HTTP: Apple Safari Pwn2Own Use After Free
This signature detects an attempt to exploit an Use-After-Free Vulnerability in Apple Safari browser. Successful exploitation could allow an attacker to execute arbitrary code into the application's context.
Extended Description
Use after free vulnerability in the String.replace method JavaScriptCore in Apple Safari in iOS before 10.3 allows remote attackers to execute arbitrary code via a crafted web page, or a crafted file.
Affected Products
Apple iphone_os
References
CVE: CVE-2017-2491
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Apple
6.8