ID CVE-2016-1864 Type cve Reporter cve@mitre.org Modified 2017-09-01T01:29:00
Description
The XSS auditor in WebKit, as used in Apple iOS before 9.3 and Safari before 9.1, does not properly handle redirects in block mode, which allows remote attackers to obtain sensitive information via a crafted URL.
{"apple": [{"lastseen": "2020-12-24T20:44:27", "bulletinFamily": "software", "cvelist": ["CVE-2016-1771", "CVE-2016-1783", "CVE-2016-1864", "CVE-2016-1782", "CVE-2016-1781", "CVE-2009-2197", "CVE-2016-1785", "CVE-2016-1779", "CVE-2016-1778", "CVE-2016-1784", "CVE-2016-1786", "CVE-2016-1772"], "description": "For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the [Apple Product Security](<https://www.apple.com/support/security/>) website.\n\nFor information about the Apple Product Security PGP Key, see [How to use the Apple Product Security PGP Key](<https://support.apple.com/kb/HT201601>).\n\nWhere possible, [CVE IDs](<http://cve.mitre.org/about/>) are used to reference the vulnerabilities for further information.\n\nTo learn about other security updates, see [Apple security updates](<https://support.apple.com/kb/HT201222>).\n\n## Safari 9.1\n\n * **Safari**\n\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11.4\n\nImpact: Visiting a malicious website may lead to user interface spoofing\n\nDescription: An issue existed where the text of a dialog included page-supplied text. This issue was addressed by no longer including that text.\n\nCVE-ID\n\nCVE-2009-2197 : Alexios Fakos of n.runs AG\n\n * **Safari Downloads**\n\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11.4\n\nImpact: Visiting a maliciously crafted webpage may lead to a system denial of service\n\nDescription: An insufficient input validation issue existed in the handling of certain files. This was addressed through additional checks during file expansion.\n\nCVE-ID\n\nCVE-2016-1771 : Russ Cox\n\n * **Safari Top Sites**\n\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11.4\n\nImpact: A website may be able to track sensitive user information\n\nDescription: A cookie storage issue existed in the Top Sites page. This issue was addressed through improved state management.\n\nCVE-ID\n\nCVE-2016-1772 : WoofWagly\n\n * **WebKit**\n\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11.4\n\nImpact: A website may be able to track sensitive user information\n\nDescription: An issue existed in the handling of attachment URLs. This issue was addressed through improved URL handling.\n\nCVE-ID\n\nCVE-2016-1781 : Devdatta Akhawe of Dropbox, Inc.\n\n * **WebKit**\n\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11.4\n\nImpact: Processing maliciously crafted web content may lead to arbitrary code execution\n\nDescription: Multiple memory corruption issues were addressed through improved memory handling.\n\nCVE-ID\n\nCVE-2016-1778 : 0x1byte working with Trend Micro's Zero Day Initiative (ZDI) and Yang Zhao of CM Security\n\nCVE-2016-1783 : Mihai Parparita of Google\n\n * **WebKit**\n\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11.4\n\nImpact: A malicious website may be able to access restricted ports on arbitrary servers\n\nDescription: A port redirection issue was addressed through additional port validation.\n\nCVE-ID\n\nCVE-2016-1782 : Muneaki Nishimura (nishimunea) of Recruit Technologies Co.,Ltd.\n\n * **WebKit**\n\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11.4\n\nImpact: Visiting a maliciously crafted website may reveal a user's current location\n\nDescription: An issue existed in the parsing of geolocation requests. This was addressed through improved validation of the security origin for geolocation requests.\n\nCVE-ID\n\nCVE-2016-1779 : xisigr of Tencent's Xuanwu Lab (www.tencent.com)\n\n * **WebKit**\n\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11.4\n\nImpact: Opening a maliciously crafted URL may lead to the disclosure of sensitive user information\n\nDescription: An issue existed in URL redirection when XSS auditor was used in block mode. This issue was addressed through improved URL navigation.