Vulnerabilities > CVE-2009-2196

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
low complexity
apple
microsoft
nessus

Summary

Unspecified vulnerability in Apple Safari 4 before 4.0.3 allows remote web servers to place an arbitrary web site in the Top Sites view, and possibly conduct phishing attacks, via unknown vectors.

Nessus

  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_SAFARI4_0_3.NASL
    descriptionThe version of Apple Safari installed on the remote Mac OS X host is earlier than 4.0.3. As such, it is potentially affected by several issues : - A vulnerability in WebKit
    last seen2020-06-01
    modified2020-06-02
    plugin id40553
    published2009-08-11
    reporterThis script is Copyright (C) 2009-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/40553
    titleMac OS X : Apple Safari < 4.0.3
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(40553);
      script_version("1.14");
      script_cvs_date("Date: 2018/07/14  1:59:35");
    
      script_cve_id(
        "CVE-2009-2195", 
        "CVE-2009-2196",
        "CVE-2009-2199",
        "CVE-2009-2200"
      );
      script_bugtraq_id(36022, 36023, 36024, 36026);
    
      script_name(english:"Mac OS X : Apple Safari < 4.0.3");
      script_summary(english:"Check the Safari SourceVersion");
    
      script_set_attribute(
        attribute:"synopsis",
        value:
    "The remote host contains a web browser that is affected by several
    vulnerabilities."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The version of Apple Safari installed on the remote Mac OS X host is
    earlier than 4.0.3.  As such, it is potentially affected by several
    issues :
    
      - A vulnerability in WebKit's parsing of floating point
        numbers may allow for remote code execution.
        (CVE-2009-2195)
    
      - A vulnerability in Safari may allow a malicious website to
        be promoted in Safari's Top Sites. (CVE-2009-2196)
    
      - A vulnerability in how WebKit renders a URL with look-
        alike characters could be used to masquerade a website.
        (CVE-2009-2199)
    
      - A vulnerability in WebKit may lead to the disclosure of
        sensitive information. (CVE-2009-2200)"
      );
      script_set_attribute(
        attribute:"see_also", 
        value:"http://support.apple.com/kb/HT3733"
      );
      script_set_attribute(
        attribute:"see_also", 
        value:"http://lists.apple.com/archives/security-announce/2009/Aug/msg00002.html"
      );
      script_set_attribute(
        attribute:"see_also", 
        value:"http://www.securityfocus.com/advisories/17616"
      );
      script_set_attribute(attribute:"solution", value:"Upgrade to Apple Safari 4.0.3 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_cwe_id(119, 200);
    
      script_set_attribute(attribute:"patch_publication_date", value:"2009/08/11");
      script_set_attribute(attribute:"plugin_publication_date", value:"2009/08/11");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:apple:safari");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"MacOS X Local Security Checks");
     
      script_copyright(english:"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc.");
     
      script_dependencies("macosx_Safari31.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/uname", "Host/MacOSX/Version", "MacOSX/Safari/Installed");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) exit(0, "Local checks are not enabled.");
    os = get_kb_item("Host/MacOSX/Version");
    if (!os) audit(AUDIT_OS_NOT, "Mac OS X");
    
    uname = get_kb_item_or_exit("Host/uname");
    if (!egrep(pattern:"Darwin.* (8\.|9\.[0-8]\.)", string:uname)) audit(AUDIT_OS_NOT, "Mac OS X 10.4 / 10.5");
    
    
    get_kb_item_or_exit("MacOSX/Safari/Installed");
    path = get_kb_item_or_exit("MacOSX/Safari/Path", exit_code:1);
    version = get_kb_item_or_exit("MacOSX/Safari/Version", exit_code:1);
    
    fixed_version = "4.0.3";
    
    if (ver_compare(ver:version, fix:fixed_version, strict:FALSE) == -1)
    {
      if (report_verbosity > 0)
      {
        report = 
          '\n  Installed version : ' + version + 
          '\n  Fixed version     : ' + fixed_version + '\n';
        security_hole(port:0, extra:report);
      }
      else security_hole(0);
    }
    else audit(AUDIT_INST_VER_NOT_VULN, "Safari", version);
    
