Critical zero-day flaw found in Apple's Safari browser

Share this article:
A “highly critical” zero-day vulnerability has been discovered in Apple's Safari web browser, according to Danish vulnerability tracking firm Secunia.

The code execution vulnerability, revealed Friday, affects the current version (4.0.5) of Safari for Windows and could allow an attacker to compromise a user's system. Other versions of the browser could also be affected.

Users are being advised to avoid visiting untrusted websites or clicking on links from untrusted sources.

The vulnerability is the result of, “an error in the handling of parent windows and can result in a function call using an invalid pointer,” according to Secunia's advisory. The vulnerability could be exploited to execute arbitrary code if a user is directed to a specially crafted web page and attempts to close pop-up windows.

Secunia has rated the vulnerability “highly critical,” or four out of five on its severity rating scale.

The vulnerability likely also affects Safari for Mac because the code base of the two programs is largely the same, according to Mac security firm Intego

"We're keeping an eye on this to see how it progresses, as this is the kind of vulnerability that can be exploited when a user simply visits a web page," Peter James, spokesman at Intego, wrote in a blog post Monday.

An Apple spokesperson did not immediately respond to a request for comment made by SCMagazineUS.com on Monday.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Email promises free pizza, ensnares victims in Asprox botnet instead

Email promises free pizza, ensnares victims in Asprox ...

Cloudmark came upon an email that offers free pizza, but clicking on the link to get the coupon ends with victims being ensnared in a botnet.

Report: most orgs lacking in response team, policies to address cyber incidents

In its Q3 threat intelligence report, Solutionary learned that 75 percent of organizations it assisted had no response team or policies and procedures to address cyber incidents.

Flash redirect campaign impacts Carnegie Mellon page, leads to Angler EK

Flash redirect campaign impacts Carnegie Mellon page, leads ...

Malwarebytes found that, since early July, thousands of sites had been targeted in the campaign.