Safari < 10.1.1 Multiple Vulnerabilities

medium Nessus Network Monitor Plugin ID 700117
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote host has a web browser installed that is affected by multiple attack vectors.

Description

Versions of Safari prior to 10.1.1 are affected by multiple vulnerabilities :

- A flaw exists that is triggered as certain input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code.
- A use-after-free error exists in the handling of RenderElement objects. With a specially crafted web page, a context-dependent attacker can dereference already freed memory and potentially execute arbitrary code.
- A use-after-free error exists in the handling of RenderLayer objects. With a specially crafted web page, a context-dependent attacker can dereference already freed memory and potentially execute arbitrary code.
- A use-after-free error exists in the handling of RenderInline objects. With a specially crafted web page, a context-dependent attacker can dereference already freed memory and potentially execute arbitrary code.
- An unspecified flaw exists in the Safari history menu. With a specially crafted web page, a context-dependent attacker can cause an application denial of service.
- A flaw exists related to an inconsistent user interface. This may allow a context-dependent attacker to spoof the address bar.
- A logic flaw exists that allows a UXSS attack. The issue is triggered when handling container nodes. This may allow a context-dependent attacker to create a specially crafted web page that will execute arbitrary script code in a user's browser session within the trust relationship between their browser and any website.
- A flaw exists related to an inconsistent user interface. This may allow a context-dependent attacker to spoof the address bar.

This product is also affected by vulnerabilities found in the following components:

- WebKit
- Web Inspector

Solution

Upgrade to Safari version 10.1.1 or later.

See Also

https://support.apple.com/en-us/HT207804

Plugin Details

Severity: Medium

ID: 700117

Family: Web Clients

Published: 5/18/2017

Updated: 3/6/2019

Dependencies: 3705

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 5.4

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*

Patch Publication Date: 5/15/2017

Vulnerability Publication Date: 5/15/2017

Reference Information

CVE: CVE-2017-2499, CVE-2017-2504, CVE-2017-2505, CVE-2017-2515, CVE-2017-2521, CVE-2017-2525, CVE-2017-2530, CVE-2017-2531, CVE-2017-2536, CVE-2017-2549, CVE-2017-6980, CVE-2017-6984, CVE-2017-2496, CVE-2017-2510, CVE-2017-2539, CVE-2017-2538, CVE-2017-2495, CVE-2017-2500, CVE-2017-2506, CVE-2017-2508, CVE-2017-2511, CVE-2017-2514, CVE-2017-2526, CVE-2017-2528, CVE-2017-2547