Apple patches 62 bugs in massive Safari update

Nearly all can be exploited by drive-by attacks

Apple today patched a record 62 vulnerabilities in Safari 5, updating the Mac and Windows browser to version 5.0.4.

Wednesday's Safari security update was released at the same time as iOS 4.3, which fixed many of the same flaws.

But Apple's update missed the cut-off for the Pwn2Own contest, which starts today and pits researchers against four browsers -- including Safari, Google's Chrome, Microsoft's Internet Explorer and Mozilla's Firefox -- as the hackers vie for $65,000 in cash prizes.

All but six of the 62 vulnerabilities patched today were accompanied by the phrase "arbitrary code execution," Apple-speak for rating the flaws as "critical."

Unlike other browser makers, including Google, Microsoft and Mozilla, Apple doesn't assign severity rankings to vulnerabilities.

According to Apple's advisory, 57 of the 62 bugs can be exploited by "drive-by" attacks that execute as soon as a victim browses to a malicious Web site with an unpatched edition of Safari.

Most of the vulnerabilities patched Wednesday were in WebKit, the open-source browser engine that powers Safari, and also Google's Chrome. In fact, more than half of the bugs Apple addressed today were originally discovered and reported by Google's own security engineers, or independent researchers who frequently earn bounties from the search company for finding flaws.

Apple also addressed several non-security issues , including one that made sites unstable when they rendered content with multiple plug-ins; another that incorrectly printed Web pages; and others that improved VoiceOver compatibility. VoiceOver is a text-to-speech tool included with Mac OS X that allows the blind and vision impaired to use a Mac and its Safari browser.

Apple last patched Safari in November 2010, when it fixed 27 flaws. Today's update was the largest ever for Safari 5, which Apple shipped in June 2010.

Today's Safari update will not be used by Pwn2Own, however, although today's patches could mean the difference between $15,000 and nothing for some contestants.

According to Peter Vreugdenhil of HP TippingPoint, Pwn2Own's sponsor, the browsers were "frozen" two weeks before today's tip-off, and so the target MacBook Air will not sport Safari 5.0.4. "Exploit development does sometimes rely on certain versions and that is the reason we have frozen the devices," said Vreugdenhil in an e-mail reply to questions today.

But the patches may still play a part. If the vulnerability used by a researcher to hack Safari has been fixed in 5.0.4, TippingPoint will not award the $15,000 prize to him or her, Vreugdenhil confirmed. Instead, the money will go to the first researcher who exploits the "frozen" version of Safari -- in this case 5.0.3 -- using a bug still present in today's update.

"As long as the latest version still has the vulnerability, and the researcher has successfully 'pwned' with the frozen version, he or she will have won," said Vreugdenhil.

Safari 5.0.4 can be downloaded from Apple's site for Mac OS X 10.5 (Leopard), Mac OS X 10.6 (Snow Leopard), Windows XP, Windows Vista and Windows 7. Apple also offered an update to Safari 4.1.3 for customers still running Mac OS X 10.4, aka Tiger.

Mac OS X users will be notified of the new version automatically, while Windows users already running Safari will be alerted by the Apple Software Update tool.

Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer or subscribe to Gregg's RSS feed. His e-mail address is

Read more about security in Computerworld's Security Topic Center.

Join the CSO newsletter!

Error: Please check your email address.

Tags applicationsMicrosoftsecuritybrowserssoftwareMalware and Vulnerabilitiesoperating systemsmozillaAppleMac OSGoogle

More about AppleGoogleHewlett-Packard AustraliaHPMicrosoftMozillaTippingPointTippingPointTopic

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Gregg Keizer

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place