iTnews

Apple issues 11 security updates for Safari browser

By Angela Moscaritolo on Nov 17, 2008 10:03AM

The Safari 3.2 update addresses multiple vulnerabilities and adds a new anti-phishing and anti-malware feature.

Apple on Thursday released Safari 3.2, with 11 security updates for Mac OS X and Windows, to close up multiple vulnerabilities, some of which could lead to remote code execution.

The updates are available for Windows XP or Vista, Mac OS X v10.4.11 and Mac OS X v10.5.5. Eight of the updates are specific to Safari and three are specific to WebKit, an open-source application framework.

The patched vulnerabilities could allow an attacker to execute arbitrary code, cause unexpected application termination, foster a denial-of-service condition or obtain sensitive information. The vulnerabilities can be exploited through a maliciously crafted JPEG or TFF image, website or HTML page, Apple said in an advisory.

US-CERT, in an email alert Friday, said they encourage users to review Apple Article HT3298 and apply any necessary updates. 

Safari version 3.2 also includes anti-phishing and anti-malware protection, which Apple calls “fraudulent site” protection that displays an alert when a possible phishing site is detected, Mac security software company Intego said in a blog post Friday. 

Users will be alerted to suspicious malware and phishing sites on Safari 3.2.

"It's a pretty big step for Apple to finally say loud and clear that yes, there are security issues we need to deal with," Intego spokesman Peter James told SCMagazineUS.com Friday. "Everyone's at risk for phishing, which is a pretty serious problem.”

Earlier this week, Apple issued an update to its iLife suite of multimedia software programs, correcting three vulnerabilities that could be exploited to crash an application or execute remote code.

See original article on scmagazineus.com
Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
11applebrowserforissuessafarisecurityupdates

Partner Content

The case for postponing mainframe migration has eroded
Partner Content The case for postponing mainframe migration has eroded
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
DoT Victoria turns to Oracle to implement unified cloud-based platform
Promoted Content DoT Victoria turns to Oracle to implement unified cloud-based platform
Alienated from your own data? You’re not alone
Promoted Content Alienated from your own data? You’re not alone

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • 11th Annual Fraud Prevention Summit 2022
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Angela Moscaritolo
Nov 17 2008
10:03AM
0 Comments

Related Articles

  • Apple Safari bug reveals users' internet activity and identities
  • Apple patches actively exploited macOS Big Sur bug
  • Apple's "Find My" feature created attack vector, researchers say
  • Emergency patches out for exploited Apple zero-days
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Kmart Australia stands up consent-as-a-service platform

Kmart Australia stands up consent-as-a-service platform

Telstra to open its 5G network to wholesale customers

Telstra to open its 5G network to wholesale customers

Active Directory defaults lead to no-fix PrivEsc vulnerability

Active Directory defaults lead to no-fix PrivEsc vulnerability

Westpac promotes its head of technology to mortgage role

Westpac promotes its head of technology to mortgage role

Digital Nation

The other ‘CTO’: The emerging role of the chief transformation officer
The other ‘CTO’: The emerging role of the chief transformation officer
As NFTs gain traction, businesses start taking early bets
As NFTs gain traction, businesses start taking early bets
Metaverse hype will transition into new business models by mid decade: Gartner
Metaverse hype will transition into new business models by mid decade: Gartner
Case Study: PlayHQ leverages graph technologies for sports administration
Case Study: PlayHQ leverages graph technologies for sports administration
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.