Mac OS X : Apple Safari < 3.1.1

high Nessus Plugin ID 31992


The remote host contains a web browser that is affected by several issues.


The version of Apple Safari installed on the remote host reportedly is affected by several issues :

- A cross-site scripting vulnerability exists in WebKit's handling of URLs that contain a colon character in the host name (CVE-2008-1025).

- A heap buffer overflow exists in WebKit's handling of JavaScript regular expressions (CVE-2008-1026).


Upgrade to Apple Safari 3.1.1 or later.

See Also

Plugin Details

Severity: High

ID: 31992

File Name: macosx_Safari3_1_1.nasl

Version: 1.18

Type: local

Agent: macosx

Published: 4/18/2008

Updated: 7/14/2018

Supported Sensors: Nessus Agent

Risk Information


Risk Factor: Medium

Score: 5.8


Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:apple:safari

Required KB Items: Host/local_checks_enabled, Host/uname, Host/MacOSX/Version, MacOSX/Safari/Installed

Exploit Ease: No known exploits are available

Patch Publication Date: 4/16/2008

Reference Information

CVE: CVE-2008-1025, CVE-2008-1026

BID: 28814, 28815

Secunia: 29846

CWE: 79, 119