Vista Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: An integer overflow exists in CoreGraphics' handling of PDF files containing JBIG2 streams. Opening a PDF file containing a maliciously crafted JBIG2 stream may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved bounds checking. Credit to Will Dormann of CERT/CC for reporting this issue. ImageIO CVE-ID: CVE-2009-0040 Available for: Windows XP or Vista Impact: Processing a maliciously crafted PNG image may lead to an unexpected application termination or arbitrary code execution Description: An uninitialized pointer issue exists in the handling of PNG images. Processing a maliciously crafted PNG image may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue by performing additional validation of PNG images. Credit to Tavis Ormandy of the Google Security Team for reporting this issue. International Components for Unicode CVE-ID: CVE-2009-0153 Available for: Windows XP or Vista Impact: Maliciously crafted content may bypass website filters and result in cross-site scripting Description: An implementation issue exists in ICU's handling of certain character encodings. Using ICU to convert invalid byte sequences to Unicode may result in over-consumption, where trailing bytes are considered part of the original character. This may be leveraged by an attacker to bypass filters on websites that attempt to mitigate cross-site scripting. This update addresses the issue through improved handling of invalid byte sequences. For Mac OS X v10.5 systems, this issue is addressed in Mac OS X v10.5.7. Credit to Chris Weber of Casaba Security for reporting this issue. libxml CVE-ID: CVE-2008-3281, CVE-2008-3529, CVE-2008-4409, CVE-2008-4225, CVE-2008-4226 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Multiple vulnerabilities in libxml2 version 2.6.16 Description: Multiple vulnerabilities exist in libxml2 version 2.6.16, the most serious of which may lead to an unexpected application termination or arbitrary code execution. On Windows, the issues are addressed by updating libxml2 to version 2.7.3. On Mac OS X v10.4.11 and Mac OS X v10.5.7, the issues are addressed by applying the relevant patches. Safari CVE-ID: CVE-2009-1682 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Visiting a website with a revoked EV certificate may not display a certificate warning Description: An issue in Safari's handling of Extended Validation (EV) certificates may cause the revocation checking to be bypassed. This would allow a page to be loaded without issuing a warning for a revoked EV certificate. This update addresses the issue through improved revocation checking for EV certificates. Credit to Bruce Morton for reporting this issue. Safari CVE-ID: CVE-2009-1706 Available for: Windows XP or Vista Impact: Cookies set during a private browsing session may remain after private browsing ends Description: Safari's Private Browsing feature is designed to allow users to browse without leaving evidence of the browser session on disk. An implementation issue in Private Browsing may cause cookies to remain on disk after Private Browsing ends. This may result in an unexpected disclosure of sensitive information. This update addresses the issue by removing cookies from the alternate cookie store when private browsing is disabled, or Safari quits. This issue does not affect Mac OS X systems. Credit to Michael Hay of Beatnik Monkey Software for reporting this issue. Safari CVE-ID: CVE-2009-1707 Available for: Windows XP or Vista Impact: "Reset Safari" may not immediately remove website passwords from memory Description: After clicking the "Reset" button for "Reset saved names and passwords" in the "Reset Safari..." menu option, Safari may take up to 30 seconds to clear the passwords. A user with access to the system in that time window may be able to access the stored credentials. This issue is addressed by resolving the race condition that leads to the delay. This issue does not affect Mac OS X systems. Credit to Philippe Couturier of izypage.com, and Andrew Wellington of The Australian National University for reporting this issue. Safari CVE-ID: CVE-2009-1708 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Visiting a maliciously crafted website may lead to the disclosure of local file content or arbitrary code execution Description: An issue in Safari's open-help-anchor URL handler may allow a maliciously crafted website to open local help files. This may lead to the disclosure of sensitive information or arbitrary code execution. This update addresses the issue by preventing remote sites from calling the open-help-anchor URL handler. Credit to Billy Rios and Microsoft Vulnerability Research for reporting this issue. Safari Windows Installer Available for: Windows XP or Vista Impact: Safari may run with elevated privileges Description: The Safari installer includes a checkbox to launch Safari immediately after installation. If this checkbox is checked, the compression method in the installer will cause Safari to run with elevated privileges for its initial launch. The issue is addressed by using a different compression method in the installer. This issue does not affect Mac OS X systems. Credit to Dave English of Lutnos for reporting this issue. WebKit CVE-ID: CVE-2006-2783 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Visiting a maliciously crafted website may lead to a cross- site scripting attack Description: WebKit ignores Unicode byte order mark sequences when parsing web pages. Certain websites and web content filters attempt to sanitize input by blocking specific HTML tags. This approach to filtering may be bypassed and lead to cross-site scripting when encountering maliciously-crafted HTML tags containing byte order mark sequences. This update addresses the issue through improved handling of byte order mark sequences. Credit to Chris Weber of Casaba Security, LLC for reporting this issue. WebKit CVE-ID: CVE-2008-1588 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Unicode ideographic spaces may be used to spoof a website Description: When Safari displays the current URL in the address bar, Unicode ideographic spaces are rendered. This allows a maliciously crafted website to direct the user to a spoofed site that visually appears to be a legitimate domain. This update addresses the issue by not rendering Unicode ideographic spaces in the address bar. WebKit CVE-ID: CVE-2008-2320 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue exists in WebKit's handling of invalid color strings in CSS. