Use-after-free vulnerability in Apple Safari 5.1.2, when a plug-in with a blocking function is installed, allows user-assisted remote attackers to execute arbitrary code via a crafted web page that is accessed during user interaction with the plug-in, leading to improper coordination between an API call and the plug-in unloading functionality, as demonstrated by the Adobe Flash and RealPlayer plug-ins.
References
Configurations
History
21 Nov 2024, 01:31
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/79849 - | |
References | () http://secunia.com/advisories/45758 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/52325 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/73713 - |
Information
Published : 2012-03-08 04:15
Updated : 2024-11-21 01:31
NVD link : CVE-2011-3845
Mitre link : CVE-2011-3845
CVE.ORG link : CVE-2011-3845
JSON object : View
Products Affected
apple
- safari
CWE
CWE-399
Resource Management Errors