Safari < 3.1.1 Multiple Vulnerabilities

high Nessus Plugin ID 31993

Synopsis

The remote host contains a web browser that is affected by several issues.

Description

The version of Safari installed on the remote host reportedly is affected by several issues :

- A malicious website can spoof window titles and URL bars (CVE-2007-2398).

- A memory corruption issue in the file downloading capability could lead to a crash or arbitrary code execution (CVE-2008-1024).

- A cross-site scripting vulnerability exists in WebKit's handling of URLs that contain a colon character in the host name (CVE-2008-1025).

- A heap-based buffer overflow exists in WebKit's handling of JavaScript regular expressions (CVE-2008-1026).

Solution

Upgrade to Safari 3.1.1 or later.

See Also

http://support.apple.com/kb/HT1467

http://lists.apple.com/archives/security-announce/2008/Apr/msg00001.html

Plugin Details

Severity: High

ID: 31993

File Name: safari_3_1_1.nasl

Version: 1.14

Type: local

Agent: windows

Family: Windows

Published: 4/18/2008

Updated: 7/27/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:apple:safari

Required KB Items: SMB/Safari/FileVersion

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 6/14/2007

Reference Information

CVE: CVE-2007-2398, CVE-2008-1024, CVE-2008-1025, CVE-2008-1026

BID: 28814, 28815, 28813, 24484

CWE: 119, 399, 79

Secunia: 29846