Mac OS X : Apple Safari < 6.2.6 / 7.1.6 / 8.0.6 Multiple Vulnerabilities

This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.


Synopsis :

The remote host has a web browser installed that is affected by
multiple vulnerabilities.

Description :

The version of Apple Safari installed on the remote Mac OS X host is
prior to 6.2.6 / 7.1.6 / 8.0.6. It is, therefore, affected by the
following vulnerabilities :

- Multiple memory corruption issues in WebKit due to
improper validation of user-supplied input. A remote
attacker can exploit this, via a specially crafted
web page, to cause a denial of service condition or to
execute arbitrary code. (CVE-2015-1152, CVE-2015-1153,
and CVE-2015-1154)

- An information disclosure vulnerability in WebKit
History exists due to a state management flaw and
improper validation of user-supplied input. A remote
attacker can exploit this, via a specially crafted web
page, to disclose sensitive information from the file
system. (CVE-2015-1155)

- A flaw exists in WebKit Page Loading due to improper
handling of rel attributes in anchor elements that
allows target objects to get unauthorized access to link
objects. A remote attacker can exploit this, via a
specially crafted web page, to spoof the user interface.
(CVE-2015-1156)

See also :

https://support.apple.com/en-us/HT204826

Solution :

Upgrade to Apple Safari 6.2.6 / 7.1.6 / 8.0.6 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.8
(CVSS2#E:F/RL:ND/RC:ND)
Public Exploit Available : true

Family: MacOS X Local Security Checks

Nessus Plugin ID: 83291 ()

Bugtraq ID: 74523
74524
74525
74526
74527

CVE ID: CVE-2015-1152
CVE-2015-1153
CVE-2015-1154
CVE-2015-1155
CVE-2015-1156

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now