Mac OS X : Apple Safari < 3.2

This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.

Synopsis :

The remote host contains a web browser that is affected by several

Description :

The version of Apple Safari installed on the remote Mac OS X host is
earlier than 3.2. As such, it is potentially affected by several
issues :

- A signedness issue in Safari's handling of JavaScript
array indices could lead to a crash or arbitrary code
execution. (CVE-2008-2303)

- A memory corruption issue in WebCore's handling of style
sheet elements could lead to a crash or arbitrary code
execution. (CVE-2008-2317)

- Disabling autocomplete on a form field may not prevent
the data in the field from being stored in the browser
page cache. (CVE-2008-3644)

- WebKit's plug-in interface does not block plug-ins from
launching local URLs, which could allow a remote
attacker to launch local files in Safari and lead to the
disclosure of sensitive information. (CVE-2008-4216)

See also :

Solution :

Upgrade to Apple Safari 3.2 or later.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.7
Public Exploit Available : true

Family: MacOS X Local Security Checks

Nessus Plugin ID: 34773 (macosx_Safari3_2.nasl)

Bugtraq ID: 32291

CVE ID: CVE-2008-2303

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now