[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] Safari for Windows, 0day URL protocol handler command injection
- To: seclists@xxxxxxxxxxx
- Subject: Re: [Full-disclosure] Safari for Windows, 0day URL protocol handler command injection
- From: "Steven Adair" <steven@xxxxxxxxxxxxxxxx>
- Date: Tue, 12 Jun 2007 08:50:48 -0500 (EST)
Looks like a few others have been found:
http://erratasec.blogspot.com/2007/06/niiiice.html
Steven
securityzone.org
> Apple released version 3 of their popular Safari web browser today, with
> the added twist of offering both an OS X and a Windows version. Given
> that Apple has had a lousy track record with security on OS X, in
> addition to a hostile attitude towards security researchers, a lot of
> people are expecting to see quite a number of vulnerabilities targeted
> towards this new Windows browser.
>
> There is a URL protocol handler command injection vulnerability in
> Safari for Windows that allows you to execute shell commands with
> arbitrary arguments. This vulnerability can be triggered without user
> interaction simply by visiting a webpage. The full advisory and a
> working Proof of Concept exploit can be found at
>
> http://larholm.com/2007/06/12/safari-for-windows-0day-exploit-in-2-hours/
>
> Cheers
> Thor Larholm
>
> --
> I call dibs on the first SafariWin bug
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/