Vulnerabilities > CVE-2009-2196
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Unspecified vulnerability in Apple Safari 4 before 4.0.3 allows remote web servers to place an arbitrary web site in the Top Sites view, and possibly conduct phishing attacks, via unknown vectors.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 6 | |
OS | 2 | |
Application | 3 |
Nessus
NASL family MacOS X Local Security Checks NASL id MACOSX_SAFARI4_0_3.NASL description The version of Apple Safari installed on the remote Mac OS X host is earlier than 4.0.3. As such, it is potentially affected by several issues : - A vulnerability in WebKit last seen 2020-06-01 modified 2020-06-02 plugin id 40553 published 2009-08-11 reporter This script is Copyright (C) 2009-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/40553 title Mac OS X : Apple Safari < 4.0.3 code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(40553); script_version("1.14"); script_cvs_date("Date: 2018/07/14 1:59:35"); script_cve_id( "CVE-2009-2195", "CVE-2009-2196", "CVE-2009-2199", "CVE-2009-2200" ); script_bugtraq_id(36022, 36023, 36024, 36026); script_name(english:"Mac OS X : Apple Safari < 4.0.3"); script_summary(english:"Check the Safari SourceVersion"); script_set_attribute( attribute:"synopsis", value: "The remote host contains a web browser that is affected by several vulnerabilities." ); script_set_attribute( attribute:"description", value: "The version of Apple Safari installed on the remote Mac OS X host is earlier than 4.0.3. As such, it is potentially affected by several issues : - A vulnerability in WebKit's parsing of floating point numbers may allow for remote code execution. (CVE-2009-2195) - A vulnerability in Safari may allow a malicious website to be promoted in Safari's Top Sites. (CVE-2009-2196) - A vulnerability in how WebKit renders a URL with look- alike characters could be used to masquerade a website. (CVE-2009-2199) - A vulnerability in WebKit may lead to the disclosure of sensitive information. (CVE-2009-2200)" ); script_set_attribute( attribute:"see_also", value:"http://support.apple.com/kb/HT3733" ); script_set_attribute( attribute:"see_also", value:"http://lists.apple.com/archives/security-announce/2009/Aug/msg00002.html" ); script_set_attribute( attribute:"see_also", value:"http://www.securityfocus.com/advisories/17616" ); script_set_attribute(attribute:"solution", value:"Upgrade to Apple Safari 4.0.3 or later."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_cwe_id(119, 200); script_set_attribute(attribute:"patch_publication_date", value:"2009/08/11"); script_set_attribute(attribute:"plugin_publication_date", value:"2009/08/11"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:apple:safari"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"MacOS X Local Security Checks"); script_copyright(english:"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc."); script_dependencies("macosx_Safari31.nasl"); script_require_keys("Host/local_checks_enabled", "Host/uname", "Host/MacOSX/Version", "MacOSX/Safari/Installed"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); if (!get_kb_item("Host/local_checks_enabled")) exit(0, "Local checks are not enabled."); os = get_kb_item("Host/MacOSX/Version"); if (!os) audit(AUDIT_OS_NOT, "Mac OS X"); uname = get_kb_item_or_exit("Host/uname"); if (!egrep(pattern:"Darwin.* (8\.|9\.[0-8]\.)", string:uname)) audit(AUDIT_OS_NOT, "Mac OS X 10.4 / 10.5"); get_kb_item_or_exit("MacOSX/Safari/Installed"); path = get_kb_item_or_exit("MacOSX/Safari/Path", exit_code:1); version = get_kb_item_or_exit("MacOSX/Safari/Version", exit_code:1); fixed_version = "4.0.3"; if (ver_compare(ver:version, fix:fixed_version, strict:FALSE) == -1) { if (report_verbosity > 0) { report = '\n Installed version : ' + version + '\n Fixed version : ' + fixed_version + '\n'; security_hole(port:0, extra:report); } else security_hole(0); } else audit(AUDIT_INST_VER_NOT_VULN, "Safari", version);
