Vulnerability Note VU#905292

Apple Safari code execution vulnerability

Original Release date: 18 Dec 2007 | Last revised: 07 Jan 2008


The Apple Safari web browser contains a vulnerability that may allow an attacker to execute arbitrary code.


Per Apple Security Update 2007-009:

    A memory corruption issue exists in Safari's handling of feed: URLs. By enticing a user to access a maliciously crafted URL, an attacker may cause an unexpected application termination or arbitrary code execution. This update addresses the issue by performing additional validation of feed: URLs and providing an error message in case of an invalid URL. This issue does not affect systems running Mac OS X 10.5 or later.


A remote unauthenticated attacker who can persuade a user to click on a malicious hyperlink may be able to execute arbitrary code. Note that per Apple Security Update 2007-009 this vulnerability only affects versions of Safari shipped with Mac OS X 10.4 and earlier.


Apple has released an update to address this issue. See Apple Security Update 2007-009 for more information on obtaining updates.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Apple Computer, Inc.Affected-18 Dec 2007
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Information available in About Security Update 2007-009 was used in this report.

This document was written by Ryan Giobbi.

Other Information

  • CVE IDs: CVE-2007-5859
  • Date Public: 18 Dec 2007
  • Date First Published: 18 Dec 2007
  • Date Last Updated: 07 Jan 2008
  • Severity Metric: 3.85
  • Document Revision: 12


If you have feedback, comments, or additional information about this vulnerability, please send us email.