Safari gets a tune-up

 

Apple has issued an update for the Windows version of its Safari web browser..

In addition to minor stability fixes, the update addresses four security vulnerabilities in the browser that range in severity from information disclosure to the ability to remotely execute malicious code.

The company is advising all Windows users to install the update, which can be obtained through Apple's software update service or by visiting the company's download site. The update does not affect Mac users.

The most notable of the four security fixes is the so-called 'carpet bomb' condition disclosed by Microsoft earlier this month. That flaw could potentially allow malware that is within a web site designated by Internet Explorer as a trusted site to run without iser input.

Apple said that it solved the problem by removing Safari's ability to automatically launch downloaded files. The company also added an option to the browser's preferences to require user authorization before starting any download.

The download prompt was also part of another fix. Apple used the feature to address a flaw in which files saved directly to the Windows desktop could be automatically launched and potentially used to infect users.

The update changes the default download location to a special folder, rather than directly to the Windows desktop.

Other fixes include a patch for a remote code execution vulnerability in Javascript handling, as well as a vulnerability in which a specially crafted .bmp or .gif could be used to retrieve memory contents and possibly obtain sensitive user data.

Copyright ©v3.co.uk


Tags
 
 
 
Top Stories
Making a case for collaboration
[Blog post] Tap into your company’s people power.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
Tracking the year of CIO churn
[Blog post] Who shone through in 12 months of disruption?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1077

Vote