![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.900369 |
Category: | General |
Title: | Apple Safari Web Script Execution Vulnerabilities (Jun 2009) |
Summary: | Safari browser is prone to web script execution vulnerabilities. |
Description: | Summary: Safari browser is prone to web script execution vulnerabilities. Vulnerability Insight: - Error in processes a '3xx' HTTP CONNECT response before a successful SSL handshake, which can be exploited by modifying the CONNECT response to specify a 302 redirect to an arbitrary https web site. - Error exists while the HTTP Host header to determine the context of a document provided in a '4xx' or '5xx' CONNECT response from a proxy server, which can be exploited by modifying this CONNECT response, aka an 'SSL tampering' attack. - Error is caused when application does not require a cached certificate before displaying a lock icon for an https web site, while sending the browser a crafted '4xx' or '5xx' CONNECT response page for an https request sent through a proxy server. - Detects http content in https web pages only when the top-level frame uses https. This can be exploited by modifying an http page to include an https iframe that references a script file on an http site, related to 'HTTP-Intended-but-HTTPS-Loadable (HPIHSL) pages.' Vulnerability Impact: Successful exploitation will allow attacker to execute arbitrary web script in an https site's context and spoof an arbitrary https site by letting a browser obtain a valid certificate. Affected Software/OS: Safari version prior to 3.2.2 on Windows. Solution: Upgrade to Safari version 5.0 or later. CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-2062 BugTraq ID: 35412 http://www.securityfocus.com/bid/35412 http://research.microsoft.com/apps/pubs/default.aspx?id=79323 http://research.microsoft.com/pubs/79323/pbp-final-with-update.pdf XForce ISS Database: safari-httpconnect-code-execution(51202) https://exchange.xforce.ibmcloud.com/vulnerabilities/51202 Common Vulnerability Exposure (CVE) ID: CVE-2009-2058 XForce ISS Database: safari-connect-code-execution(51193) https://exchange.xforce.ibmcloud.com/vulnerabilities/51193 Common Vulnerability Exposure (CVE) ID: CVE-2009-2066 BugTraq ID: 35403 http://www.securityfocus.com/bid/35403 XForce ISS Database: safari-http-security-bypass(51187) https://exchange.xforce.ibmcloud.com/vulnerabilities/51187 Common Vulnerability Exposure (CVE) ID: CVE-2009-2072 BugTraq ID: 35411 http://www.securityfocus.com/bid/35411 |
Copyright | Copyright (C) 2009 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |