{"vuid":"VU#176732","idnumber":"176732","name":"Apple Safari vulnerable to buffer overflow","keywords":["Apple","Safari","stack","buffer overflow","arbitrary code execution","web page","JavaScript","apple_security_update_2006_001"],"overview":"Apple Safari is vulnerable to a stack-based buffer overflow. This may allow a remote attacker to execute arbitrary code on a vulnerable system.","clean_desc":"Safari Apple Safari is a web browser that comes with the Mac OS X operating system. The Problem Apple Safari contains a stack-based buffer overflow. This vulnerability can be triggered by persuading a user to access a web page containing specially crafted JavaScript with Safari.","impact":"A remote attacker may be able to execute arbitrary code on a vulnerable system.","resolution":"Install an update\nThis issue is corrected in Apple Security Update 2006-001.","workarounds":"Disable JavaScript in Safari For instructions on how to disable JavaScript in Safari, please refer to the Safari section of the Securing Your Web Browser document.","sysaffected":"","thanks":"This issue was reported in Apple Security Update \n2006-001","author":"This document was written by Jeff Gennari","public":["http://docs.info.apple.com/article.html?artnum=303382","http://secunia.com/advisories/19064/"],"cveids":["CVE-2006-0387"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-03-02T21:45:42Z","publicdate":"2006-03-02T00:00:00Z","datefirstpublished":"2006-03-03T14:51:08Z","dateupdated":"2006-03-03T15:02:03Z","revision":10,"vrda_d1_directreport":"0","vrda_d1_population":"4","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"15","cam_impact":"17","cam_easeofexploitation":"10","cam_attackeraccessrequired":"20","cam_scorecurrent":"17.2125","cam_scorecurrentwidelyknown":"21.99375","cam_scorecurrentwidelyknownexploited":"41.11875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":17.2125,"vulnote":null}