Safari < 3.1.1 Multiple Vulnerabilities

High Nessus Plugin ID 31993


The remote host contains a web browser that is affected by several issues.


The version of Safari installed on the remote host reportedly is affected by several issues :

- A malicious website can spoof window titles and URL bars (CVE-2007-2398).

- A memory corruption issue in the file downloading capability could lead to a crash or arbitrary code execution (CVE-2008-1024).

- A cross-site scripting vulnerability exists in WebKit's handling of URLs that contain a colon character in the host name (CVE-2008-1025).

- A heap-based buffer overflow exists in WebKit's handling of JavaScript regular expressions (CVE-2008-1026).


Upgrade to Safari 3.1.1 or later.

See Also

Plugin Details

Severity: High

ID: 31993

File Name: safari_3_1_1.nasl

Version: $Revision: 1.13 $

Type: local

Agent: windows

Family: Windows

Published: 2008/04/18

Modified: 2016/12/14

Dependencies: 31788

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:apple:safari

Required KB Items: SMB/Safari/FileVersion

Exploit Available: false

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 2007/06/14

Reference Information

CVE: CVE-2007-2398, CVE-2008-1024, CVE-2008-1025, CVE-2008-1026

BID: 24484, 28813, 28814, 28815

OSVDB: 38862, 43634, 43980, 44468

Secunia: 29846

CWE: 79, 119, 399