CVE-2011-3845

Use-after-free vulnerability in Apple Safari 5.1.2, when a plug-in with a blocking function is installed, allows user-assisted remote attackers to execute arbitrary code via a crafted web page that is accessed during user interaction with the plug-in, leading to improper coordination between an API call and the plug-in unloading functionality, as demonstrated by the Adobe Flash and RealPlayer plug-ins.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apple:safari:5.1.2:*:*:*:*:*:*:*

History

21 Nov 2024, 01:31

Type Values Removed Values Added
References () http://osvdb.org/79849 - () http://osvdb.org/79849 -
References () http://secunia.com/advisories/45758 - Vendor Advisory () http://secunia.com/advisories/45758 - Vendor Advisory
References () http://www.securityfocus.com/bid/52325 - () http://www.securityfocus.com/bid/52325 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/73713 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/73713 -

Information

Published : 2012-03-08 04:15

Updated : 2024-11-21 01:31


NVD link : CVE-2011-3845

Mitre link : CVE-2011-3845

CVE.ORG link : CVE-2011-3845


JSON object : View

Products Affected

apple

  • safari
CWE
CWE-399

Resource Management Errors