{"vuid":"VU#848960","idnumber":"848960","name":"Apple Mac OS X WebKit deallocated object access vulnerability","keywords":["Apple","Mac","OS X","WebKit","DoS","denial of service","arbitrary code execution","crafted HTML documents","apple-2006-007"],"overview":"Apple Safari WebKit fails to properly deallocate objects. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code.","clean_desc":"According to Apple: WebKit is the open source core of Apple's Safari web browser. It is available as a framework in Mac OS X for use in your applications. More information about WebKit is available at the WebKit Project web site. The Apple Safari WebKit component fails to properly dispose of deallocated objects. If a remote attacker persuades a user to access a specially crafted web page with Safari, that attacker may be able to cause that user to access a deallocated object leading to memory corruption. Note that this vulnerability may affect any software that uses WebKit.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code.","resolution":"Apply Apple Updates \nApple advises all users to apply Apple Security Update 2006-007, as it fixes this and other critical security flaws.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported in Apple Security Update \n2006-007\n. Apple credits\n Tom Ferris of Security-Protocols with providing information about this vulnerability.","author":"This document was written by Jeff Gennari based on information from Apple and Security-Protocols.","public":["http://docs.info.apple.com/article.html?artnum=304829","http://secunia.com/advisories/23155/","http://security-protocols.com/sp-x38-advisory.php"],"cveids":["CVE-2006-4412"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-11-29T14:14:15Z","publicdate":"2006-11-28T00:00:00Z","datefirstpublished":"2006-11-29T17:44:50Z","dateupdated":"2007-01-15T11:32:30Z","revision":14,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"4","cam_widelyknown":"13","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"15","cam_impact":"18","cam_easeofexploitation":"12","cam_attackeraccessrequired":"20","cam_scorecurrent":"15.795","cam_scorecurrentwidelyknown":"24.3","cam_scorecurrentwidelyknownexploited":"48.6","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":15.795,"vulnote":null}