{"id":418,"date":"2009-01-13T11:40:45","date_gmt":"2009-01-13T19:40:45","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/?p=418"},"modified":"2009-01-13T11:40:45","modified_gmt":"2009-01-13T19:40:45","slug":"current-event-security-vulnerability-in-safari-rss","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2009\/01\/13\/current-event-security-vulnerability-in-safari-rss\/","title":{"rendered":"Current Event: Security Vulnerability in Safari RSS"},"content":{"rendered":"<p>According to the open source programmer Brian Mastenbrook, he has found a security flaw in Safari Rss feeds. He said that Apple&#8217;s Safari browser is vulnerable to an attack that allows a malicious web site to read files on a user&#8217;s hard drive without user intervention. The vulnerability affects both Mac and Windows versions of Safari. This can be used to gain access to sensitive information stored on the user&#8217;s computer, such as emails, passwords, or cookies that could be used to gain access to the user&#8217;s accounts on some web sites.<\/p>\n<p>Mastenbrook reports that all users of Mac OS X 10.5 Leopard who have not changed their feed reader application preference from the system default are affected, regardless of whether they use any RSS feeds or use a different web browser (such as Firefox). Users of previous versions of Mac OS X are not affected. Users of Safari on Windows are also affected. Users who have Safari for Windows installed but do not use it for browsing are not affected.<\/p>\n<p>Although the vulnerability has been acknowledged by Apple, Apple has not made information available on when a fix for this issue will be released.<\/p>\n<p>Threrefore, Mastenbrook recommends users not to use the Safari as a default RSS reader.<br \/>\nFor Mac users,<br \/>\n1. Open Safari and select Preferences&#8230; from the Safari menu.<br \/>\n2. Choose the RSS tab from the top of the Preferences window.<br \/>\n3. Click on the Default RSS reader pop-up and select an application other than Safari.<br \/>\nFor Windows users, use a different web browser.<\/p>\n<p>For more information at <a href=\"http:\/\/brian.mastenbrook.net\/display\/27\">http:\/\/brian.mastenbrook.net\/display\/27<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to the open source programmer Brian Mastenbrook, he has found a security flaw in Safari Rss feeds. He said that Apple&#8217;s Safari browser is vulnerable to an attack that allows a malicious web site to read files on a &hellip; <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2009\/01\/13\/current-event-security-vulnerability-in-safari-rss\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":85,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,1],"tags":[47],"class_list":["post-418","post","type-post","status-publish","format-standard","hentry","category-current-events","category-miscellaneous","tag-apple"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/418","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/85"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=418"}],"version-history":[{"count":3,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/418\/revisions"}],"predecessor-version":[{"id":421,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/418\/revisions\/421"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=418"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=418"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=418"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}