Blog Post

Safari Update Addresses Critical Vulnerabilities

Safari Just released from Apple (s aapl), Safari 5.0.2 addresses a few usability issues, as well as three security flaws that might get your Mac or PC pwned. For general usage, Safari 5.0.2:

  • Fixes an issue that could prevent users from submitting web forms
  • Fixes an issue that could prevent web content displaying correctly with Google Image results when Flash 10.1 is installed
  • Establishes an encrypted, authenticated connection to the Safari Extensions Gallery

Two of the three security issues affect both Safari for OS X and Windows. As usual, the exploits can occur when “visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.” Beyond that, the WebKit flaws relate to floating point data handling and run-in styling.

The third security issue is for Windows and sounds a lot like DLL load hijacking, “opening a file in a directory that is writable by other users may lead to arbitrary code execution.” HD Moore of Metasploit explains it more clearly.

Essentially, if you open a file type associated with [a vulnerable app] from a remote network share, the application will also try to load one more DLLs from the share, Moore explained. Even if the file that the user opened is completely safe, a malicious DLL can be supplied that will lead to code execution.

Because no user interaction is required, other than questionable web surfing choices, it’s strongly recommended Safari users update as soon as possible.

Apple has also released Safari 4.1.2 for OS X 10.4.

One Response to “Safari Update Addresses Critical Vulnerabilities”