Short Name |
HTTP:STC:SAFARI:WEBKIT-MENU-MEM |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Apple Safari WebKit Menu Onchange Memory Corruption |
Release Date |
2010/12/21 |
Update Number |
1836 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a code execution vulnerability in Apple Safari. It is due to memory corruption when processing the on-change event when applied to Menus. A remote attacker can exploit this by enticing a target user to open a maliciously crafted Web page. In a successful attack the behavior of the target machine depends entirely on the intention of the injected code, which would run within the security context of the logged on user. In an unsuccessful attack, the vulnerable application can terminate abnormally.
Webkit for iPhone and iPod touch is prone to a memory-corruption vulnerability. An attacker can exploit this issue by tricking an unsuspecting victim into viewing a web page containing malicious content. Successfully exploiting these issues may allow attackers to crash the affected device or execute arbitrary code. This issue affects iOS 2.0 through 4.0.2 for iPhone 3G and later and iOS 2.1 through 4.0.2 for iPod touch (2nd generation) and later. NOTE: This issue was previously discussed in BID 43070 (Apple iPhone/iPod touch Prior to iOS 4.1 Multiple Vulnerabilities) but has been given its own record to better document it.