{"vuid":"VU#943165","idnumber":"943165","name":"Apple Safari window object invalid pointer vulnerability","keywords":["SA39670","Apple Safari","arbitrary code execution","javascript"],"overview":"Apple Safari contains a vulnerability in the handling of window objects, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.","clean_desc":"Apple Safari fails to properly handle references to window objects. Safari can allow a window object to be deleted, while references to the object may still exist. If JavaScript code then attempts to use the deleted window object, this can result in the use of an invalid pointer. This pointer can be controlled by an attacker through the use of JavaScript. Exploit code for this vulnerability is publicly available. We have confirmed Apple Safari 4.0.5 on the Windows platform to be vulnerable. Other versions may also be affected.","impact":"By convincing a victim to view an HTML document (webpage, HTML email, or email attachment) with Apple Safari, an attacker could run arbitrary code with the privileges of the user running the application.","resolution":"Apply an update\nThis issue is addressed in Safari 5.0 and 4.1. Please see Apple document HT4196 for more details.","workarounds":"Disable JavaScript This issue can be mitigated by disabling JavaScript in Apple Safari. Please see the Securing Your Web Browser document for more details. Do not follow unsolicited links In order to convince users to visit their sites, attackers often use URL encoding, IP address variations, long URLs, intentional misspellings, and other techniques to create misleading links. Do not click on unsolicited links received in email, instant messages, web forums, or internet relay chat (IRC) channels. Type URLs directly into the browser to avoid these misleading links. While these are generally good security practices, following these behaviors will not prevent exploitation of this vulnerability in all cases, particularly if a trusted site has been compromised or allows cross-site scripting.","sysaffected":"","thanks":"This vulnerability was publicly disclosed by Krystian Kloskowski.","author":"This document was written by Will Dormann.","public":["h","t","t","p",":","/","/","s","e","c","u","n","i","a",".","c","o","m","/","a","d","v","i","s","o","r","i","e","s","/","3","9","6","7","0","/"],"cveids":["CVE-2010-1939","CVE-2010-1750"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2010-05-10T12:49:59Z","publicdate":"2010-05-07T00:00:00Z","datefirstpublished":"2010-05-10T14:51:16Z","dateupdated":"2010-07-27T11:56:04Z","revision":17,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"4","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"8","cam_population":"8","cam_impact":"15","cam_easeofexploitation":"18","cam_attackeraccessrequired":"18","cam_scorecurrent":"20.412","cam_scorecurrentwidelyknown":"20.412","cam_scorecurrentwidelyknownexploited":"34.992","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":20.412,"vulnote":null}