Vulnerability Details : CVE-2011-3845
Use-after-free vulnerability in Apple Safari 5.1.2, when a plug-in with a blocking function is installed, allows user-assisted remote attackers to execute arbitrary code via a crafted web page that is accessed during user interaction with the plug-in, leading to improper coordination between an API call and the plug-in unloading functionality, as demonstrated by the Adobe Flash and RealPlayer plug-ins.
Vulnerability category: Memory CorruptionExecute code
Products affected by CVE-2011-3845
- cpe:2.3:a:apple:safari:5.1.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-3845
1.27%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 84 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-3845
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.6
|
HIGH | AV:N/AC:H/Au:N/C:C/I:C/A:C |
4.9
|
10.0
|
NIST |
CWE ids for CVE-2011-3845
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-3845
-
http://www.securityfocus.com/bid/52325
Apple Safari Plugin Unloading Remote Code Execution Vulnerability
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/73713
Apple Safari plug-in code execution CVE-2011-3845 Vulnerability Report
-
http://osvdb.org/79849
Jump to