This script is Copyright (C) 2014-2015 Tenable Network Security, Inc.
The remote host contains a web browser that is affected by multiple
The version of Apple Safari installed on the remote Mac OS X host is a
version prior to 6.2.2 / 7.1.2 / 8.0.2. It is, therefore, affected by
the following vulnerabilities in WebKit :
- An SVG loaded in an IMG element could load a CSS file
cross-origin. This can allow data exfiltration.
- A UI spoofing flaw exists in the handling of scrollbar
boundaries. Visiting websites that frame malicious
content can allow the UI to be spoofed. (CVE-2014-1748)
- Multiple memory corruption issues exist that can lead to
an unexpected application crash or potential arbitrary
code execution by means of malicious website content.
(CVE-2014-4452, CVE-2014-4459, CVE-2014-4466,
CVE-2014-4468, CVE-2014-4469, CVE-2014-4470,
CVE-2014-4471, CVE-2014-4472, CVE-2014-4473,
Note that the 6.2.2 / 7.1.2 / 8.0.2 Safari updates include the
security content of the 6.2.1 / 7.1.1 / 8.0.1 updates. These more
recent updates, however, were released to fix potential issues with
the installation of the previous patch release.
See also :
Upgrade to Apple Safari 6.2.2 / 7.1.2 / 8.0.2 or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : false
Family: MacOS X Local Security Checks
Nessus Plugin ID: 80055 ()
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now