Safari < 3.2.2 Multiple Vulnerabilities

high Nessus Plugin ID 35687

Synopsis

The remote host contains a web browser with multiple vulnerabilities.

Description

The version of Safari installed on the remote Windows host is earlier than 3.2.2. Such versions reportedly have multiple security vulnerabilities :

- Input validation issues in their handling of 'feed:' URLs, which could be abused to execute arbitrary JavaScript code in the local security zone.

- A cached certificate is not required before displaying a lock icon for a HTTPS website. This allows a man- in-the-middle attacker to present the user with spoofed web pages over HTTPS that appear to be from a legitimate source.

- The browser processes a 3xx HTTP CONNECT before a successful SSL handshake, which could allow a man-in- the-middle attacker to execute arbitrary script code in the context of a HTTPS site.

Solution

Upgrade to Safari 3.2.2 or later.

See Also

https://www.microsoft.com/en-us/research/publication/pretty-bad-proxy-an-overlooked-adversary-in-browsers-https-deployments/?from=http%3A%2F%2Fresearch.microsoft.com%2Fapps%2Fpubs%2Fdefault.aspx%3Fid%3D79323

https://support.apple.com/en-us/HT3439

https://lists.apple.com/archives/security-announce/2009/Feb/msg00001.html

Plugin Details

Severity: High

ID: 35687

File Name: safari_3_2_2.nasl

Version: 1.16

Type: local

Agent: windows

Family: Windows

Published: 2/13/2009

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:apple:safari

Required KB Items: SMB/Safari/FileVersion

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2009-0137, CVE-2009-2062, CVE-2009-2072

BID: 33234, 35411, 35412

CWE: 20, 287