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved handling of color strings. Credit to Thomas Raffetseder of the International Secure Systems Lab for reporting this issue. WebKit CVE-ID: CVE-2008-3632 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: A use-after-free issue exists in WebKit's handling of '@import' statements within Cascading Style Sheets. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved handling of style sheets. Credit to Dean McNamee of Google Inc. for reporting this issue. WebKit CVE-ID: CVE-2008-4231 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: An uninitialized memory access issue exists in WebKit's handling of HTML tables. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through proper initialization of the internal representation of HTML tables. Credit to Haifei Li of Fortinet's FortiGuard Global Security Research Team for reporting this issue. WebKit CVE-ID: CVE-2009-1681 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Interacting with a maliciously crafted website may result in unexpected actions on other sites Description: A design issue exists in the same-origin policy mechanism used to limit interactions between websites. This policy allows websites to load pages from third-party websites into a subframe. This frame may be positioned to entice the user to click a particular element within the frame, an attack referred to as "clickjacking". A maliciously crafted website may be able to manipulate a user into taking an unexpected action, such as initiating a purchase. This update addresses the issue through adoption of the industry-standard 'X-Frame-Options' extension header, that allows individual web pages to opt out of being displayed within a subframe. WebKit CVE-ID: CVE-2009-1684 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Visiting a maliciously crafted website may result in cross- site scripting Description: A cross-site scripting issue exists in the separation of JavaScript contexts. A maliciously crafted web page may use an event handler to execute a script in the security context of the next web page that is loaded in its window or frame. This update addresses the issue by ensuring that event handlers are not able to directly affect an in-progress page transition. Credit to Michal Zalewski of Google Inc. for reporting this issue. WebKit CVE-ID: CVE-2009-1685 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Visiting a maliciously crafted website may result in cross- site scripting Description: A cross-site scripting issue exists in the separation of JavaScript contexts. By enticing a user to visit a maliciously crafted web page, the attacker may overwrite the 'document.implementation' of an embedded or parent document served from a different security zone. This update addresses the issue by ensuring that changes to 'document.implementation' do not affect other documents. Credit to Dean McNamee of Google Inc. for reporting this issue. WebKit CVE-ID: CVE-2009-1686 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Visiting a maliciously crafted website may lead to arbitrary code execution Description: A type conversion issue exists in WebKit's JavaScript exception handling. When an attempt is made to assign the exception to a variable that is declared as a constant, an object is cast to an invalid type, causing memory corruption. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue by ensuring that assignment in a const declaration writes to the variable object. Credit to Jesse Ruderman of Mozilla Corporation for reporting this issue. WebKit CVE-ID: CVE-2009-1687 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue exists in WebKit's JavaScript garbage collector. If an allocation fails, a memory write to an offset of a NULL pointer may result, leading to an unexpected application termination or arbitrary code execution. This update addresses the issue by checking for allocation failure. Credit to SkyLined of Google Inc. for reporting this issue. WebKit CVE-ID: CVE-2009-1688 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Visiting a maliciously crafted website may result in cross- site scripting Description: WebKit does not use the HTML 5 standard method to determine the security context associated with a given script. An implementation issue in WebKit's method may result in a cross-site scripting attack under certain conditions. This update addresses the issue by using the standards-compliant method to determine the security context associated with a script. Credit to Adam Barth of UC Berkeley, and Collin Jackson of Stanford University for reporting this issue. WebKit CVE-ID: CVE-2009-1689 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Visiting a maliciously crafted website may result in a cross-site scripting attack Description: A cross-site scripting issue exists in WebKit. A maliciously crafted website containing a form submitted to 'about:blank' may synchronously replace the document's security context, allowing currently-executing scripts to run in the new security context. This update addresses the issue through improved handling of cross-site interaction with form submission. Credit to Adam Barth of UC Berkeley, and Collin Jackson of Stanford University for reporting this issue. Webkit CVE-ID: CVE-2009-1690 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Visiting a maliciously crafted website may result in an unexpected application termination or arbitrary code execution Description: A memory corruption issue exists in WebKit's handling of recursion in certain DOM event handlers. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved memory management. Credit to SkyLined of Google Inc, and wushi & ling of team509 working with Verisign iDefense VCP for reporting this issue. WebKit CVE-ID: CVE-2009-1691 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Visiting a maliciously crafted website may lead to cross- site scripting Description: A cross-site scripting issue in Safari allows a maliciously crafted website to alter standard JavaScript prototypes of websites served from a different domain. By enticing a user to visit a maliciously crafted web page, an attacker may be able to alter the execution of JavaScript served from other websites. This update addresses the issue through improved access controls on these prototypes. WebKit CVE-ID: CVE-2009-1693 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Visiting a maliciously crafted website may disclose images from other sites Description: A cross-site image capture issue exists in WebKit. By using a canvas with an SVG image, a maliciously crafted website may load and capture an image from another website. This update addresses the issue by restricting the reading of canvases that have images loaded from other websites. Credit to Chris Evans of Google Inc. for reporting this issue. WebKit CVE-ID: CVE-2009-1694 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Visiting a maliciously crafted website may disclose images from other sites Description: A cross-site image capture issue exists in WebKit. By using a canvas and a redirect, a maliciously crafted website may load and capture an image from another website. This update addresses the issue through improved handling of redirects. Credit to Chris Evans of for reporting this issue. WebKit CVE-ID: CVE-2009-1695 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Visiting a maliciously crafted website may result in a cross-site scripting attack Description: An issue in WebKit allows the contents of a frame to be accessed by an HTML document after a page transition has taken place. This may allow a maliciously crafted website to perform a cross-site scripting attack. This update addresses the issue through an improved domain check. Credit to Feng Qian of Google Inc. for reporting this issue. WebKit CVE-ID: CVE-2009-1696 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Websites may surreptitiously track users Description: Safari generates random numbers for JavaScript applications using a predictable algorithm. This could allow a website to track a particular Safari session without using cookies, hidden form elements, IP addresses, or other techniques. This update addresses the issue by using a better random number generator. Credit to Amit Klein of Trusteer for reporting this issue. WebKit CVE-ID: CVE-2009-1697 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Visiting a maliciously crafted website may result in a cross-site scripting attack Description: A CRLF injection issue exists in the handling of XMLHttpRequest headers in WebKit. This may allow a maliciously crafted website to bypass the same-origin policy by issuing an XMLHttpRequest that does not contain a Host header. XMLHttpRequests without a Host header may reach other websites on the same server, and allow attacker-supplied JavaScript to interact with those sites. This update addresses the issue through improved handling of XMLHttpRequest headers. Credit to Per von Zweigbergk for reporting this issue. WebKit CVE-ID: CVE-2009-1698 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Viewing a maliciously crafted web page may lead to an unexpected application termination or arbitrary code execution Description: An uninitialized pointer issue exists in the handling of the CSS 'attr' function. Viewing a maliciously crafted web page may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through additional validation of CSS elements. Credit to Thierry Zoller working with TippingPoint's Zero Day Initiative, and Robert Swiecki of the Google Security Team for reporting this as a security issue. WebKit CVE-ID: CVE-2009-1699 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Visiting a maliciously crafted website may result in an information disclosure Description: An XML External Entity issue exists in WebKit's handling of XML. A maliciously crafted website may be able to read files from the user's system. This update addresses the issue by not loading external entities across origins. Credit to Chris Evans of Google Inc. for reporting this issue. WebKit CVE-ID: CVE-2009-1700 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Visiting a maliciously crafted website may result in the disclosure of sensitive information Description: WebKit does not properly handle redirects when processing Extensible Stylesheet Language Transformations (XSLT). This allows a maliciously crafted website to retrieve XML content from pages on other websites, which could result in the disclosure of sensitive information. This update addresses the issue by ensuring that documents referenced in transformations are downloaded from the same domain as the transformation itself. Credit to Chris Evans of Google for reporting this issue. WebKit CVE-ID: CVE-2009-1701 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: A use-after-free issue exists in WebKit's handling of the JavaScript DOM. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved handling of document elements. Credit to wushi & ling of team509 working with TippingPoint's Zero Day Initiative for reporting this issue. WebKit CVE-ID: CVE-2009-1702 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Visiting a maliciously crafted website may lead to a cross- site scripting attack Description: An issue in WebKit's handling of Location and History objects may result in a cross-site scripting attack when visiting a maliciously crafted website. This update addresses the issue through improved handling of Location and History objects. Credit to Adam Barth and Joel Weinberger of UC Berkeley for reporting this issue. WebKit CVE-ID: CVE-2009-1703 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Visiting a maliciously crafted website may lead to information disclosure Description: WebKit's handling of audio and video HTML elements allows a remote website to reference local "file:" URLs. A maliciously crafted website could perform file existence checking, which may lead to information disclosure. This update addresses the issue through improved handling of audio and video elements. Credit to Dino Dai Zovi for reporting this issue. WebKit CVE-ID: CVE-2009-1709 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: A use-after-free issue exists in WebKit's handling of SVG animation elements. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved handling of caches. Credit to an anonymous researcher working with TippingPoint's Zero Day Initiative for reporting this issue. WebKit CVE-ID: CVE-2009-1710 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: A maliciously crafted website may spoof browser UI elements Description: By specifying a large and mostly transparent custom cursor, and adjusting the CSS3 hotspot property, a maliciously crafted website may spoof browser UI elements, such as the host name and security indicators. This update addresses the issue through additional restriction on custom cursors. Credit to Dean McNamee of Google for reporting this issue WebKit CVE-ID: CVE-2009-1711 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: An uninitialized memory access issue exists in WebKit's handling of Attr DOM objects. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved validation of DOM objects. Credit to Feng Qian of Google Inc. for reporting this issue. Webkit CVE-ID: CVE-2009-1712 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Visiting a maliciously crafted website may lead to information disclosure or arbitrary code execution Description: WebKit allows remote websites to load Java applets from the local system. Local applets may not expect to be loaded remotely and may allow the remote site to execute arbitrary code or otherwise grant unexpected privileges to the remote site. This update addresses the issue by preventing remote websites from loading local applets. WebKit CVE-ID: CVE-2009-1713 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Visiting a maliciously crafted website may result in an information disclosure Description: An information disclosure issue exists in WebKit's implementation of the document() function used in XSLT documents. A maliciously crafted website may be able to read files from other security zones, including the user's system. This update addresses the issue by preventing the loading of resources across origins. Credit to Chris Evans of Google for reporting this issue. WebKit CVE-ID: CVE-2009-1714 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Using Web Inspector on a maliciously crafted website may result in cross-site scripting Description: An issue in Web Inspector allows a page being inspected to run injected script with elevated privileges, including the ability to read the user's file system. This update addresses the issue by proper escaping of HTML attributes. Credit to Pengsu Cheng of Wuhan University for reporting this issue. WebKit CVE-ID: CVE-2009-1715 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Using Web Inspector on a maliciously crafted website may result in cross-site scripting Description: An issue in Web Inspector allows a page being inspected to run injected script with elevated privileges, including the ability to read the user's file system. This update addresses the issue by executing scripts with the privileges of the web page being inspected. Credit to Collin Jackson of Stanford University, and Adam Barth of UC Berkeley for reporting this issue. WebKit CVE-ID: CVE-2009-1718 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.7, Mac OS X Server v10.5.7, Windows XP or Vista Impact: Dragging content over a maliciously crafted web page may lead to information disclosure Description: An issue exists in WebKit's handling of drag events. This may lead to the disclosure of sensitive information when content is dragged over a maliciously crafted web page. This update addresses the issue through improved handling of drag events. Credit to Eric Seidel of Google, Inc. for reporting this issue. Safari 4.0 is available via the Apple Software Update application, or Apple's Safari download site at: http://www.apple.com/safari/download/ Safari for Mac OS X v10.5.7 The download file is named: Safari4.0Leo.dmg Its SHA-1 digest is: 9b18e8dad3b3acd91b7d4208f295422bf8e735ed Safari for Mac OS X v10.4.11 The download file is named: Safari4.0Ti.dmg Its SHA-1 digest is: c5298f24aa9c824a930ba3656487687630d2420a Safari for Windows XP or Vista The download file is named: SafariSetup.exe Its SHA-1 digest is: 46951d6c13bf847a54d033cec2cdf3383e31d1e1 Safari+QuickTime for Windows XP or Vista The file is named: SafariQuickTimeSetup.exe Its SHA-1 digest is: 6c421eb66d521dd03744f76c7e44a40d132379fc Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ - -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.9 (Darwin) iQEbBAEBAgAGBQJKLTKpAAoJEHkodeiKZIkBUkgH9igCqzTyuMFv3zfMotvYHBvD Zcd1VlGjaNI8vp/+igUONuXS1xoIrr5uQDl52w0DXHzH1qQJFWTt+SRqen69hjWe y+d+T8oNC7JvAsWOGDK7SMF7JNt7nl0/wI/VLxKUWBdEGWeovmbe4sUd3uEw+qh9 uVzOqLPVR1K+B2/DyCw4M+o7Fo8KXa/fcesutW8VYzR4avDKfm2iDmCaGhsA4xBe A5Lx9MRxLpgxebbU9H4Ka8NELRH81BhPLrn+QlMBMvKVkv+MdpZ7oKDrBkwkB4KH L71i7QMSxIlglXI78PIG6u67asRSY1SGsTZrDZbFhSBRfmgxkpd5eEAu8YjlHw== =szJh - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iD8DBQFKMGPaNVH5XJJInbgRApi7AJsHva7yJe39zsfXQlvppsw+2w1GQACfRQsr AvzCJ1Hmn1gFjFmgMKh0rnY= =9UsW -----END PGP SIGNATURE-----