Mac OS X : Apple Safari < 4.0.4

This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.

Synopsis :

The remote host contains a web browser that is affected by several

Description :

The version of Apple Safari installed on the remote Mac OS X host is
earlier than 4.0.4. As such, it is potentially affected by several
issues :

- Multiple use-after-free issues exist in libxml2, the
most serious of which could lead to a program crash.
(CVE-2009-2414, CVE-2009-2416)

- An issue in the handling of navigations initiated via
the 'Open Image in New Tab', 'Open Image in New Window'
or 'Open Link in New Tab' shortcut menu options could
be exploited to load a local HTML file, leading to
disclosure of sensitive information. (CVE-2009-2842)

- An issue involving WebKit's inclusion of custom HTTP
headers specified by a requesting page in preflight
requests in support of Cross-Origin Resource Sharing
can facilitate cross-site request forgery attacks.

- WebKit fails to issue a resource load callback to
determine if a resource should be loaded when it
encounters an HTML 5 Media Element pointing to an
external resource, which could lead to undesired
requests to remote servers. (CVE-2009-2841)

See also :

Solution :

Upgrade to Apple Safari 4.0.4 or later.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : true

Family: MacOS X Local Security Checks

Nessus Plugin ID: 42477 (macosx_Safari4_0_4.nasl)

Bugtraq ID: 36994

CVE ID: CVE-2009-2414

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now