Mac OS X : Apple Safari < 6.0.4 SVG File Handling Arbitrary Code Execution

high Nessus Plugin ID 66000

Synopsis

The remote host contains a web browser that is affected by a remote code execution vulnerability.

Description

The version of Apple Safari installed on the remote Mac OS X 10.7 or 10.8 host is earlier than 6.0.4. It is, therefore, affected by an arbitrary code execution vulnerability in WebKit related to handling SVG files that can be exploited by tricking a victim into visiting a specially crafted web page.

Solution

Upgrade to Apple Safari 6.0.4 or later.

See Also

http://support.apple.com/kb/HT5701

Plugin Details

Severity: High

ID: 66000

File Name: macosx_Safari6_0_4.nasl

Version: 1.6

Type: local

Agent: macosx

Published: 4/17/2013

Updated: 11/27/2019

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2013-0912

Vulnerability Information

CPE: cpe:/a:apple:safari

Required KB Items: Host/local_checks_enabled, Host/MacOSX/Version, MacOSX/Safari/Installed

Exploit Ease: No known exploits are available

Patch Publication Date: 4/16/2013

Vulnerability Publication Date: 3/7/2013

Reference Information

CVE: CVE-2013-0912

BID: 58388

APPLE-SA: APPLE-SA-2013-04-16-1