How to Buy
This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.
The remote host contains a web browser that is affected by several
The version of Apple Safari installed on the remote Mac OS X host is
earlier than 4.0.4. As such, it is potentially affected by several
- Multiple use-after-free issues exist in libxml2, the
most serious of which could lead to a program crash.
- An issue in the handling of navigations initiated via
the 'Open Image in New Tab', 'Open Image in New Window'
or 'Open Link in New Tab' shortcut menu options could
be exploited to load a local HTML file, leading to
disclosure of sensitive information. (CVE-2009-2842)
- An issue involving WebKit's inclusion of custom HTTP
headers specified by a requesting page in preflight
requests in support of Cross-Origin Resource Sharing
can facilitate cross-site request forgery attacks.
- WebKit fails to issue a resource load callback to
determine if a resource should be loaded when it
encounters an HTML 5 Media Element pointing to an
external resource, which could lead to undesired
requests to remote servers. (CVE-2009-2841)
See also :
Upgrade to Apple Safari 4.0.4 or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : true
Family: MacOS X Local Security Checks
Nessus Plugin ID: 42477 (macosx_Safari4_0_4.nasl)
Bugtraq ID: 369943699636997
CVE ID: CVE-2009-2414CVE-2009-2416CVE-2009-2816CVE-2009-2841CVE-2009-2842
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.