Summary
The host is installed with Apple Safari web browser and is prone to security bypass vulnerability.
Impact
Successful exploitation will allow attackers to overwrite or delete arbitrary cookies by sending a specially crafted HTTP response through a man-in-the-middle attack.
Impact Level: Application
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
The flaw is due to lack of the HTTP Strict Transport Security (HSTS) includeSubDomains feature, which allows man-in-the-middle attackers to overwrite or delete arbitrary cookies via a Set-Cookie header in an HTTP response.
Affected
Apple Safari versions 5.1 and prior.
References
Severity
Classification
-
CVE CVE-2008-7296 -
CVSS Base Score: 5.8
AV:N/AC:M/Au:N/C:N/I:P/A:P
Related Vulnerabilities
- Apple Safari 'setInterval()' Address Bar Spoofing Vulnerability (Win)
- Adobe Reader Information Disclosure Vulnerability Jun05 (Mac OS X)
- Apache Tomcat Multiple Vulnerabilities - 03 Mar14
- Adobe Reader 'file://' URL Information Disclosure Vulnerability Feb07 (Windows)
- Apple Safari Webcore Webkit 'XSSAuditor.cpp' XSS Vulnerability (Mac OS X)