Lucene search

K
nessusThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.MACOSX_SAFARI9_0.NASL
HistoryOct 02, 2015 - 12:00 a.m.

Mac OS X : Apple Safari < 9.0 Multiple Vulnerabilities

2015-10-0200:00:00
This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
10

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.009 Low

EPSS

Percentile

82.4%

The version of Apple Safari installed on the remote Mac OS X host is prior to 9.0. It is, therefore, affected by multiple vulnerabilities in the following components :

  • Safari
  • Safari Downloads
  • Safari Extensions
  • Safari Safe Browsing
  • WebKit
  • WebKit CSS
  • WebKit JavaScript Bindings
  • WebKit Page Loading
  • WebKit Plug-ins
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(86252);
  script_version("1.5");
  script_cvs_date("Date: 2019/11/20");

  script_cve_id(
    "CVE-2015-3801",
    "CVE-2015-5764",
    "CVE-2015-5765",
    "CVE-2015-5767",
    "CVE-2015-5780",
    "CVE-2015-5788",
    "CVE-2015-5789",
    "CVE-2015-5790",
    "CVE-2015-5791",
    "CVE-2015-5792",
    "CVE-2015-5793",
    "CVE-2015-5794",
    "CVE-2015-5795",
    "CVE-2015-5796",
    "CVE-2015-5797",
    "CVE-2015-5798",
    "CVE-2015-5799",
    "CVE-2015-5800",
    "CVE-2015-5801",
    "CVE-2015-5802",
    "CVE-2015-5803",
    "CVE-2015-5804",
    "CVE-2015-5805",
    "CVE-2015-5806",
    "CVE-2015-5807",
    "CVE-2015-5808",
    "CVE-2015-5809",
    "CVE-2015-5810",
    "CVE-2015-5811",
    "CVE-2015-5812",
    "CVE-2015-5813",
    "CVE-2015-5814",
    "CVE-2015-5815",
    "CVE-2015-5816",
    "CVE-2015-5817",
    "CVE-2015-5818",
    "CVE-2015-5819",
    "CVE-2015-5820",
    "CVE-2015-5821",
    "CVE-2015-5822",
    "CVE-2015-5823",
    "CVE-2015-5825",
    "CVE-2015-5826",
    "CVE-2015-5827",
    "CVE-2015-5828"
  );
  script_bugtraq_id(76764);
  script_xref(name:"APPLE-SA", value:"APPLE-SA-2015-09-30-2");

  script_name(english:"Mac OS X : Apple Safari < 9.0 Multiple Vulnerabilities");
  script_summary(english:"Checks the Safari version.");

  script_set_attribute(attribute:"synopsis", value:
"The remote host has a web browser installed is affected by multiple
vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The version of Apple Safari installed on the remote Mac OS X host is
prior to 9.0. It is, therefore, affected by multiple vulnerabilities
in the following components :

  - Safari
  - Safari Downloads
  - Safari Extensions
  - Safari Safe Browsing
  - WebKit
  - WebKit CSS
  - WebKit JavaScript Bindings
  - WebKit Page Loading
  - WebKit Plug-ins");
  script_set_attribute(attribute:"see_also", value:"https://support.apple.com/en-us/HT205265");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Apple Safari version 9.0 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2015-5780");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2015/09/24");
  script_set_attribute(attribute:"patch_publication_date", value:"2015/09/30");
  script_set_attribute(attribute:"plugin_publication_date", value:"2015/10/02");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:apple:safari");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"MacOS X Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("macosx_Safari31.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/MacOSX/Version", "MacOSX/Safari/Installed");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
os = get_kb_item("Host/MacOSX/Version");
if (!os) audit(AUDIT_OS_NOT, "Mac OS X");

if (!ereg(pattern:"Mac OS X 10\.(9|10|11)([^0-9]|$)", string:os)) audit(AUDIT_OS_NOT, "Mac OS X 10.9 / 10.10 / 10.11");

get_kb_item_or_exit("MacOSX/Safari/Installed");
path    = get_kb_item_or_exit("MacOSX/Safari/Path", exit_code:1);
version = get_kb_item_or_exit("MacOSX/Safari/Version", exit_code:1);

fixed_version = "9.0";

if (ver_compare(ver:version, fix:fixed_version, strict:FALSE) == -1)
{
  if (report_verbosity > 0)
  {
    report =
      '\n  Path              : ' + path +
      '\n  Installed version : ' + version +
      '\n  Fixed version     : ' + fixed_version +
      '\n';
    security_hole(port:0, extra:report);
  }
  else security_hole(0);
}
else audit(AUDIT_INST_PATH_NOT_VULN, "Safari", version, path);
VendorProductVersionCPE
applesafaricpe:/a:apple:safari

References

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.009 Low

EPSS

Percentile

82.4%