\n\nCVE-ID\n\nCVE-2016-1864 : Takeshi Terada of Mitsui Bussan Secure Directions, Inc.\n\n * **WebKit History**\n\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11.4\n\nImpact: Processing maliciously crafted web content may lead to an unexpected Safari crash\n\nDescription: A resource exhaustion issue was addressed through improved input validation.\n\nCVE-ID\n\nCVE-2016-1784 : Moony Li and Jack Tang of TrendMicro and \u674e\u666e\u541b of \u65e0\u58f0\u4fe1\u606f\u6280\u672fPKAV Team (PKAV.net)\n\n * **WebKit Page Loading**\n\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11.4\n\nImpact: A malicious website may exfiltrate data cross-origin\n\nDescription: A caching issue existed with character encoding. This was addressed through additional request checking.\n\nCVE-ID\n\nCVE-2016-1785 : an anonymous researcher\n\n * **WebKit Page Loading**\n\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11.4\n\nImpact: Visiting a malicious website may lead to user interface spoofing\n\nDescription: Redirect responses may have allowed a malicious website to display an arbitrary URL and read cached contents of the destination origin. This issue was addressed through improved URL display logic.\n\nCVE-ID\n\nCVE-2016-1786 : ma.la of LINE Corporation\n", "edition": 2, "modified": "2017-01-23T03:54:36", "published": "2017-01-23T03:54:36", "id": "APPLE:HT206171", "href": "https://support.apple.com/kb/HT206171", "title": "About the security content of Safari 9.1 - Apple Support", "type": "apple", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-24T20:42:47", "bulletinFamily": "software", "cvelist": ["CVE-2016-1734", "CVE-2015-8659", "CVE-2016-1760", "CVE-2016-1766", "CVE-2016-1783", "CVE-2016-1758", "CVE-2015-5312", "CVE-2016-1864", "CVE-2016-1782", "CVE-2016-1761", "CVE-2016-1762", "CVE-2016-1781", "CVE-2016-1756", "CVE-2016-1785", "CVE-2016-1752", "CVE-2016-1740", "CVE-2016-1775", "CVE-2016-1763", "CVE-2015-7500", "CVE-2016-0802", "CVE-2016-1779", "CVE-2015-8242", "CVE-2016-1757", "CVE-2015-1819", "CVE-2015-7499", "CVE-2016-1780", "CVE-2016-1754", "CVE-2016-1950", "CVE-2016-1750", "CVE-2016-1748", "CVE-2016-0801", "CVE-2016-1755", "CVE-2016-1778", "CVE-2016-1751", "CVE-2016-1784", "CVE-2016-1753", "CVE-2016-1788", "CVE-2015-7942", "CVE-2015-8035", "CVE-2016-1786"], "description": "For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the [Apple Product Security](<https://www.apple.com/support/security/>) website.\n\nFor information about the Apple Product Security PGP Key, see [How to use the Apple Product Security PGP Key](<https://support.apple.com/kb/HT201601>).\n\nWhere possible, [CVE IDs](<http://cve.mitre.org/about/>) are used to reference the vulnerabilities for further information.\n\nTo learn about other security updates, see [Apple security updates](<https://support.apple.com/kb/HT201222>).\n\n## iOS 9.3\n\n * **AppleUSBNetworking**\n\nAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later\n\nImpact: A USB device may be able to cause a denial of service\n\nDescription: An error handling issue existed in packet validation. This issue was addressed through improved error handling.\n\nCVE-ID\n\nCVE-2016-1734 : Andrea Barisani and Andrej Rosano of Inverse Path\n\n * **FontParser**\n\nAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later\n\nImpact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution\n\nDescription: A memory corruption issue was addressed through improved memory handling.\n\nCVE-ID\n\nCVE-2016-1740 : HappilyCoded (ant4g0nist and r3dsm0k3) working with Trend Micro's Zero Day Initiative (ZDI)\n\n * **HTTPProtocol**\n\nAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later\n\nImpact: A remote attacker may be able to execute arbitrary code\n\nDescription: Multiple vulnerabilities existed in nghttp2 versions prior to 1.6.0, the most serious of which may have led to remote code execution. These were addressed by updating nghttp2 to version 1.6.0.