First published: Wed Jul 25 2012(Updated: )
CRLF injection vulnerability in WebKit in Apple Safari before 6.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP request splitting attacks via a crafted web site that leverages improper WebSockets URI handling.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Safari | <=5.1.7 | |
Apple Safari | =1.0 | |
Apple Safari | =1.0-beta | |
Apple Safari | =1.0-beta2 | |
Apple Safari | =1.0.0 | |
Apple Safari | =1.0.0b1 | |
Apple Safari | =1.0.0b2 | |
Apple Safari | =1.0.1 | |
Apple Safari | =1.0.2 | |
Apple Safari | =1.0.3 | |
Apple Safari | =1.0.3-85.8 | |
Apple Safari | =1.0.3-85.8.1 | |
Apple Safari | =1.0b1 | |
Apple Safari | =1.1 | |
Apple Safari | =1.1.0 | |
Apple Safari | =1.1.1 | |
Apple Safari | =1.2 | |
Apple Safari | =1.2.0 | |
Apple Safari | =1.2.1 | |
Apple Safari | =1.2.2 | |
Apple Safari | =1.2.3 | |
Apple Safari | =1.2.4 | |
Apple Safari | =1.2.5 | |
Apple Safari | =1.3 | |
Apple Safari | =1.3.0 | |
Apple Safari | =1.3.1 | |
Apple Safari | =1.3.2 | |
Apple Safari | =1.3.2-312.5 | |
Apple Safari | =1.3.2-312.6 | |
Apple Safari | =2 | |
Apple Safari | =2.0 | |
Apple Safari | =2.0.0 | |
Apple Safari | =2.0.1 | |
Apple Safari | =2.0.2 | |
Apple Safari | =2.0.3 | |
Apple Safari | =2.0.3-417.8 | |
Apple Safari | =2.0.3-417.9 | |
Apple Safari | =2.0.3-417.9.2 | |
Apple Safari | =2.0.3-417.9.3 | |
Apple Safari | =2.0.4 | |
Apple Safari | =2.0.4 | |
Apple Safari | =3 | |
Apple Safari | =3.0 | |
Apple Safari | =3.0.0 | |
Apple Safari | =3.0.0 | |
Apple Safari | =3.0.0b | |
Apple Safari | =3.0.0b | |
Apple Safari | =3.0.1 | |
Apple Safari | =3.0.1 | |
Apple Safari | =3.0.1-beta | |
Apple Safari | =3.0.1b | |
Apple Safari | =3.0.1b | |
Apple Safari | =3.0.2 | |
Apple Safari | =3.0.2 | |
Apple Safari | =3.0.2b | |
Apple Safari | =3.0.2b | |
Apple Safari | =3.0.3 | |
Apple Safari | =3.0.3 | |
Apple Safari | =3.0.3b | |
Apple Safari | =3.0.3b | |
Apple Safari | =3.0.4 | |
Apple Safari | =3.0.4 | |
Apple Safari | =3.0.4b | |
Apple Safari | =3.0.4b | |
Apple Safari | =3.1.0 | |
Apple Safari | =3.1.0 | |
Apple Safari | =3.1.0b | |
Apple Safari | =3.1.0b | |
Apple Safari | =3.1.1 | |
Apple Safari | =3.1.1b | |
Apple Safari | =3.1.2 | |
Apple Safari | =3.1.2b | |
Apple Safari | =3.2.0 | |
Apple Safari | =3.2.0b | |
Apple Safari | =3.2.1 | |
Apple Safari | =3.2.1b | |
Apple Safari | =3.2.2 | |
Apple Safari | =3.2.2b | |
Apple Safari | =4.0 | |
Apple Safari | =4.0-beta | |
Apple Safari | =4.0.0b | |
Apple Safari | =4.0.1 | |
Apple Safari | =4.0.2 | |
Apple Safari | =4.0.3 | |
Apple Safari | =4.0.4 | |
Apple Safari | =4.0.5 | |
Apple Safari | =4.1 | |
Apple Safari | =4.1.1 | |
Apple Safari | =4.1.2 | |
Apple Safari | =5.0 | |
Apple Safari | =5.0.1 | |
Apple Safari | =5.0.2 | |
Apple Safari | =5.0.4 | |
Apple Safari | =5.0.5 | |
Apple Safari | =5.0.6 | |
Apple Safari | =5.1 | |
Apple Safari | =5.1.1 | |
Apple Safari | =5.1.2 | |
Apple Safari | =5.1.3 | |
Apple Safari | =5.1.4 | |
Apple Safari | =5.1.5 | |
Apple Safari | =5.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3696 is classified as a high-severity vulnerability due to the potential for remote code execution through HTTP request splitting attacks.
To fix CVE-2012-3696, users should update their Apple Safari browser to version 6.0 or later.
CVE-2012-3696 allows attackers to inject arbitrary HTTP headers, leading to HTTP request splitting attacks.
All versions of Apple Safari prior to version 6.0, including versions 1.0 through 5.1.7, are affected by CVE-2012-3696.
The impact of CVE-2012-3696 on web security includes the risk of session hijacking and data manipulation due to improper handling of WebSockets URIs.