Mac OS X : Apple Safari < 6.0.4 SVG File Handling Arbitrary Code Execution

High Nessus Plugin ID 66000


The remote host contains a web browser that is affected by a remote code execution vulnerability.


The version of Apple Safari installed on the remote Mac OS X 10.7 or 10.8 host is earlier than 6.0.4. It is, therefore, affected by an arbitrary code execution vulnerability in WebKit related to handling SVG files that can be exploited by tricking a victim into visiting a specially crafted web page.


Upgrade to Apple Safari 6.0.4 or later.

See Also

Plugin Details

Severity: High

ID: 66000

File Name: macosx_Safari6_0_4.nasl

Version: 1.6

Type: local

Agent: macosx

Published: 2013/04/17

Updated: 2019/11/27

Dependencies: 31604

Risk Information

Risk Factor: High

CVSS Score Source: CVE-2013-0912

CVSS v2.0

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:apple:safari

Required KB Items: Host/local_checks_enabled, Host/MacOSX/Version, MacOSX/Safari/Installed

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2013/04/16

Vulnerability Publication Date: 2013/03/07

Reference Information

CVE: CVE-2013-0912

BID: 58388

APPLE-SA: APPLE-SA-2013-04-16-1