\n\nCVE-ID\n\nCVE-2015-8659\n\n * **IOHIDFamily**\n\nAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later\n\nImpact: An application may be able to determine kernel memory layout\n\nDescription: A memory corruption issue was addressed through improved memory handling.\n\nCVE-ID\n\nCVE-2016-1748 : Brandon Azad\n\n * **Kernel**\n\nAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later\n\nImpact: An application may be able to cause a denial of service\n\nDescription: A denial of service issue was addressed through improved validation.\n\nCVE-ID\n\nCVE-2016-1752 : CESG\n\n * **Kernel**\n\nAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later\n\nImpact: An application may be able to execute arbitrary code with kernel privileges\n\nDescription: A use after free issue was addressed through improved memory management.\n\nCVE-ID\n\nCVE-2016-1750 : CESG\n\n * **Kernel**\n\nAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later\n\nImpact: An application may be able to execute arbitrary code with kernel privileges\n\nDescription: Multiple integer overflows were addressed through improved input validation.\n\nCVE-ID\n\nCVE-2016-1753 : Juwei Lin Trend Micro working with Trend Micro's Zero Day Initiative (ZDI)\n\n * **Kernel**\n\nAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later\n\nImpact: An application may be able to bypass code signing\n\nDescription: A permissions issue existed in which execute permission was incorrectly granted. This issue was addressed through improved permission validation.\n\nCVE-ID\n\nCVE-2016-1751 : Eric Monti of Square Mobile Security\n\n * **Kernel**\n\nAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later\n\nImpact: An application may be able to execute arbitrary code with kernel privileges\n\nDescription: A race condition existed during the creation of new processes. This was addressed through improved state handling.\n\nCVE-ID\n\nCVE-2016-1757 : Ian Beer of Google Project Zero and Pedro Vila\u00e7a\n\n * **Kernel**\n\nAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later\n\nImpact: An application may be able to execute arbitrary code with kernel privileges\n\nDescription: A null pointer dereference was addressed through improved input validation.\n\nCVE-ID\n\nCVE-2016-1756 : Lufeng Li of Qihoo 360 Vulcan Team\n\n * **Kernel**\n\nAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later\n\nImpact: An application may be able to execute arbitrary code with kernel privileges\n\nDescription: Multiple memory corruption issues were addressed through improved memory handling.\n\nCVE-ID\n\nCVE-2016-1754 : Lufeng Li of Qihoo 360 Vulcan Team\n\nCVE-2016-1755 : Ian Beer of Google Project Zero\n\n * **Kernel**\n\nAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later\n\nImpact: An application may be able to determine kernel memory layout\n\nDescription: An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed through improved input validation.\n\nCVE-ID\n\nCVE-2016-1758 : Brandon Azad\n\n * **LaunchServices**\n\nAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later\n\nImpact: An application may be able to modify events from other applications\n\nDescription: An event handler validation issue existed in the XPC Services API. This issue was addressed through improved message validation.\n\nCVE-ID\n\nCVE-2016-1760 : Proteas of Qihoo 360 Nirvan Team\n\n * **libxml2**\n\nAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later\n\nImpact: Processing maliciously crafted XML may lead to unexpected application termination or arbitrary code execution\n\nDescription: Multiple memory corruption issues were addressed through improved memory handling.\n\nCVE-ID\n\nCVE-2015-1819\n\nCVE-2015-5312 : David Drysdale of Google\n\nCVE-2015-7499\n\nCVE-2015-7500 : Kostya Serebryany of Google\n\nCVE-2015-7942 : Kostya Serebryany of Google\n\nCVE-2015-8035 : gustavo.grieco\n\nCVE-2015-8242 : Hugh Davenport\n\nCVE-2016-1761 : wol0xff working with Trend Micro's Zero Day Initiative (ZDI)\n\nCVE-2016-1762\n\n * **Messages**\n\nAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later\n\nImpact: Visiting a maliciously crafted website may auto-fill text into other Message threads\n\nDescription: An issue existed in the parsing of SMS URLs. This issue was addressed through improved URL validation.