{"vuid":"VU#529441","idnumber":"529441","name":"Apple Safari fails to properly handle a file name","keywords":["Apple","Safari","arbitrary code execution","DoS","denial of service","crafted name","memory corruption","file download"],"overview":"A vulnerabilty in Apple Safari handles specially crafted file name may allow execution of arbitrary code or denial of service.","clean_desc":"According to Apple Safari 3.1.1: A memory corruption issue exists in Safari's file downloading. By enticing a user to download a file with a maliciously crafted name, an attacker may cause an unexpected application termination or arbitrary code execution. This update addresses the issue through improved handling of file downloads. Note that this issue only affects Safari on Windows XP or Vista.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code.","resolution":"Apply Apple Updates\nApple has released an update to address this vulnerability. Refer to Apple Safari 3.1.1.","workarounds":"Disable Open “safe” files after downloading option For instructions on how to disable the Open “safe” files after downloading option in Safari, please refer to the Safari section of the Securing Your Web Browser document. Do not access files from untrusted sources Do not download files from unknown or untrusted sources. Do not open unfamiliar or unexpected links, particularly those delivered in email messages. Please see Cyber Security Tip ST04-014.","sysaffected":"","thanks":"This issue is addressed by Apple Safari \n3.1.1","author":"This document was written by Chris Taschner.","public":["h","t","t","p",":","/","/","s","u","p","p","o","r","t",".","a","p","p","l","e",".","c","o","m","/","k","b","/","H","T","1","4","6","7"],"cveids":["CVE-2008-1024"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2008-04-17T16:19:55Z","publicdate":"2008-04-16T00:00:00Z","datefirstpublished":"2008-04-18T17:30:26Z","dateupdated":"2008-04-18T18:28:53Z","revision":12,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"7","cam_population":"10","cam_impact":"17","cam_easeofexploitation":"11","cam_attackeraccessrequired":"17","cam_scorecurrent":"13.113375","cam_scorecurrentwidelyknown":"16.0936875","cam_scorecurrentwidelyknownexploited":"28.0149375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":13.113375,"vulnote":null}