[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <51704.131.182.176.99.1181656248.squirrel@slashmail.org>
Date: Tue, 12 Jun 2007 08:50:48 -0500 (EST)
From: "Steven Adair" <steven@...urityzone.org>
To: seclists@...holm.com
Cc: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: Re: Safari for Windows,
0day URL protocol handler command injection
Looks like a few others have been found:
http://erratasec.blogspot.com/2007/06/niiiice.html
Steven
securityzone.org
> Apple released version 3 of their popular Safari web browser today, with
> the added twist of offering both an OS X and a Windows version. Given
> that Apple has had a lousy track record with security on OS X, in
> addition to a hostile attitude towards security researchers, a lot of
> people are expecting to see quite a number of vulnerabilities targeted
> towards this new Windows browser.
>
> There is a URL protocol handler command injection vulnerability in
> Safari for Windows that allows you to execute shell commands with
> arbitrary arguments. This vulnerability can be triggered without user
> interaction simply by visiting a webpage. The full advisory and a
> working Proof of Concept exploit can be found at
>
> http://larholm.com/2007/06/12/safari-for-windows-0day-exploit-in-2-hours/
>
> Cheers
> Thor Larholm
>
> --
> I call dibs on the first SafariWin bug
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists