|
|
|
|
| |
Credit:
The information has been provided by Charlie Miller and Dion Blazakis.
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-11-109/
|
| |
Vulnerable Systems:
* Apple Safari
User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the support for parsing Office files. When handling the OfficeArtMetafileHeader the process trusts the cbSize field and performs arithmetic on it before making an allocation. As the result is not checked for overflow, the subsequent allocation can be undersized. Later when copying into this buffer, memory can be corrupted leading to arbitrary code execution under the context of the mobile user on the iPhone
Patch Availability:
Apple has issued an update to correct this vulnerability. More details can be found at:
http://support.apple.com/kb/HT4581
CVE Information:
CVE-2011-1417
Disclosure Timeline:
2011-03-09 - Vulnerability reported to vendor
2011-03-22 - Coordinated public release of advisory
|
|
|
|
|