Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2012.0900 Safari 6.0.1 20 September 2012 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Safari Publisher: Apple Operating System: Mac OS X Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Access Privileged Data -- Remote with User Interaction Denial of Service -- Remote with User Interaction Access Confidential Data -- Remote with User Interaction Reduced Security -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2012-3715 CVE-2012-3714 CVE-2012-3713 CVE-2012-3712 CVE-2012-3711 CVE-2012-3710 CVE-2012-3709 CVE-2012-3708 CVE-2012-3707 CVE-2012-3706 CVE-2012-3705 CVE-2012-3704 CVE-2012-3703 CVE-2012-3702 CVE-2012-3701 CVE-2012-3700 CVE-2012-3699 CVE-2012-3692 CVE-2012-3688 CVE-2012-3687 CVE-2012-3685 CVE-2012-3684 CVE-2012-3677 CVE-2012-3676 CVE-2012-3675 CVE-2012-3673 CVE-2012-3672 CVE-2012-3671 CVE-2012-3660 CVE-2012-3659 CVE-2012-3658 CVE-2012-3657 CVE-2012-3654 CVE-2012-3652 CVE-2012-3651 CVE-2012-3649 CVE-2012-3648 CVE-2012-3647 CVE-2012-3643 CVE-2012-3632 CVE-2012-3624 CVE-2012-3623 CVE-2012-3622 CVE-2012-3621 CVE-2012-3617 CVE-2012-3616 CVE-2012-3614 CVE-2012-3613 CVE-2012-3612 CVE-2012-3607 CVE-2012-3606 CVE-2012-3602 CVE-2012-3601 CVE-2012-3598 CVE-2012-2843 CVE-2012-2842 CVE-2012-2831 CVE-2012-2829 CVE-2012-2818 CVE-2012-2817 CVE-2011-3105 Reference: ASB-2012.0101 ASB-2012.0096 ASB-2012.0079 ESB-2012.0899 ESB-2012.0898 ESB-2012.0874 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2012-09-19-3 Safari 6.0.1 Safari 6.0.1 is now available and addresses the following: Safari Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8 and v10.8.1 Impact: Opening a maliciously crafted downloaded HTML document may lead to the disclosure of local file content Description: In OS X Mountain Lion HTML files were removed from the unsafe type list. Quarantined HTML documents are opened in a safe mode that prevents accessing other local or remote resources. A logic error in Safari's handling of the Quarantine attribute caused the safe mode not to be triggered on Quarantined files. This issue was addressed by properly detecting the existence of the Quarantine attribute. CVE-ID CVE-2012-3713 : Aaron Sigel of vtty.com, Masahiro Yamada Safari Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8 and v10.8.1 Impact: Using Autofill on a maliciously crafted website may lead to the disclosure of contact information Description: A rare condition existed in the handling of Form Autofill. Using Form Autofill on a maliciously crafted website may have led to disclosure of information from the Address Book "Me" card that was not included in the Autofill popover. This issue was addressed by limiting Autofill to the fields contained in the popover. CVE-ID CVE-2012-3714 : Jonathan Hogervorst of Buzzera Safari Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8 and v10.8.1 Impact: After editing a HTTPS URL in the address bar, a request may be unexpectedly sent over HTTP Description: A logic issue existed in the handling of HTTPS URLs in the address bar. If a portion of the address was edited by pasting text, the request may be unexpectedly sent over HTTP. This issue was addressed by improved handling of HTTPS URLs. CVE-ID CVE-2012-3715 : Aaron Rhoads of East Watch Services LLC, Pepi Zawodsky WebKit Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8 and v10.8.1 Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling. CVE-ID CVE-2011-3105 : miaubiz CVE-2012-2817 : miaubiz CVE-2012-2818 : miaubiz CVE-2012-2829 : miaubiz CVE-2012-2831 : miaubiz CVE-2012-2842 : miaubiz CVE-2012-2843 : miaubiz CVE-2012-3598 : Apple Product Security CVE-2012-3601 : Martin Barbella of the Google Chrome Security Team using AddressSanitizer CVE-2012-3602 : miaubiz CVE-2012-3606 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3607 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3612 : Skylined of the Google Chrome Security Team CVE-2012-3613 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3614 : Yong Li of Research In Motion, Inc. CVE-2012-3616 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3617 : Apple Product Security CVE-2012-3621 : Skylined of the Google Chrome Security Team CVE-2012-3622 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3623 : Skylined of the Google Chrome Security Team CVE-2012-3624 : Skylined of the Google Chrome Security Team CVE-2012-3632 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3643 : Skylined of the Google Chrome Security Team CVE-2012-3647 : Skylined of the Google Chrome Security Team CVE-2012-3648 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3649 : Dominic Cooney of Google and Martin Barbella of the Google Chrome Security Team CVE-2012-3651 : Abhishek Arya and Martin Barbella of the Google Chrome Security Team CVE-2012-3652 : Martin Barbella of Google Chrome Security Team CVE-2012-3654 : Skylined of the Google Chrome Security Team CVE-2012-3657 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3658 : Apple CVE-2012-3659 : Mario Gomes of netfuzzer.blogspot.com, Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3660 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3671 : Skylined and Martin Barbella of the Google Chrome Security Team CVE-2012-3672 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3673 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3675 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3676 : Julien Chaffraix of the Chromium development community CVE-2012-3677 : Apple CVE-2012-3684 : kuzzcc CVE-2012-3685 : Apple Product Security CVE-2012-3687 : kuzzcc CVE-2012-3688 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3692 : Skylined of the Google Chrome Security Team, Apple Product Security CVE-2012-3699 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3700 : Apple Product Security CVE-2012-3701 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3702 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3703 : Apple Product Security CVE-2012-3704 : Skylined of the Google Chrome Security Team CVE-2012-3705 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3706 : Apple Product Security CVE-2012-3707 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3708 : Apple CVE-2012-3709 : Apple Product Security CVE-2012-3710 : James Robinson of Google CVE-2012-3711 : Skylined of the Google Chrome Security Team CVE-2012-3712 : Abhishek Arya (Inferno) of the Google Chrome Security Team For OS X Lion systems Safari 6.0.1 is available via the Apple Software Update application. For OS X Mountain Lion systems, Safari 6.0.1 is included with OS X v10.8.2. Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ - -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.17 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJQWho/AAoJEPefwLHPlZEwG9kP/A2FKYpkYoEnaHSaCeI8W/Gt F+EjtnJ85SnVz76a81dt7O+F65pYMjMYEEHthgw62JAbZHrw93gf1dWpp+0IfXJZ w/dOV6yNxYmDOh0zir1I2tCIplkD2MvUrubcW+UCwDbVxnGKsTNBWzovHpvos2Uk lRn6Bl1wM5vOthJO14Z6iS0XX4GkefA3XzoVqY6dU0c9mxrTQhtMWvL+Pb1UpqX3 CZLcMmFGRuCE/+aM+d1x749PEteNDbrnw/aYfMyMSUNgb43EaUxCzTiUU+NvzsFL Ah33i29Li38nl+rLVgTRRU9EQVm1ZcujoftpgFw9prTd999f47eCSU5/QeDjY+Zw GLJRDfe/PP/GFKzAchefqS5x2PFUI9hZRGJEFviOEygfEPfYVCe/r/iMvBTtwfkn GVw1WIXcraqxXGzUNhCCZy3rcA8sSbJlCaIIr3VbtPS7PMHwjSaT+DBgD0hWtnk2 uATTye1UKG8m+FfwXn7ha3/W0kmdEGn1dBgpG2d35yXkGj7zgUgi4MX9HTVGTqEd Nvlzpffv5LCCdDqhRgqe4uT7fKmb46owoNNHM4eAH4A4EwHzA3lXQt5twhO9b2gL gWZ+bfwxfUaVlyBDPM1cUZ4e13HRiFPiRI9PJ2S5DrLoiMzpXIbBRH+5fs9uVvV+ zhJ+1dokzSpzRKJOq68N =xYhU - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBUFqDCO4yVqjM2NGpAQLvixAAquaAR2f/jUgekRRQhHRkyc/4H8w/tFjF kWYFvd/NJl6A8HxhUAGXbnexrb5MwkM9HzEO2eN/SmKKvOhI8OTrtIqq0qeVNZ8E /0GJ9hZAEQZyDXt53BUkYoJlGg+KoLZa897i1iD8G0Xmy2fD02oFc0QBaRsP72yT FyPs3jZAmp17BUUDYj0zm9k7wH+rFUyC933LNCjXAInEkz5tIiZWavEyYF54zKv4 aH+a2BFeabpnzU1qStnVZY9bViaFB3mhZxHj+fiIhiccsCODccVHxIu+ifPCm9zT waOnsp5TQROhGphOGz58XiczwXljzRoLCWKJ2+UCh4V4PPjp4jhBQaQtTMVAQ4xa IcvN+VQlwMwDek7MVdEZzvZ19CVpMF1+Ts2bGYoh4FWtPmJejJ8qqbzgDk5yFBB1 DztkjUUpyAYCfioExO2p+IVg1qso+kjJLtaSytuauzFwoy80gKsqbz/uqlnH1qzy 9AZ3+3NYWukY9k022ITz5H63fiImlq0CFkMdW0+Mc56Im/jrBVRYGF8pmImg08UB r4GjZDtfqpdKHAKuMcEzpmQ7OQJ3SiAu8cDizBRhhxI26p4D3y4vOceGx/GtrPdp UMLX9Zo5TzJXoPCPUEMkEQxjiV0FmtHssI33FDijc/4he919q0zsYQ23JZ7cKinD itLcVJnX1cM= =3HHt -----END PGP SIGNATURE-----