NASL family Windows NASL id SAFARI_4_0_3.NASL description The version of Safari installed on the remote Windows host is earlier than 4.0.3. Such versions are potentially affected by several issues : - A buffer overflow exists in the handling of EXIF metadata that ccould lead to a crash or arbitrary code execution. (CVE-2009-2188) - A vulnerability in WebKit last seen 2020-06-01 modified 2020-06-02 plugin id 40554 published 2009-08-11 reporter This script is Copyright (C) 2009-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/40554 title Safari < 4.0.3 Multiple Vulnerabilities code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(40554); script_version("1.14"); script_cve_id("CVE-2009-2188", "CVE-2009-2195", "CVE-2009-2196", "CVE-2009-2199", "CVE-2009-2200", "CVE-2009-2468"); script_bugtraq_id(36022, 36023, 36024, 36025, 36026); script_name(english:"Safari < 4.0.3 Multiple Vulnerabilities"); script_summary(english:"Checks Safari's version number"); script_set_attribute( attribute:"synopsis", value: "The remote host contains a web browser that is affected by several vulnerabilities." ); script_set_attribute( attribute:"description", value: "The version of Safari installed on the remote Windows host is earlier than 4.0.3. Such versions are potentially affected by several issues : - A buffer overflow exists in the handling of EXIF metadata that ccould lead to a crash or arbitrary code execution. (CVE-2009-2188) - A vulnerability in WebKit's parsing of floating point numbers may allow for remote code execution. (CVE-2009-2195) - A vulnerability in Safari may allow a malicious website to be promoted in Safari's Top Sites. (CVE-2009-2196) - A vulnerability in how WebKit renders an URL with look- alike characters could be used to masquerade a website. (CVE-2009-2199) - A vulnerability in WebKit may lead to the disclosure of sensitive information. (CVE-2009-2200) - A heap-based buffer overflow in CoreGraphics involving the drawing of long text strings could lead to a crash or arbitrary code execution. (CVE-2009-2468)"); script_set_attribute( attribute:"see_also", value:"http://support.apple.com/kb/HT3733" ); script_set_attribute( attribute:"see_also", value:"http://lists.apple.com/archives/security-announce/2009/Aug/msg00002.html" ); script_set_attribute( attribute:"see_also", value:"http://www.securityfocus.com/advisories/17616" ); script_set_attribute( attribute:"solution", value:"Upgrade to Safari 4.0.3 or later." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_cwe_id(119, 189, 200); script_set_attribute( attribute:"patch_publication_date", value:"2009/08/11" ); script_set_attribute( attribute:"plugin_publication_date", value:"2009/08/11" ); script_cvs_date("Date: 2018/07/27 18:38:15"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:apple:safari"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Windows"); script_copyright(english:"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc."); script_dependencies("safari_installed.nasl"); script_require_keys("SMB/Safari/FileVersion"); exit(0); } include("global_settings.inc"); path = get_kb_item("SMB/Safari/Path"); version = get_kb_item("SMB/Safari/FileVersion"); if (isnull(version)) exit(0); ver = split(version, sep:'.', keep:FALSE); for (i=0; i<max_index(ver); i++) ver[i] = int(ver[i]); if ( ver[0] < 4 || ( ver[0] == 4 && ( ver[1] < 531 || ( ver[1] == 531 && ( ver[2] < 9 || (ver[2] == 9 && ver[3] < 1) ) ) ) ) ) { if (report_verbosity > 0) { if (isnull(path)) path = "n/a"; prod_version = get_kb_item("SMB/Safari/ProductVersion"); if (!isnull(prod_version)) version = prod_version; report = string( "\n", "Nessus collected the following information about the current install\n", "of Safari on the remote host :\n", "\n", " Version : ", version, "\n", " Path : ", path, "\n" ); security_hole(port:get_kb_item("SMB/transport"), extra:report); } else security_hole(get_kb_item("SMB/transport")); }