  • NASL familyWindows
    NASL idSAFARI_4_0_3.NASL
    descriptionThe version of Safari installed on the remote Windows host is earlier than 4.0.3. Such versions are potentially affected by several issues : - A buffer overflow exists in the handling of EXIF metadata that ccould lead to a crash or arbitrary code execution. (CVE-2009-2188) - A vulnerability in WebKit
    last seen2020-06-01
    modified2020-06-02
    plugin id40554
    published2009-08-11
    reporterThis script is Copyright (C) 2009-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/40554
    titleSafari < 4.0.3 Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    
    include("compat.inc");
    
    
    if (description)
    {
      script_id(40554);
      script_version("1.14");
    
      script_cve_id("CVE-2009-2188", "CVE-2009-2195", "CVE-2009-2196",
                    "CVE-2009-2199", "CVE-2009-2200", "CVE-2009-2468");
      script_bugtraq_id(36022, 36023, 36024, 36025, 36026);
    
      script_name(english:"Safari < 4.0.3 Multiple Vulnerabilities");
      script_summary(english:"Checks Safari's version number");
    
      script_set_attribute( attribute:"synopsis", value:
    "The remote host contains a web browser that is affected by several
    vulnerabilities."  );
      script_set_attribute( attribute:"description",  value:
    "The version of Safari installed on the remote Windows host is earlier
    than 4.0.3.  Such versions are potentially affected by several
    issues :
    
      - A buffer overflow exists in the handling of EXIF
        metadata that ccould lead to a crash or arbitrary code
        execution. (CVE-2009-2188)
    
      - A vulnerability in WebKit's parsing of floating point
        numbers may allow for remote code execution.
        (CVE-2009-2195)
    
      - A vulnerability in Safari may allow a malicious website
        to be promoted in Safari's Top Sites. (CVE-2009-2196)
    
      - A vulnerability in how WebKit renders an URL with look-
        alike characters could be used to masquerade a website.
        (CVE-2009-2199)
    
      - A vulnerability in WebKit may lead to the disclosure of
        sensitive information. (CVE-2009-2200)
    
      - A heap-based buffer overflow in CoreGraphics involving
        the drawing of long text strings could lead to a crash
        or arbitrary code execution. (CVE-2009-2468)");
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.apple.com/kb/HT3733"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://lists.apple.com/archives/security-announce/2009/Aug/msg00002.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.securityfocus.com/advisories/17616"
      );
      script_set_attribute(
        attribute:"solution",
        value:"Upgrade to Safari 4.0.3 or later."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_cwe_id(119, 189, 200);
      script_set_attribute(
        attribute:"patch_publication_date",
        value:"2009/08/11"
      );
      script_set_attribute(
        attribute:"plugin_publication_date",
        value:"2009/08/11"
      );
     script_cvs_date("Date: 2018/07/27 18:38:15");
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:apple:safari");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows");
    
      script_copyright(english:"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc.");
    
      script_dependencies("safari_installed.nasl");
      script_require_keys("SMB/Safari/FileVersion");
    
      exit(0);
    }
    
    
    include("global_settings.inc");
    
    
    path = get_kb_item("SMB/Safari/Path");
    version = get_kb_item("SMB/Safari/FileVersion");
    if (isnull(version)) exit(0);
    
    ver = split(version, sep:'.', keep:FALSE);
    for (i=0; i<max_index(ver); i++)
      ver[i] = int(ver[i]);
    
    if (
      ver[0] < 4 ||
      (
        ver[0] == 4 &&
        (
          ver[1] < 531 ||
          (
            ver[1] == 531 && 
            (
              ver[2] < 9 ||
              (ver[2] == 9 && ver[3] < 1)
            )
          )
        )
      )
    )
    {
      if (report_verbosity > 0)
      {
        if (isnull(path)) path = "n/a";
    
        prod_version = get_kb_item("SMB/Safari/ProductVersion");
        if (!isnull(prod_version)) version = prod_version;
    
        report = string(
          "\n",
          "Nessus collected the following information about the current install\n",
          "of Safari on the remote host :\n",
          "\n",
          "  Version : ", version, "\n",
          "  Path    : ", path, "\n"
        );
        security_hole(port:get_kb_item("SMB/transport"), extra:report);
      }
      else security_hole(get_kb_item("SMB/transport"));
    }