header-logo
Suggest Exploit
vendor:
Safari
by:
Abysssec
7.5
CVSS
HIGH
WebKit Memory Corruption
119
CWE
Product Name: Safari
Affected Version From: Safari 5.0.5
Affected Version To: Safari 5.0.6
Patch Exists: YES
Related CWE: CVE-2011-0222
CPE: a:apple:safari
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP SP3
2011

Abysssec Public Advisory

WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site a different vulnerability than other WebKit CVEs listed in APPLE-SA-2011-07-20-1.

Mitigation:

Update to the latest version of Safari, or use a different web browser.
Source

Exploit-DB raw data:

Abysssec Public Advisory

   apple killed one of our 0day  no point to keep it private anymore :(
   there is another version of exploit using POPup and thats more
reliable but as you know safari block pop up by default so we found a
cool way to bypass it and stand alone module .
   this exploiting using ROP to bypass permanent DEP.

   note : Change spray range if not work on your machine.

   CVE-2011-0222 :

   WebKit, as used in Apple Safari before 5.0.6, allows remote attackers
to execute arbitrary code or cause a denial of service (memory
corruption and application crash)
   via a crafted web site a different vulnerability than other WebKit
CVEs listed in APPLE-SA-2011-07-20-1.

   Tested on windows XP SP3 and safari 5.0.5

   feel free to contact us at : info [at] abysssec.com

   and follow @abysssec for updates

   http://www.abysssec.com/files/CVE-2011-0222_WinXP_Exploit.zip
   https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17575.zip (CVE-2011-0222_WinXP_Exploit.zip)