Security News

Apple Releases Safari 8.0.8, Safari 7.1.8, and Safari 6.2.8

Posted on by

Image of Safari Web browser logo

Apple recently updated its Safari web browser with multiple security fixes, releasing Safari 8.0.8, Safari 7.1.8, and Safari 6.2.8 for Yosemite, Mavericks, and Mountain Lion. As Graham Cluley mentioned last week on The Mac Security Blog, alongside OS X Yosemite 10.10.5 and Security Update 2015-006, Apple issued Safari updates that include fixes for a host of security vulnerabilities.

These updates are available for: OS X Mountain Lion 10.8.5, OS X Mavericks 10.9.5, and OS X Yosemite 10.10.4.

The following Safari application and WebKit vulnerabilities have been patched:

  • CVE-2015-3729 : Visiting a malicious website may lead to user interface spoofing. A malicious website could open another site and prompt for user input without a way for the user to tell where the prompt came from. The issue was addressed by displaying the prompt origin to the user.
  • CVE-2015-3730, CVE-2015-3731, CVE-2015-3732, CVE-2015-3733, CVE-2015-3734, CVE-2015-3735, CVE-2015-3736, CVE-2015-3737, CVE-2015-3738, CVE-2015-3739, CVE-2015-3740, CVE-2015-3741, CVE-2015-3742, CVE-2015-3743, CVE-2015-3744, CVE-2015-3745, CVE-2015-3746, CVE-2015-3747, CVE-2015-3748, CVE-2015-3749 : Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling.
  • CVE-2015-3750 : A malicious website may trigger plaintext requests to an origin under HTTP Strict Transport Security. An issue existed where Content Security Policy report requests would not honor HTTP Strict Transport Security. This issue was addressed through improved HTTP Strict Transport Security enforcement.
  • CVE-2015-3751 : Image loading may violate a website’s Content Security Policy directive. An issue existed where websites with video controls would load images nested in object elements in violation of the website’s Content Security Policy directive. This issue was addressed through improved Content Security Policy enforcement.
  • CVE-2015-3752 : Content Security Policy report requests may leak cookies. Two issues existed in how cookies were added to Content Security Policy report requests. Cookies were sent in cross-origin report requests in violation of the standard. Cookies set during regular browsing were sent in private browsing. These issues were addressed through improved cookie handling.
  • CVE-2015-3753 : A malicious website may exfiltrate image data cross-origin. Images fetched through URLs that redirected to a data:image resource could have been exfiltrated cross-origin. This issue was addressed through improved canvas taint tracking.
  • CVE-2015-3754 : Cached authentication state may reveal private browsing history. An issue existed in caching of HTTP authentication. Credentials entered in private browsing mode were carried over to regular browsing which would reveal parts of the user’s private browsing history. This issue was addressed through improved caching restrictions.
  • CVE-2015-3755 : Visiting a malicious website may lead to user interface spoofing. Navigating to a malformed URL may have allowed a malicious website to display an arbitrary URL. This issue was addressed through improved URL handling.

Mac users can install the updated Safari web browser by choosing Apple menu > Software Update (if prompted, enter an admin password), or the updates may be obtained from the Mac App Store.