Languages

Archived - About the security content of Safari 3.1.2 for Windows

This document describes the security content of Safari 3.1.2 for Windows, which can be downloaded and installed via Software Update preferences, or from Apple Downloads.

For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about  Apple Product Security, see the Apple Product Security website.

For information about the Apple Product Security PGP Key, see "How to use the Apple Product Security PGP Key."

Where possible, CVE IDs are used to reference the vulnerabilities for further information.

To learn about other Security Updates, see "Apple Security Updates."

This article has been archived and is no longer updated by Apple.

Safari 3.1.2 for Windows

  • Safari

    CVE-ID: CVE-2008-1573

    Available for: Windows XP or Vista

    Impact: Viewing a maliciously crafted BMP or GIF image may lead to information disclosure

    Description: An out-of-bounds memory read may occur in the handling of BMP and GIF images, which may lead to the disclosure of memory contents. This update addresses the issue by performing additional validation of BMP and GIF images. This issue is addressed in systems running Mac OS X 10.5.3, and in Mac OS X 10.4.11 with Security Update 2008-003. Credit to Gynvael Coldwind of Hispasec for reporting this issue.

  • Safari

    CVE-ID: CVE-2008-2540

    Available for: Windows XP or Vista

    Impact: Saving untrusted files to the Windows desktop may lead to the execution of arbitrary code

    Description: An issue exists in how the Windows desktop handles executables. Saving an untrusted file to the Windows desktop may trigger the issue, and lead to the execution of arbitrary code. Web browsers are a means by which files may be saved to the desktop. To help mitigate this issue, the Safari browser has been updated to prompt the user prior to saving a download file. Also, the default download location is changed to the user's Downloads folder on Windows Vista, and to the user's Documents folder on Windows XP. This issue does not exist on systems running Mac OS X. Additional information is available from http://www.microsoft.com/technet/security/advisory/953818.mspx which credits Aviv Raff with reporting the issue.

  • Safari

    CVE-ID: CVE-2008-2306

    Available for: Windows XP or Vista

    Impact: Visiting a malicious website which is in a trusted Internet Explorer zone may lead to the automatic execution of arbitrary code

    Description: If a website is in an Internet Explorer 7 zone with the "Launching applications and unsafe files" setting set to "Enable", or if a website is in the Internet Explorer 6 "Local intranet" or "Trusted sites" zone, Safari will automatically launch executable files that are downloaded from the site. This update addresses the issue by not automatically launching downloaded executable files, and by prompting the user before downloading a file if the "always prompt" setting is enabled. This issue does not exist on systems running Mac OS X. Credit to Will Dormann of CERT/CC for reporting this issue. Acknowledgment to the Microsoft Security Response Center for the collaborative effort to address this issue.

  • WebKit

    CVE-ID: CVE-2008-2307

    Available for: Windows XP or Vista

    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution

    Description: A memory corruption issue exists in WebKit's handling of JavaScript arrays. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved bounds checking. Credit to James Urquhart for reporting this issue.

Important: Mention of third-party websites and products is for informational purposes only and constitutes neither an endorsement nor a recommendation. Apple assumes no responsibility with regard to the selection, performance or use of information or products found at third-party websites. Apple provides this only as a convenience to our users. Apple has not tested the information found on these sites and makes no representations regarding its accuracy or reliability. There are risks inherent in the use of any information or products found on the Internet, and Apple assumes no responsibility in this regard. Please understand that a third-party site is independent from Apple and that Apple has no control over the content on that website. Please contact the vendor for additional information.
Last Modified: Apr 12, 2012
Helpful?
Yes
No
  • Last Modified: Apr 12, 2012
  • Article: HT2092
  • Views:

    3585
  • Rating:
    • 20.0

    (1 Responses)

Additional Product Support Information

Start a Discussion
in Apple Support Communities
See all questions on this article See all questions I have asked