7.6
CVSSv2

CVE-2010-1939

Published: 13/05/2010 Updated: 19/09/2017
CVSS v2 Base Score: 7.6 | Impact Score: 10 | Exploitability Score: 4.9
VMScore: 770
Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Summary

Use-after-free vulnerability in Apple Safari 4.0.5 on Windows allows remote malicious users to execute arbitrary code by using window.open to create a popup window for a crafted HTML document, and then calling the parent window's close method, which triggers improper handling of a deleted window object.

Vulnerable Product Search on Vulmon Subscribe to Product

apple safari 4.0.5

Exploits

<!-- Apple Safari 405 parentclose() (memory corruption) 0day Code Execution Exploit Bug discovered by Krystian Kloskowski (h07) <h07@interiapl> Tested on: Apple Safari 405 / XP SP2 Polish Shellcode: Windows Execute Command (calc) Local: Yes Remote: Yes (POPUP must be enabled [Ctrl+Shift+K]) Just for fun ;) --> <!------------- ...
Download: githubcom/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/12614zip (safari_parent_close_sintsovzip) Unzip and run STARThtm This exploit use JIT-SPRAY for DEP and ASLR bypass jit-shellcode: system("notepad") 0dayhtml - use 0x09090101 address for CALL JITed shellcode STARThtm -> iffhtm -> if1htm ...