Short Name |
HTTP:STC:SAFARI:WEBKIT-AFREE |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Apple Safari WebKit Selections Use After Free |
Release Date |
2010/12/22 |
Update Number |
1837 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known code execution vulnerability in Apple Safari. It is due to a use-after-free error when processing selections. A remote attacker can exploit this by enticing a target user to open a maliciously crafted Web page. In a successful attack where code executed, the behavior of the target machine depends entirely on the intention of the injected code, which runs within the security context of the logged on user. In an unsuccessful, the vulnerable application can terminate abnormally.
WebKit for Apple iOS for iPhone and iPod touch is prone to a remote code-execution vulnerability. An attacker can exploit this issue by tricking an unsuspecting victim into viewing a web page containing malicious content. A successful exploit will result in the execution of arbitrary attacker-supplied code in the context of the user running the affected application. This issue affects iOS 2.0 through 4.0.2 for iPhone 3G and later and iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later.