Safari < 3.2.2 Multiple Vulnerabilities

This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.


Synopsis :

The remote host contains a web browser with multiple vulnerabilities.

Description :

The version of Safari installed on the remote Windows host is earlier
than 3.2.2. Such versions reportedly have multiple security
vulnerabilities :

- Input validation issues in their handling of 'feed:'
URLs, which could be abused to execute arbitrary
JavaScript code in the local security zone.

- A cached certificate is not required before displaying
a lock icon for a HTTPS website. This allows a man-
in-the-middle attacker to present the user with spoofed
web pages over HTTPS that appear to be from a legitimate
source.

- The browser processes a 3xx HTTP CONNECT before a
successful SSL handshake, which could allow a man-in-
the-middle attacker to execute arbitrary script code in
the context of a HTTPS site.

See also :

http://research.microsoft.com/apps/pubs/default.aspx?id=79323
http://support.apple.com/kb/ht3439
http://lists.apple.com/archives/security-announce/2009/Feb/msg00001.html

Solution :

Upgrade to Safari 3.2.2 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.9
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 35687 ()

Bugtraq ID: 33234
35411
35412

CVE ID: CVE-2009-0137
CVE-2009-2062
CVE-2009-2072

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now