\n\nCVE-ID\n\nCVE-2016-1763 : CityTog\n\n * **Messages**\n\nAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later\n\nImpact: An attacker who is able to bypass Apple's certificate pinning, intercept TLS connections, inject messages, and record encrypted attachment-type messages may be able to read attachments\n\nDescription: A cryptographic issue was addressed by rejecting duplicate messages on the client.\n\nCVE-ID\n\nCVE-2016-1788 : Christina Garman, Matthew Green, Gabriel Kaptchuk, Ian Miers, and Michael Rushanan of Johns Hopkins University\n\n * **Profiles**\n\nAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later\n\nImpact: An untrusted MDM profile may be incorrectly displayed as verified\n\nDescription: A certificate validation issue existed in MDM profiles. This was addressed through additional checks.\n\nCVE-ID\n\nCVE-2016-1766 : Taylor Boyko working with Trend Micro's Zero Day Initiative (ZDI)\n\n * **Security**\n\nAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later\n\nImpact: Processing a maliciously crafted certificate may lead to arbitrary code execution\n\nDescription: A memory corruption issue existed in the ASN.1 decoder. This issue was addressed through improved input validation.\n\nCVE-ID\n\nCVE-2016-1950 : Francis Gabriel of Quarkslab\n\n * **TrueTypeScaler**\n\nAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later\n\nImpact: Processing a maliciously crafted font file may lead to arbitrary code execution\n\nDescription: A memory corruption issue existed in the processing of font files. This issue was addressed through improved input validation.\n\nCVE-ID\n\nCVE-2016-1775 : 0x1byte working with Trend Micro's Zero Day Initiative (ZDI)\n\n * **WebKit**\n\nAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later\n\nImpact: Processing maliciously crafted web content may lead to arbitrary code execution\n\nDescription: Multiple memory corruption issues were addressed through improved memory handling.\n\nCVE-ID\n\nCVE-2016-1778 : 0x1byte working with Trend Micro's Zero Day Initiative (ZDI) and Yang Zhao of CM Security\n\nCVE-2016-1783 : Mihai Parparita of Google\n\n * **WebKit**\n\nAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later\n\nImpact: A website may be able to track sensitive user information\n\nDescription: An issue existed in the handling of attachment URLs. This issue was addressed through improved URL handling.\n\nCVE-ID\n\nCVE-2016-1781 : Devdatta Akhawe of Dropbox, Inc.\n\n * **WebKit**\n\nAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later\n\nImpact: A website may be able to track sensitive user information\n\nDescription: A hidden web page may be able to access device-orientation and device-motion data. This issue was addressed by suspending the availability of this data when the web view is hidden.\n\nCVE-ID\n\nCVE-2016-1780 : Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao of the School of Computing Science, Newcastle University, UK\n\n * **WebKit**\n\nAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later\n\nImpact: Visiting a maliciously crafted website may reveal a user's current location\n\nDescription: An issue existed in the parsing of geolocation requests. This was addressed through improved validation of the security origin for geolocation requests.\n\nCVE-ID\n\nCVE-2016-1779 : xisigr of Tencent's Xuanwu Lab (http://www.tencent.com)\n\n * **WebKit**\n\nAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later\n\nImpact: A malicious website may be able to access restricted ports on arbitrary servers\n\nDescription: A port redirection issue was addressed through additional port validation.\n\nCVE-ID\n\nCVE-2016-1782 : Muneaki Nishimura (nishimunea) of Recruit Technologies Co., Ltd.