vendor:
Safari
by:
KF of Digitalmunition and Netragard
7,5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Safari
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: YES
Related CWE: CVE-2008-3529
CPE: None
Metasploit:
https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2008-3529/, https://www.rapid7.com/db/vulnerabilities/vmsa-2008-0017-cve-2008-3529/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2008-3529/, https://www.rapid7.com/db/vulnerabilities/apple-osx-libxml-cve-2008-3529/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-0884/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-0886/, https://www.rapid7.com/db/vulnerabilities/apple-safari-cve-2008-3529/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2008-3529/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2008
Safari RSS feed:// buffer overflow via libxml2
This exploit is a Quick-n-dirty PoC for APPLE-SA-2009-05-12 ala CVE-2008-3529. It is a buffer overflow vulnerability in Safari RSS feed:// via libxml2. The exploit uses a meta http-equiv refresh tag to redirect the user to a malicious feed:// URL containing a crafted XML payload. This payload contains a longentity element with a large number of 'A' characters, which causes a buffer overflow when parsed by libxml2.
Mitigation:
Update to the latest version of Safari to patch the vulnerability.