Apple releases Safari 5.0.4 with improved stability for plug-ins

2»

Comments

  • Reply 21 of 30
    lostkiwilostkiwi Posts: 639member
    Quote:
    Originally Posted by anonymouse View Post


    /Library/Internet Plug-Ins/



    I forget the name, but it's obvious when you see it.



    Done. Thanks!
  • Reply 22 of 30
    tallest skiltallest skil Posts: 43,388member
    Quote:
    Originally Posted by lkrupp View Post


    You look foolish for a statement like that.



    You obviously don't use Safari.
  • Reply 23 of 30
    apple ][apple ][ Posts: 9,233member
    There's a problem with Safari and Youtube, at least on my machine.



    If Safari is on 64 bit, the videos simply don't play. If I put Safari on 32 bit, then it works. Anybody else have a similar problem? I'm not sure if this is a Safari problem or a Youtube problem. Youtube is constantly updating things (often for the worse), so I wouldn't be surprised if the fault lay with Youtube.
  • Reply 24 of 30
    sheffsheff Posts: 1,407member
    Webkit nightly is your friEnd. Both safari and chrome are pretty close to passing the arbitrary, yet fun html5 test.
  • Reply 25 of 30
    talksense101talksense101 Posts: 1,738member
    Quote:

    Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.5 or later, Mac OS X Server v10.6.5 or later, Windows 7, Vista, XP SP2 or later



    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution



    Description: Multiple memory corruption issues existed in WebKit. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.

    CVE-ID



    CVE-2010-1824 : kuzzcc, and wushi of team509 working with TippingPoint's Zero Day Initiative



    CVE-2011-0111 : Sergey Glazunov



    CVE-2011-0112 : Yuzo Fujishima of Google Inc.



    CVE-2011-0113 : Andreas Kling of Nokia



    CVE-2011-0114 : Chris Evans of Google Chrome Security Team



    CVE-2011-0115 : J23 working with TippingPoint's Zero Day Initiative, and Emil A Eklund of Google, Inc



    CVE-2011-0116 : an anonymous researcher working with TippingPoint's Zero Day Initiative



    CVE-2011-0117 : Abhishek Arya (Inferno) of Google, Inc.



    CVE-2011-0118 : Abhishek Arya (Inferno) of Google, Inc.



    CVE-2011-0119 : Abhishek Arya (Inferno) of Google, Inc.



    CVE-2011-0120 : Abhishek Arya (Inferno) of Google, Inc.



    CVE-2011-0121 : Abhishek Arya (Inferno) of Google, Inc.



    CVE-2011-0122 : Slawomir Blazek



    CVE-2011-0123 : Abhishek Arya (Inferno) of Google, Inc.



    CVE-2011-0124 : Yuzo Fujishima of Google Inc.



    CVE-2011-0125 : Abhishek Arya (Inferno) of Google, Inc.



    CVE-2011-0126 : Mihai Parparita of Google, Inc.



    CVE-2011-0127 : Abhishek Arya (Inferno) of Google, Inc.



    CVE-2011-0128 : David Bloom



    CVE-2011-0129 : Famlam



    CVE-2011-0130 : Apple



    CVE-2011-0131 : wushi of team509



    CVE-2011-0132 : wushi of team509 working with TippingPoint's Zero Day Initiative



    CVE-2011-0133 : wushi of team509 working with TippingPoint's Zero Day Initiative



    CVE-2011-0134 : Jan Tosovsky



    CVE-2011-0135 : an anonymous reporter



    CVE-2011-0136 : Sergey Glazunov



    CVE-2011-0137 : Sergey Glazunov



    CVE-2011-0138 : kuzzcc



    CVE-2011-0139 : kuzzcc



    CVE-2011-0140 : Sergey Glazunov



    CVE-2011-0141 : Chris Rohlf of Matasano Security



    CVE-2011-0142 : Abhishek Arya (Inferno) of Google, Inc.



    CVE-2011-0143 : Slawomir Blazek and Sergey Glazunov



    CVE-2011-0144 : Emil A Eklund of Google, Inc.



    CVE-2011-0145 : Abhishek Arya (Inferno) of Google, Inc.



    CVE-2011-0146 : Abhishek Arya (Inferno) of Google, Inc.



    CVE-2011-0147 : Dirk Schulze



    CVE-2011-0148 : Michal Zalewski of Google, Inc.



    CVE-2011-0149 : wushi of team509 working with TippingPoint's Zero Day Initiative, and SkyLined of Google Chrome Security Team



    CVE-2011-0150 : Michael Gundlach of safariadblock.com



    CVE-2011-0151 : Abhishek Arya (Inferno) of Google, Inc.



    CVE-2011-0152 : SkyLined of Google Chrome Security Team



    CVE-2011-0153 : Abhishek Arya (Inferno) of Google, Inc.



    CVE-2011-0154 : an anonymous researcher working with TippingPoint's Zero Day Initiative



    CVE-2011-0155 : Aki Helin of OUSPG



    CVE-2011-0156 : Abhishek Arya (Inferno) of Google, Inc.



    CVE-2011-0165 : Sergey Glazunov



    CVE-2011-0168 : Sergey Glazunov



    It does address a whole bunch of issue related to memory corruption. Kudos to Google for raising these defects.
  • Reply 26 of 30
    VUPEN cracked Safari in “5 seconds,” claimed several messages on Twitter from attendees.



    So much for patch day. LINK



    ArsTech
  • Reply 27 of 30
    wizard69wizard69 Posts: 13,377member
    Quote:
    Originally Posted by holywarrior007 View Post


    But I still have the same problem. While I'm playing video in Safari in fullscreen mode, after sometime the screen saver appears. Does anyone have any clue how to fix this annoying problem?



    I actually doubt this is a Safari problem anyways. The screen saver pops up on me when running iTunes.
  • Reply 28 of 30
    irnchrizirnchriz Posts: 1,617member
    This patch would have been too late for pwn2own. They lockdown the target machines a week before the show. Doubt the patch would have helped anyway. Also how did they defeat aslr on safari as that's not supported till lion?
  • Reply 29 of 30
    mr. hmr. h Posts: 4,870member
    Safari, IE hacked first at Pwn2Own



    The exploit used by the winning hacker of Safari still exists in 5.0.4
Sign In or Register to comment.