\n\n * **WebKit**\n\nAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later\n\nImpact: Opening a maliciously crafted URL may lead to the disclosure of sensitive user information\n\nDescription: An issue existed in URL redirection when XSS auditor was used in block mode. This issue was addressed through improved URL navigation.\n\nCVE-ID\n\nCVE-2016-1864 : Takeshi Terada of Mitsui Bussan Secure Directions, Inc.\n\n * **WebKit History**\n\nAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later\n\nImpact: Processing maliciously crafted web content may lead to an unexpected Safari crash\n\nDescription: A resource exhaustion issue was addressed through improved input validation.\n\nCVE-ID\n\nCVE-2016-1784 : Moony Li and Jack Tang of TrendMicro and \u674e\u666e\u541b of \u65e0\u58f0\u4fe1\u606f\u6280\u672fPKAV Team (PKAV.net)\n\n * **WebKit Page Loading**\n\nAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later\n\nImpact: Visiting a malicious website may lead to user interface spoofing\n\nDescription: Redirect responses may have allowed a malicious website to display an arbitrary URL and read cached contents of the destination origin. This issue was addressed through improved URL display logic.\n\nCVE-ID\n\nCVE-2016-1786 : ma.la of LINE Corporation\n\n * **WebKit Page Loading**\n\nAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later\n\nImpact: A malicious website may exfiltrate data cross-origin\n\nDescription: A caching issue existed with character encoding. This was addressed through additional request checking.\n\nCVE-ID\n\nCVE-2016-1785 : an anonymous researcher\n\n * **Wi-Fi**\n\nAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later\n\nImpact: An attacker with a privileged network position may be able to execute arbitrary code\n\nDescription: A frame validation and memory corruption issue existed for a given ethertype. This issue was addressed through additional ethertype validation and improved memory handling.\n\nCVE-ID\n\nCVE-2016-0801 : an anonymous researcher\n\nCVE-2016-0802 : an anonymous researcher\n", "edition": 2, "modified": "2017-01-23T03:54:34", "published": "2017-01-23T03:54:34", "id": "APPLE:HT206166", "href": "https://support.apple.com/kb/HT206166", "title": "About the security content of iOS 9.3 - Apple Support", "type": "apple", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2019-07-17T14:25:53", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-1771", "CVE-2016-1783", "CVE-2016-1864", "CVE-2016-1782", "CVE-2016-1762", "CVE-2016-1781", "CVE-2009-2197", "CVE-2016-1785", "CVE-2016-1779", "CVE-2016-1778", "CVE-2016-1784", "CVE-2016-1786", "CVE-2016-1772"], "description": "This host is installed with Apple Safari\n and is prone to multiple vulnerabilities.", "modified": "2019-07-05T00:00:00", "published": "2016-04-01T00:00:00", "id": "OPENVAS:1361412562310806692", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310806692", "type": "openvas", "title": "Apple Safari Multiple Vulnerabilities-01 Mar16 (Mac OS X)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Apple Safari Multiple Vulnerabilities-01 Mar16 (Mac OS X)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:apple:safari\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.806692\");\n script_version(\"2019-07-05T08:56:43+0000\");\n script_cve_id(\"CVE-2016-1779\", \"CVE-2016-1771\", \"CVE-2016-1772\", \"CVE-2016-1762\",\n \"CVE-2009-2197\", \"CVE-2016-1786\", \"CVE-2016-1785\", \"CVE-2016-1784\",\n \"CVE-2016-1782\", \"CVE-2016-1783\", \"CVE-2016-1781\", \"CVE-2016-1778\",\n \"CVE-2016-1864\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-05 08:56:43 +0000 (Fri, 05 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2016-04-01 13:19:23 +0530 (Fri, 01 Apr 2016)\");\n script_name(\"Apple Safari Multiple Vulnerabilities-01 Mar16 (Mac OS X)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Apple Safari\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - An insufficient input validation issue in the handling of certain files.