{"vuid":"VU#351217","idnumber":"351217","name":"Apple Safari WebKit component vulnerable to buffer overflow","keywords":["Apple","Macintosh","MacOS","DoS","KHTML","KHTMLParser","apple_security_update_2006_001"],"overview":"Apple Safari WebKit component is vulnerable to buffer overflow. This may allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.","clean_desc":"Safari Apple Safari is a web browser that comes with the Mac OS X operating system. WebKit According to Apple: WebKit is the open source core of Apple's Safari web browser. It is available as a framework in Mac OS X for use in your applications. More information is available at the WebKit Project website. The Problem The Apple Safari WebKit component contains a heap-based buffer overflow. This vulnerability can be triggered by persuading a user to access a specially crafted web page with Safari. Considerations WebKit may be used in other Apple software including, but not limited to Dashboard and Mail.","impact":"A remote attacker may be able to execute arbitrary code or crash any application using WebKit","resolution":"Install an update\nThis issue is correced in Apple Security Update 2006-001.","workarounds":"","sysaffected":"","thanks":"This issue was reported in Apple Security Update \n2006-001\n. Apple credits \nSuresec LTD with reporting this issue.","author":"This document was written by Jeff Gennari","public":["http://security-protocols.com/advisory/sp-x22-advisory.txt","http://secunia.com/advisories/18220/","http://docs.info.apple.com/article.html?artnum=303382","http://secunia.com/advisories/19064/","http://webkit.opendarwin.org/"],"cveids":["CVE-2005-4504"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-12-23T18:00:53Z","publicdate":"2005-12-22T00:00:00Z","datefirstpublished":"2006-03-03T14:23:19Z","dateupdated":"2006-03-06T16:15:48Z","revision":16,"vrda_d1_directreport":"0","vrda_d1_population":"1","vrda_d1_impact":"2","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"15","cam_population":"15","cam_impact":"17","cam_easeofexploitation":"6","cam_attackeraccessrequired":"20","cam_scorecurrent":"17.2125","cam_scorecurrentwidelyknown":"20.08125","cam_scorecurrentwidelyknownexploited":"31.55625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":17.2125,"vulnote":null}