________________________________________________________________________ Apple Safari Remote code execution (CSS:Attr) ________________________________________________________________________ Shameless plug : ------------------------------------------------------------------------ You are invited to join the 2009 edition of HACK.LU, a small but concentrated luxemburgish security conference. More information : http://www.hack.lu - CFP is open, sponsorship is still possible and warmly welcomed. ------------------------------------------------------------------------ Release mode: ZDI (see previous timelines to know why this went to ZDI) Ref : [TZO-37-2009] - Apple Safari Remote code execution (CSS) Vendor : http://www.apple.com WWW : http://blog.zoller.lu/2009/05/advisory-apple-safari-remote-code.html Status : Patched (http://support.apple.com/kb/HT3613) Credit : http://support.apple.com/kb/HT3613 CVE : CVE-2009-1698 Affected products : - Apple Safari versions prior to 4.0 I. Background ~~~~~~~~~~~~~ Wikipedia quote: "Apple Inc. (NASDAQ: AAPL) is an American multinational corporation which designs and manufactures consumer electronics and software products. The company's best-known hardware products include Macintosh computers, the iPod and the iPhone." II. Description ~~~~~~~~~~~~~~~ Calling a CSS attr attribute with a large number leads to memory corruption III. Impact ~~~~~~~~~~~ Viewing a maliciously crafted web page may lead to an unexpected application termination or arbitrary code execution. IV. Proof of concept ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ You can build one with above information V. Disclosure time-line ~~~~~~~~~~~~~~~~~~~~~~~~~ No time-line available