|
Message-ID: <31b16718-a4f7-8b38-20fe-d7636b36d049@igalia.com>
Date: Tue, 25 Jul 2017 14:42:55 +0200
From: Carlos Alberto Lopez Perez <clopez@...lia.com>
To: "webkit-gtk@...ts.webkit.org" <webkit-gtk@...ts.webkit.org>
Cc: security@...kit.org, distributor-list@...me.org,
oss-security@...ts.openwall.com, bugtraq@...urityfocus.com
Subject: WebKitGTK+ Security Advisory WSA-2017-0006
------------------------------------------------------------------------
WebKitGTK+ Security Advisory WSA-2017-0006
------------------------------------------------------------------------
Date reported : July 25, 2017
Advisory ID : WSA-2017-0006
Advisory URL : https://webkitgtk.org/security/WSA-2017-0006.html
CVE identifiers : CVE-2017-7006, CVE-2017-7011, CVE-2017-7012,
CVE-2017-7018, CVE-2017-7019, CVE-2017-7020,
CVE-2017-7030, CVE-2017-7034, CVE-2017-7037,
CVE-2017-7038, CVE-2017-7039, CVE-2017-7040,
CVE-2017-7041, CVE-2017-7042, CVE-2017-7043,
CVE-2017-7046, CVE-2017-7048, CVE-2017-7049,
CVE-2017-7052, CVE-2017-7055, CVE-2017-7056,
CVE-2017-7059, CVE-2017-7061, CVE-2017-7064.
Several vulnerabilities were discovered in WebKitGTK+.
CVE-2017-7006
Versions affected: WebKitGTK+ before 2.16.2.
Credit to David Kohlbrenner of UC San Diego, an anonymous
researcher.
Impact: A malicious website may exfiltrate data cross-origin.
Description: Processing maliciously crafted web content may allow
cross-origin data to be exfiltrated by using SVG filters to conduct
a timing side-channel attack. This issue was addressed by not
painting the cross-origin buffer into the frame that gets filtered.
CVE-2017-7011
Versions affected: WebKitGTK+ before 2.16.3.
Credit to xisigr of Tencent's Xuanwu Lab (tencent.com).
Impact: Visiting a malicious website may lead to address bar
spoofing. Description: A state management issue was addressed with
improved frame handling.
CVE-2017-7012
Versions affected: WebKitGTK+ before 2.16.2.
Credit to Apple.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed with improved memory handling.
CVE-2017-7018
Versions affected: WebKitGTK+ before 2.16.6.
Credit to lokihardt of Google Project Zero.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed with improved memory handling.
CVE-2017-7019
Versions affected: WebKitGTK+ before 2.16.2.
Credit to Zhiyang Zeng of Tencent Security Platform Department.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed with improved memory handling.
CVE-2017-7020
Versions affected: WebKitGTK+ before 2.16.1.
Credit to likemeng of Baidu Security Lab.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed with improved memory handling.
CVE-2017-7030
Versions affected: WebKitGTK+ before 2.16.6.
Credit to chenqin of Ant-financial Light-Year Security Lab
(蚂蚁金服巴斯光年安全实验室).
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed with improved memory handling.
CVE-2017-7034
Versions affected: WebKitGTK+ before 2.16.6.
Credit to chenqin of Ant-financial Light-Year Security Lab
(蚂蚁金服巴斯光年安全实验室).
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed with improved memory handling.
CVE-2017-7037
Versions affected: WebKitGTK+ before 2.16.6.
Credit to lokihardt of Google Project Zero.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed with improved memory handling.
CVE-2017-7038
Versions affected: WebKitGTK+ before 2.16.2.
Credit to Neil Jenkins of FastMail Pty Ltd, Egor Karbutov
(@ShikariSenpai) of Digital Security and Egor Saltykov
(@ansjdnakjdnajkd) of Digital Security.
Impact: Processing maliciously crafted web content with DOMParser
may lead to cross site scripting. Description: A logic issue existed
in the handling of DOMParser. This issue was addressed with improved
state management.
CVE-2017-7039
Versions affected: WebKitGTK+ before 2.16.6.
Credit to Ivan Fratric of Google Project Zero.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed with improved memory handling.
CVE-2017-7040
Versions affected: WebKitGTK+ before 2.16.3.
Credit to Ivan Fratric of Google Project Zero.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed with improved memory handling.
CVE-2017-7041
Versions affected: WebKitGTK+ before 2.16.2.
Credit to Ivan Fratric of Google Project Zero.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed with improved memory handling.
CVE-2017-7042
Versions affected: WebKitGTK+ before 2.16.2.
Credit to Ivan Fratric of Google Project Zero.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed with improved memory handling.
CVE-2017-7043
Versions affected: WebKitGTK+ before 2.16.2.
Credit to Ivan Fratric of Google Project Zero.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed with improved memory handling.
CVE-2017-7046
Versions affected: WebKitGTK+ before 2.16.6.
Credit to Ivan Fratric of Google Project Zero.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed with improved memory handling.
CVE-2017-7048
Versions affected: WebKitGTK+ before 2.16.6.
Credit to Ivan Fratric of Google Project Zero.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed with improved memory handling.
CVE-2017-7049
Versions affected: WebKitGTK+ before 2.16.2.
Credit to Ivan Fratric of Google Project Zero.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved memory handling.
CVE-2017-7052
Versions affected: WebKitGTK+ before 2.16.4.
Credit to cc working with Trend Micro's Zero Day Initiative.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed with improved memory handling.
CVE-2017-7055
Versions affected: WebKitGTK+ before 2.16.6.
Credit to The UK's National Cyber Security Centre (NCSC).
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed with improved memory handling.
CVE-2017-7056
Versions affected: WebKitGTK+ before 2.16.6.
Credit to lokihardt of Google Project Zero.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed with improved memory handling.
CVE-2017-7059
Versions affected: WebKitGTK+ before 2.16.3.
Credit to an anonymous researcher.
Impact: Processing maliciously crafted web content with DOMParser
may lead to cross site scripting. Description: A logic issue existed
in the handling of DOMParser. This issue was addressed with improved
state management.
CVE-2017-7061
Versions affected: WebKitGTK+ before 2.16.6.
Credit to lokihardt of Google Project Zero.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed with improved memory handling.
CVE-2017-7064
Versions affected: WebKitGTK+ before 2.16.6.
Credit to lokihardt of Google Project Zero.
Impact: An application may be able to read restricted memory.
Description: A memory initialization issue was addressed through
improved memory handling.
We recommend updating to the last stable version of WebKitGTK+. It is
the best way of ensuring that you are running a safe version of
WebKitGTK+. Please check our website for information about the last
stable releases.
Further information about WebKitGTK+ Security Advisories can be found
at: https://webkitgtk.org/security.html
The WebKitGTK+ team,
July 25, 2017
Download attachment "signature.asc" of type "application/pgp-signature" (898 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.