\n\n - An error where the text of a dialog included page-supplied text.\n\n - A cookie storage issue existed in the Top Sites page.\n\n - An issue in the handling of attachment URLs.\n\n - Multiple memory corruption issue.\n\n - A port redirection issue.\n\n - An issue in the parsing of geolocation requests.\n\n - A resource exhaustion issue.\n\n - A caching issue with character encoding.\n\n - An error allowing URL redirection.\n\n - An error in the libxml2 leading to processing of maliciously crafted XML.\n\n - The XSS auditor in WebKit does not properly handle redirects in block mode.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to conduct application crash or denial of service attack, user\n interface spoofing, gain access to sensitive information, access restricted\n ports, conduct data cross-origin attacks and potentially execute arbitrary\n code on the affected system.\");\n\n script_tag(name:\"affected\", value:\"Apple Safari versions before 9.1\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Apple Safari version 9.1 or\n later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"https://support.apple.com/en-us/HT206171\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"macosx_safari_detect.nasl\");\n script_mandatory_keys(\"AppleSafari/MacOSX/Version\");\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!safVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:safVer, test_version:\"9.1\"))\n{\n report = report_fixed_ver(installed_version:safVer, fixed_version:\"9.1\");\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2021-01-01T03:23:27", "description": "The remote host is running a version of Mac OS X that is 10.11.x prior\nto 10.11.6. It is, therefore, affected by multiple vulnerabilities in\nthe following components :\n\n - apache_mod_php\n - Audio\n - bsdiff\n - CFNetwork\n - CoreGraphics\n - FaceTime\n - Graphics Drivers\n - ImageIO\n - Intel Graphics Driver\n - IOHIDFamily\n - IOKit\n - IOSurface\n - Kernel\n - libc++abi\n - libexpat\n - LibreSSL\n - libxml2\n - libxslt\n - Login Window\n - OpenSSL\n - QuickTime\n - Safari Login AutoFill\n - Sandbox Profiles\n\nNote that successful exploitation of the most serious issues can\nresult in arbitrary code execution.", "edition": 28, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2016-07-21T00:00:00", "title": "Mac OS X 10.11.x < 10.11.6 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-4634", "CVE-2014-9862", "CVE-2016-4626", "CVE-2016-4614", "CVE-2016-4646", "CVE-2016-4645", "CVE-2016-4649", "CVE-2016-1836", "CVE-2016-4598", "CVE-2016-4652", "CVE-2016-4616", "CVE-2016-4602", "CVE-2016-4638", "CVE-2016-4582", "CVE-2016-4610", "CVE-2016-4609", "CVE-2016-1864", "CVE-2016-2108", "CVE-2013-7456", "CVE-2016-1863", "CVE-2016-4629", "CVE-2016-4632", "CVE-2016-4630", "CVE-2016-2105", "CVE-2016-4600", "CVE-2016-4483", "CVE-2016-2107", "CVE-2016-4612", "CVE-2016-0718", "CVE-2016-4647", "CVE-2016-2109", "CVE-2016-4607", "CVE-2016-4637", "CVE-2016-4621", "CVE-2016-4449", "CVE-2016-4648", "CVE-2016-4595", "CVE-2016-4625", "CVE-2016-4448", "CVE-2016-4599", "CVE-2016-4635", "CVE-2016-4615", "CVE-2016-4633", "CVE-2016-5093", "CVE-2016-5094", "CVE-2016-4650", "CVE-2016-2176", "CVE-2016-4597", "CVE-2016-1684", "CVE-2016-4608", "CVE-2016-5096", "CVE-2016-4641", "CVE-2016-4447", "CVE-2016-4619", "CVE-2016-4631", "CVE-2016-1865", "CVE-2016-4596", "CVE-2016-4601", "CVE-2016-2106", "CVE-2016-4594", "CVE-2016-4639", "CVE-2016-4640"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/o:apple:mac_os_x"], "id": "MACOSX_10_11_6.NASL", "href": "https://www.tenable.com/plugins/nessus/92496", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(92496);\n script_version(\"1.13\");\n script_cvs_date(\"Date: 2019/11/19\");\n\n script_cve_id(\n \"CVE-2013-7456\",\n \"CVE-2014-9862\",\n \"CVE-2016-0718\",\n \"CVE-2016-1684\",\n \"CVE-2016-1836\",\n \"CVE-2016-1863\",\n \"CVE-2016-1864\",\n \"CVE-2016-1865\",\n \"CVE-2016-2105\",\n \"CVE-2016-2106\",\n \"CVE-2016-2107\",\n \"CVE-2016-2108\",\n \"CVE-2016-2109\",\n \"CVE-2016-2176\",\n \"CVE-2016-4447\",\n \"CVE-2016-4448\",\n \"CVE-2016-4449\",\n \"CVE-2016-4483\",\n \"CVE-2016-4582\",\n \"CVE-2016-4594\",\n \"CVE-2016-4595\",\n \"CVE-2016-4596\",\n \"CVE-2016-4597\",\n \"CVE-2016-4598\",\n \"CVE-2016-4599\",\n \"CVE-2016-4600\",\n \"CVE-2016-4601\",\n \"CVE-2016-4602\",\n \"CVE-2016-4607\",\n \"CVE-2016-4608\",\n \"CVE-2016-4609\",\n \"CVE-2016-4610\",\n \"CVE-2016-4612\",\n \"CVE-2016-4614\",\n \"CVE-2016-4615\",\n \"CVE-2016-4616\",\n \"CVE-2016-4619\",\n \"CVE-2016-4621\",\n \"CVE-2016-4625\",\n \"CVE-2016-4626\",\n \"CVE-2016-4629\",\n \"CVE-2016-4630\",\n \"CVE-2016-4631\",\n \"CVE-2016-4632\",\n \"CVE-2016-4633\",\n \"CVE-2016-4634\",\n \"CVE-2016-4635\",\n \"CVE-2016-4637\",\n \"CVE-2016-4638\",\n \"CVE-2016-4639\",\n \"CVE-2016-4640\",\n \"CVE-2016-4641\",\n \"CVE-2016-4645\",\n \"CVE-2016-4646\",\n \"CVE-2016-4647\",\n \"CVE-2016-4648\",\n \"CVE-2016-4649\",\n \"CVE-2016-4650\",\n \"CVE-2016-4652\",\n \"CVE-2016-5093\",\n \"CVE-2016-5094\",\n \"CVE-2016-5096\"\n );\n script_bugtraq_id(\n 90856,\n 90857,\n 90859,\n 90861,\n 90864,\n 90865,\n 90876,\n 90946,\n 91824,\n 91826,\n 91828,\n 91829,\n 91834,\n 92034\n );\n script_xref(name:\"APPLE-SA\", value:\"APPLE-SA-2016-07-18-1\");\n\n script_name(english:\"Mac OS X 10.11.x < 10.11.6 Multiple Vulnerabilities\");\n script_summary(english:\"Checks the version of Mac OS X.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing a Mac OS X security update that fixes\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote host is running a version of Mac OS X that is 10.11.x prior\nto 10.11.6. It is, therefore, affected by multiple vulnerabilities in\nthe following components :\n\n - apache_mod_php\n - Audio\n - bsdiff\n - CFNetwork\n - CoreGraphics\n - FaceTime\n - Graphics Drivers\n - ImageIO\n - Intel Graphics Driver\n - IOHIDFamily\n - IOKit\n - IOSurface\n - Kernel\n - libc++abi\n - libexpat\n - LibreSSL\n - libxml2\n - libxslt\n - Login Window\n - OpenSSL\n - QuickTime\n - Safari Login AutoFill\n - Sandbox Profiles\n\nNote that successful exploitation of the most serious issues can\nresult in arbitrary code execution.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://support.apple.com/en-us/HT206903\");\n # http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?5da74f53\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Mac OS X 10.11.6 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2016-4629\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/07/18\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/07/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/07/21\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"combined\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:apple:mac_os_x\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"os_fingerprint.nasl\");\n script_require_ports(\"Host/MacOSX/Version\", \"Host/OS\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nos = get_kb_item(\"Host/MacOSX/Version\");\nif (!os)\n{\n os = get_kb_item_or_exit(\"Host/OS\");\n if (\"Mac OS X\" >!< os) audit(AUDIT_OS_NOT, \"Mac OS X\");\n\n c = get_kb_item(\"Host/OS/Confidence\");\n if (c <= 70) exit(1, \"Can't determine the host's OS with sufficient confidence.\");\n}\nif (!os) audit(AUDIT_OS_NOT, \"Mac OS X\");\n\n\nmatch = eregmatch(pattern:\"Mac OS X ([0-9]+(\\.[0-9]{1,2})+)\", string:os);\nif (isnull(match)) exit(1, \"Failed to parse the Mac OS X version ('\" + os + \"').\");\n\nversion = match[1];\nif (!ereg(pattern:\"^10\\.11([^0-9]|$)\", string:version)) audit(AUDIT_OS_NOT, \"Mac OS X 10.11\", \"Mac OS X \"+version);\n\nfixed_version = \"10.11.6\";\nif (ver_compare(ver:version, fix:fixed_version, strict:FALSE) == -1)\n{\n report = '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fixed_version +\n '\\n';\n security_report_v4(port:0, extra:report, severity:SECURITY_HOLE);\n}\nelse exit(0, \"The host is not affected as it is running Mac OS X \"+version+\".\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}]}