First published: Wed Jul 25 2012(Updated: )
Incomplete blacklist vulnerability in WebKit in Apple Safari before 6.0 allows remote attackers to spoof domain names in URLs, and possibly conduct phishing attacks, by leveraging the availability of IDN support and Unicode fonts to construct unspecified homoglyphs.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Safari | <=5.1.7 | |
Apple Safari | =1.0 | |
Apple Safari | =1.0-beta | |
Apple Safari | =1.0-beta2 | |
Apple Safari | =1.0.0 | |
Apple Safari | =1.0.0b1 | |
Apple Safari | =1.0.0b2 | |
Apple Safari | =1.0.1 | |
Apple Safari | =1.0.2 | |
Apple Safari | =1.0.3 | |
Apple Safari | =1.0.3-85.8 | |
Apple Safari | =1.0.3-85.8.1 | |
Apple Safari | =1.0b1 | |
Apple Safari | =1.1 | |
Apple Safari | =1.1.0 | |
Apple Safari | =1.1.1 | |
Apple Safari | =1.2 | |
Apple Safari | =1.2.0 | |
Apple Safari | =1.2.1 | |
Apple Safari | =1.2.2 | |
Apple Safari | =1.2.3 | |
Apple Safari | =1.2.4 | |
Apple Safari | =1.2.5 | |
Apple Safari | =1.3 | |
Apple Safari | =1.3.0 | |
Apple Safari | =1.3.1 | |
Apple Safari | =1.3.2 | |
Apple Safari | =1.3.2-312.5 | |
Apple Safari | =1.3.2-312.6 | |
Apple Safari | =2 | |
Apple Safari | =2.0 | |
Apple Safari | =2.0.0 | |
Apple Safari | =2.0.1 | |
Apple Safari | =2.0.2 | |
Apple Safari | =2.0.3 | |
Apple Safari | =2.0.3-417.8 | |
Apple Safari | =2.0.3-417.9 | |
Apple Safari | =2.0.3-417.9.2 | |
Apple Safari | =2.0.3-417.9.3 | |
Apple Safari | =2.0.4 | |
Apple Safari | =2.0.4 | |
Apple Safari | =3 | |
Apple Safari | =3.0 | |
Apple Safari | =3.0.0 | |
Apple Safari | =3.0.0 | |
Apple Safari | =3.0.0b | |
Apple Safari | =3.0.0b | |
Apple Safari | =3.0.1 | |
Apple Safari | =3.0.1 | |
Apple Safari | =3.0.1-beta | |
Apple Safari | =3.0.1b | |
Apple Safari | =3.0.1b | |
Apple Safari | =3.0.2 | |
Apple Safari | =3.0.2 | |
Apple Safari | =3.0.2b | |
Apple Safari | =3.0.2b | |
Apple Safari | =3.0.3 | |
Apple Safari | =3.0.3 | |
Apple Safari | =3.0.3b | |
Apple Safari | =3.0.3b | |
Apple Safari | =3.0.4 | |
Apple Safari | =3.0.4 | |
Apple Safari | =3.0.4b | |
Apple Safari | =3.0.4b | |
Apple Safari | =3.1.0 | |
Apple Safari | =3.1.0 | |
Apple Safari | =3.1.0b | |
Apple Safari | =3.1.0b | |
Apple Safari | =3.1.1 | |
Apple Safari | =3.1.1b | |
Apple Safari | =3.1.2 | |
Apple Safari | =3.1.2b | |
Apple Safari | =3.2.0 | |
Apple Safari | =3.2.0b | |
Apple Safari | =3.2.1 | |
Apple Safari | =3.2.1b | |
Apple Safari | =3.2.2 | |
Apple Safari | =3.2.2b | |
Apple Safari | =4.0 | |
Apple Safari | =4.0-beta | |
Apple Safari | =4.0.0b | |
Apple Safari | =4.0.1 | |
Apple Safari | =4.0.2 | |
Apple Safari | =4.0.3 | |
Apple Safari | =4.0.4 | |
Apple Safari | =4.0.5 | |
Apple Safari | =4.1 | |
Apple Safari | =4.1.1 | |
Apple Safari | =4.1.2 | |
Apple Safari | =5.0 | |
Apple Safari | =5.0.1 | |
Apple Safari | =5.0.2 | |
Apple Safari | =5.0.4 | |
Apple Safari | =5.0.5 | |
Apple Safari | =5.0.6 | |
Apple Safari | =5.1 | |
Apple Safari | =5.1.1 | |
Apple Safari | =5.1.2 | |
Apple Safari | =5.1.3 | |
Apple Safari | =5.1.4 | |
Apple Safari | =5.1.5 | |
Apple Safari | =5.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3693 is classified as a medium severity vulnerability that can allow remote attackers to spoof domain names.
To mitigate CVE-2012-3693, update your Apple Safari browser to version 6.0 or higher.
CVE-2012-3693 can facilitate phishing attacks through domain name spoofing using homoglyphs.
CVE-2012-3693 affects Apple Safari versions prior to 6.0, including all versions of 5.1.7 and below.
Users can mitigate CVE-2012-3693 by being cautious of suspicious links and verifying URL authenticity.