HTTP: Apple Safari File URI Remote Code Execution

This signature detects attempts to exploit a known vulnerability against Apple Safari. A successful attack can lead to arbitrary code execution.

Extended Description

Safari is prone to a remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Versions prior to Safari 5.1.1 are vulnerable. NOTE: This issue was previously covered in BID 50089(Apple Safari Prior to 5.1.1 Multiple Security Vulnerabilities) but has been given its own record to better document it.

Affected Products

Apple safari

Short Name
HTTP:STC:SAFARI:FILE-URI
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Apple CVE-2011-3230 Code Execution File Remote Safari URI bid:50162
Release Date
09/17/2012
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Apple

CVSS Score

6.8

Found a potential security threat?