Safari 6.1.6 and Safari 7.0.6, the latest versions of Apple’s Web browser, come with fixes for several security vulnerabilities, some of which could be exploited to remotely execute arbitrary code.
Apple hasn’t provided specific details on the vulnerabilities, but the advisory published by the company reveals that they are memory corruption issues affecting WebKit, the open source rendering engine that powers the Web browser.
“Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution,” Apple noted in its advisory.
The flaws have been assigned the following CVE identifiers: CVE-2014-1384, CVE-2014-1385, CVE-2014-1386, CVE-2014-1387, CVE-2014-1388, CVE-2014-1389 and CVE-2014-1390. The issues were discovered by Apple, the Google Chrome Security Team and an anonymous researcher.
The vulnerabilities have been fixed in Safari 6.1.6 and Safari 7.0.6 through improved memory handling, Apple said. Users are advised to update their installations as soon as possible.
Over the past months, Apple has made an effort to address security flaws Safari, with this being the sixth update in ten months. In May, 22 security holes were fixed with the release of versions 7.0.4 and 6.1.4. In June, the company addressed 12 flaws in the Web browser, along with tens of other issues affecting iOS, OS X and Apple TV.
Last week, Apple informed developers that it will change the way OS X recognizes signed apps once OS X Mavericks 10.9.5 is out. Applications signed with “version 1” signatures will be blocked by the Gatekeeper anti-malware feature.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- ICS Cybersecurity Firm Opscura Launches With $9.4 Million in Series A Funding
- Patch Released for Actively Exploited GoAnywhere MFT Zero-Day
- VMware Says No Evidence of Zero-Day Exploitation in ESXiArgs Ransomware Attacks
- Critical Baicells Device Vulnerability Can Expose Telecoms Networks to Snooping
- SecurityWeek Analysis: Over 450 Cybersecurity M&A Deals Announced in 2022
- VMware ESXi Servers Targeted in Ransomware Attack via Old Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- GoAnywhere MFT Users Warned of Zero-Day Exploit
Latest News
- Patient Information Compromised in Data Breach at San Diego Healthcare Provider
- Germany Appoints Central Bank IT Chief to Head Cybersecurity
- OpenSSL Ships Patch for High-Severity Flaws
- Software Supply Chain Security Firm Lineaje Raises $7 Million
- ICS Cybersecurity Firm Opscura Launches With $9.4 Million in Series A Funding
- Vulnerability Provided Access to Toyota Supplier Management Network
- Patch Released for Actively Exploited GoAnywhere MFT Zero-Day
- Linux Variant of Cl0p Ransomware Emerges
