Mac OS X WebKit HTML File Handling Remote Code Execution

2006-11-14T07:04:00
ID OSVDB:30726
Type osvdb
Reporter Tom Ferris(tommy@security-protocols.com)
Modified 2006-11-14T07:04:00

Description

Vulnerability Description

Mac OS X contains a flaw that may allow a malicious user to execute arbitrary code. The issue is triggered within WebKit when a specially crafted HTML document causes a previously deallocated object to be accessed. It is possible that the flaw may allow arbitrary code execution resulting in a loss of integrity.

Solution Description

Currently, there are no known workarounds or upgrades to correct this issue. However, Apple has released a patch to address this vulnerability.

Short Description

Mac OS X contains a flaw that may allow a malicious user to execute arbitrary code. The issue is triggered within WebKit when a specially crafted HTML document causes a previously deallocated object to be accessed. It is possible that the flaw may allow arbitrary code execution resulting in a loss of integrity.

References:

Vendor Specific Advisory URL Secunia Advisory ID:23155 Related OSVDB ID: 30729 Related OSVDB ID: 30732 Related OSVDB ID: 30736 Related OSVDB ID: 30737 Related OSVDB ID: 30727 Related OSVDB ID: 30735 Related OSVDB ID: 30738 Related OSVDB ID: 30728 Related OSVDB ID: 30731 Related OSVDB ID: 30733 Related OSVDB ID: 30734 Related OSVDB ID: 30739 Related OSVDB ID: 30730 News Article: http://news.com.com/Apple+Mac+OS+X+patch+plugs+31+vulnerabilities/2100-1002_3-6139117.html FrSIRT Advisory: ADV-2006-4750 CVE-2006-4412 CERT VU: 848960 Bugtraq ID: 21335