HTTP: Apple Safari Pwn2Own Use After Free

This signature detects an attempt to exploit an Use-After-Free Vulnerability in Apple Safari browser. Successful exploitation could allow an attacker to execute arbitrary code into the application's context.

Extended Description

Use after free vulnerability in the String.replace method JavaScriptCore in Apple Safari in iOS before 10.3 allows remote attackers to execute arbitrary code via a crafted web page, or a crafted file.

Affected Products

Apple iphone_os

References

CVE: CVE-2017-2491

Short Name
HTTP:STC:APPLE-SFRI-PWN2OWN-UAF
Severity
Major
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
After Apple CVE-2017-2491 Free Pwn2Own Safari Use
Release Date
05/18/2017
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Apple

CVSS Score

6.8

Found a potential security threat?