Check Point Advisories

Update Protection against Safari JavaScript 'eval' Remote Denial of Service Exploit

Check Point Reference: CPAI-2010-112
Date Published: 25 Mar 2010
Severity: High
Last Updated: Friday 01 January, 2010
Source: milwOrm
Industry Reference:CVE-2009-3272
Protection Provided by:
Who is Vulnerable? Safari 3.2.3
Vulnerability Description A vulnerability was reported in Safari 3.2.3, specifically in the WebKit.dll" module which is part of the WebKit layout engine. Safari is reported to crash when interpreting a webpage that calls the "eval" JavaScript function with "A/" repeating 21526 times (43052 bytes). When triggering this vulnerability, Safari will throw a "Stack Overflow"
exception, and then an access violation when adjusting the trigger to "A/" repeating 21697 times (43394 bytes).
Vulnerability DetailsThe problem has been fixed in Safari 4. According to the researcher, STACK_OVERFLOW does not mean there is a buffer overflow on the stack but rather that the stack for the process has been exhausted and its maximum size has been reached.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK