Short Name |
HTTP:STC:SAFARI:WEBKIT-RENDER |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Apple Safari WebKit Rendering Counter Code Execution |
Release Date |
2010/12/22 |
Update Number |
1837 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in Apple Safari's WebKit. It is due to an error in WebKit's support for generated content. When utilizing generated content on an element, the vulnerable code inserts multiple references to the generated element. When the generated page is being destroyed, the vulnerable application will navigate through the references to discover more elements to destroy. Remote attackers can exploit this by enticing the target user to open a maliciously crafted Web page. A successful attack can result in execution of arbitrary code within the security context of the current user. An unsuccessful attempt terminates the affected application abnormally.
WebKit is prone to a remote memory-corruption vulnerability. An attacker can exploit this issue by enticing an unsuspecting user into viewing a web page containing malicious content. A successful exploit will result in the execution of arbitrary code in the context of the user running the affected application. This issue has been addressed in Apple Safari 5.0.1 and 4.1.1. NOTE: This issue was previously covered in BID 42020 (Apple Safari Prior to 5.0.1 and 4.1.1 Multiple Security Vulnerabilities) but has been given its own record to better document it.