Safari < 6.2.6 / 7.1.6 / 8.0.6 Multiple Vulnerabilities

high Nessus Network Monitor Plugin ID 8870

Synopsis

The remote host is missing a critical Safari patch update.

Description

The version of Safari installed on the remote host is prior to 6.2.6 / 7.1.6 / 8.0.6 and is affected by the following vulnerabilities :

- Multiple memory corruption issues in WebKit due to improper validation of user-supplied input. A remote attacker can exploit this, via a specially crafted web page, to cause a denial of service condition or to execute arbitrary code. (CVE-2015-1152, CVE-2015-1153, and CVE-2015-1154)
- An information disclosure vulnerability in WebKit History exists due to a state management flaw and improper validation of user-supplied input. A remote attacker can exploit this, via a specially crafted web page, to disclose sensitive information from the file system. (CVE-2015-1155)
- A flaw exists in WebKit Page Loading due to improper handling of rel attributes in anchor elements that allows target objects to get unauthorized access to link objects. A remote attacker can exploit this, via a specially crafted web page, to spoof the user interface. (CVE-2015-1156)

Solution

Upgrade to Safari 6.2.6 / 7.1.6 / 8.0.6 or later.

See Also

https://support.apple.com/en-us/HT204826

Plugin Details

Severity: High

ID: 8870

Family: Web Clients

Published: 9/17/2015

Updated: 3/6/2019

Nessus ID: 83291

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apple:safari

Patch Publication Date: 5/7/2015

Vulnerability Publication Date: 5/7/2015

Reference Information

CVE: CVE-2015-1152, CVE-2015-1153, CVE-2015-1154, CVE-2015-1155, CVE-2015-1156

BID: 74523, 74524, 74525, 74526, 74527