Vulnerabilities > CVE-2011-3845 - Resource Management Errors vulnerability in Apple Safari 5.1.2
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Use-after-free vulnerability in Apple Safari 5.1.2, when a plug-in with a blocking function is installed, allows user-assisted remote attackers to execute arbitrary code via a crafted web page that is accessed during user interaction with the plug-in, leading to improper coordination between an API call and the plug-in unloading functionality, as demonstrated by the Adobe Flash and RealPlayer plug-ins.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 52325 CVE ID: CVE-2011-3845 Safari是苹果计算机的最新作业系统Mac OS X中的浏览器,使用了KDE的KHTML作为浏览器的运算核心。 Apple Safari在实现上存在远程代码执行漏洞,远程攻击者可利用此漏洞在受影响应用中执行任意代码 0 Apple Safari 5.1.2 (7534.52.7) For Windows 厂商补丁: Apple ----- 目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本: http://support.apple.com/ |
id | SSV:30178 |
last seen | 2017-11-19 |
modified | 2012-03-10 |
published | 2012-03-10 |
reporter | Root |
title | Apple Safari 5.1.2插件卸载远程代码执行漏洞 |
References
- http://osvdb.org/79849
- http://secunia.com/advisories/45758
- http://www.securityfocus.com/bid/52325
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73713
- http://osvdb.org/79849
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73713
- http://www.securityfocus.com/bid/52325
- http://secunia.com/advisories/45758