Mac OS X : Apple Safari < 6.1.1 / 7.0.1 Multiple Vulnerabilities

high Nessus Plugin ID 71498


The remote host contains a web browser that is affected by several vulnerabilities.


The version of Apple Safari installed on the remote Mac OS X host is prior to 6.1.1 or 7.0.1. It is, therefore, potentially affected by several issues :

- A use-after-free error exists related to 'inline-block' rendering. (CVE-2013-2909)

- Multiple, unspecified memory corruption vulnerabilities exist in WebKit that could lead to unexpected program termination or arbitrary code execution. (CVE-2013-5195, CVE-2013-5196, CVE-2013-5197, CVE-2013-5198, CVE-2013-5199, CVE-2013-5225, CVE-2013-5228)

- Multiple information disclosure vulnerabilities exist due to an origin-validation error in which user information is auto-filled into a sub-frame from a different domain. (CVE-2013-5227)


For Mac OS X 10.9, upgrade to 10.9.1, which includes Apple Safari 7.0.1. Otherwise, upgrade to Apple Safari 6.1.1 or later.

See Also

Plugin Details

Severity: High

ID: 71498

File Name: macosx_Safari7_0_1.nasl

Version: 1.6

Type: local

Agent: macosx

Published: 12/17/2013

Updated: 11/27/2019

Supported Sensors: Nessus Agent, Nessus

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2013-2909

Vulnerability Information

CPE: cpe:/a:apple:safari

Required KB Items: Host/local_checks_enabled, Host/MacOSX/Version, MacOSX/Safari/Installed

Exploit Ease: No known exploits are available

Patch Publication Date: 12/16/2013

Vulnerability Publication Date: 10/1/2013

Reference Information

CVE: CVE-2013-2909, CVE-2013-5195, CVE-2013-5196, CVE-2013-5197, CVE-2013-5198, CVE-2013-5199, CVE-2013-5225, CVE-2013-5227, CVE-2013-5228

BID: 64353, 64354, 64355, 64356, 64358, 64359, 64360, 64361, 64362

APPLE-SA: APPLE-SA-2013-12-16-1, APPLE-SA-2013-12-16-2