Full Disclosure mailing list archives
Re: Safari for Windows, 0day URL protocol handler command injection
From: "Jay" <jay.tomas () infosecguru com>
Date: Tue, 12 Jun 2007 15:22:32 -0400
Interesting thing to think about ... Does it benefit Apple to have an insecure browser on Windows? If the millions of clueless computer users get owned will they be able to understand that it was Safari's fault or just that their windows box got compromised and now they have grief and financial loss. Jay ----- Original Message ----- From: dump [mailto:dump () tzib net] To: full-disclosure () lists grok org uk,bugtraq () securityfocus com Sent: Tue, 12 Jun 2007 18:31:38 +0200 Subject: Re: [Full-disclosure] Safari for Windows,0day URL protocol handler command injection Steven Adair wrote:
Looks like a few others have been found: http://erratasec.blogspot.com/2007/06/niiiice.html Steven securityzone.orgApple released version 3 of their popular Safari web browser today, with the added twist of offering both an OS X and a Windows version. Given that Apple has had a lousy track record with security on OS X, in addition to a hostile attitude towards security researchers, a lot of people are expecting to see quite a number of vulnerabilities targeted towards this new Windows browser. There is a URL protocol handler command injection vulnerability in Safari for Windows that allows you to execute shell commands with arbitrary arguments. This vulnerability can be triggered without user interaction simply by visiting a webpage. The full advisory and a working Proof of Concept exploit can be found at
Page is dead but sound like old stuff reported years ago: http://www.securityfocus.com/bid/10406 just that they fixed it at the helper level not at safari level (well it was the right thing to do!). but then they prolly forgot about it and released safari for windows. ^ ^ this said its kinda nothing special to be able to read old advisory to find this kind of bugs :) (and its the right thing to do, too!) 2hours is even long :D _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Safari for Windows, 0day URL protocol handler command injection Thor Larholm (Jun 12)
- Re: Safari for Windows, 0day URL protocol handler command injection Larry Seltzer (Jun 12)
- Re: Safari for Windows, 0day URL protocol handler command injection Andrew Redman (Jun 12)
- Re: Safari for Windows, Jeff Kell (Jun 12)
- Re: Safari for Windows, 0day URL protocol handler command injection Andrew Redman (Jun 12)
- Re: Safari for Windows, 0day URL protocol handler command injection Steven Adair (Jun 12)
- <Possible follow-ups>
- Re: Safari for Windows, 0day URL protocol handler command injection Jay (Jun 12)
- Re: Safari for Windows, 0day URL protocol handler command injection Larry Seltzer (Jun 12)