[webkit-gtk] WebKitGTK+ Security Advisory WSA-2017-0001
Carlos Alberto Lopez Perez
clopez at igalia.com
Tue Jan 17 11:08:30 PST 2017
------------------------------------------------------------------------
WebKitGTK+ Security Advisory WSA-2017-0001
------------------------------------------------------------------------
Date reported : January 17, 2017
Advisory ID : WSA-2017-0001
Advisory URL : https://webkitgtk.org/security/WSA-2017-0001.html
CVE identifiers : CVE-2016-4692, CVE-2016-4743, CVE-2016-7586,
CVE-2016-7587, CVE-2016-7589, CVE-2016-7592,
CVE-2016-7598, CVE-2016-7599, CVE-2016-7610,
CVE-2016-7611, CVE-2016-7623, CVE-2016-7632,
CVE-2016-7635, CVE-2016-7639, CVE-2016-7640,
CVE-2016-7641, CVE-2016-7642, CVE-2016-7645,
CVE-2016-7646, CVE-2016-7648, CVE-2016-7649,
CVE-2016-7652, CVE-2016-7654, CVE-2016-7656.
Several vulnerabilities were discovered in WebKitGTK+.
CVE-2016-4692
Versions affected: WebKitGTK+ before 2.14.1.
Credit to Apple.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved memory handling.
CVE-2016-4743
Versions affected: WebKitGTK+ before 2.14.0.
Credit to Alan Cutter.
Impact: Processing maliciously crafted web content may result in the
disclosure of process memory. Description: A memory corruption issue
was addressed through improved input validation.
CVE-2016-7586
Versions affected: WebKitGTK+ before 2.14.3.
Credit to Boris Zbarsky.
Impact: Processing maliciously crafted web content may result in the
disclosure of user information. Description: A validation issue was
addressed through improved state management.
CVE-2016-7587
Versions affected: WebKitGTK+ before 2.14.0.
Credit to Adam Klein.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved state management.
CVE-2016-7589
Versions affected: WebKitGTK+ before 2.14.3.
Credit to Apple.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: A memory corruption issue was
addressed through improved state management.
CVE-2016-7592
Versions affected: WebKitGTK+ before 2.14.3.
Credit to xisigr of Tencent's Xuanwu Lab (tencent.com).
Impact: Processing maliciously crafted web content may compromise
user information. Description: An issue existed in handling of
JavaScript prompts. This was addressed through improved state
management.
CVE-2016-7598
Versions affected: WebKitGTK+ before 2.14.0.
Credit to Samuel Groß.
Impact: Processing maliciously crafted web content may result in the
disclosure of process memory. Description: An uninitialized memory
access issue was addressed through improved memory initialization.
CVE-2016-7599
Versions affected: WebKitGTK+ before 2.14.3.
Credit to Muneaki Nishimura (nishimunea) of Recruit Technologies
Co., Ltd.
Impact: Processing maliciously crafted web content may result in the
disclosure of user information. Description: An issue existed in the
handling of HTTP redirects. This issue was addressed through
improved cross origin validation.
CVE-2016-7610
Versions affected: WebKitGTK+ before 2.14.1.
Credit to Zheng Huang of the Baidu Security Lab working with Trend
Micro's Zero Day Initiative.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved state management.
CVE-2016-7611
Versions affected: WebKitGTK+ before 2.14.2.
Credit to an anonymous researcher working with Trend Micro's Zero
Day Initiative.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved state management.
CVE-2016-7623
Versions affected: WebKitGTK+ before 2.14.3.
Credit to xisigr of Tencent's Xuanwu Lab (tencent.com).
Impact: Visiting a maliciously crafted website may compromise user
information. Description: An issue existed in the handling of blob
URLs. This issue was addressed through improved URL handling.
CVE-2016-7632
Versions affected: WebKitGTK+ before 2.14.3.
Credit to Jeonghoon Shin.
Impact: Visiting a maliciously crafted webpage may lead to an
unexpected application termination or arbitrary code execution.
Description: A memory corruption issue was addressed through
improved state management.
CVE-2016-7635
Versions affected: WebKitGTK+ before 2.14.3.
Credit to Apple.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved memory handling.
CVE-2016-7639
Versions affected: WebKitGTK+ before 2.14.3.
Credit to Tongbo Luo of Palo Alto Networks.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved state management.
CVE-2016-7640
Versions affected: WebKitGTK+ before 2.14.2.
Credit to Kai Kang of Tencent's Xuanwu Lab (tencent.com).
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved state management.
CVE-2016-7641
Versions affected: WebKitGTK+ before 2.14.3.
Credit to Kai Kang of Tencent's Xuanwu Lab (tencent.com).
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved state management.
CVE-2016-7642
Versions affected: WebKitGTK+ before 2.14.2.
Credit to Tongbo Luo of Palo Alto Networks.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved state management.
CVE-2016-7645
Versions affected: WebKitGTK+ before 2.14.3.
Credit to Kai Kang of Tencent's Xuanwu Lab (tencent.com).
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved state management.
CVE-2016-7646
Versions affected: WebKitGTK+ before 2.14.2.
Credit to Kai Kang of Tencent's Xuanwu Lab (tencent.com).
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved state management.
CVE-2016-7648
Versions affected: WebKitGTK+ before 2.14.2.
Credit to Kai Kang of Tencent's Xuanwu Lab (tencent.com).
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved state management.
CVE-2016-7649
Versions affected: WebKitGTK+ before 2.14.2.
Credit to Kai Kang of Tencent's Xuanwu Lab (tencent.com).
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved state management.
CVE-2016-7652
Versions affected: WebKitGTK+ before 2.14.3.
Credit to Apple.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved memory handling.
CVE-2016-7654
Versions affected: WebKitGTK+ before 2.14.3.
Credit to Keen Lab working with Trend Micro's Zero Day Initiative.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved state management.
CVE-2016-7656
Versions affected: WebKitGTK+ before 2.14.3.
Credit to Keen Lab working with Trend Micro's Zero Day Initiative.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: A memory corruption issue was
addressed through improved state management.
We recommend updating to the last stable version of WebKitGTK+. It is
the best way of ensuring that you are running a safe version of
WebKitGTK+. Please check our website for information about the last
stable releases.
Further information about WebKitGTK+ Security Advisories can be found
at: https://webkitgtk.org/security.html
The WebKitGTK+ team,
January 17, 2017
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 883 bytes
Desc: OpenPGP digital signature
URL: <https://lists.webkit.org/pipermail/webkit-gtk/attachments/20170117/899a523a/attachment.sig>
More information about the webkit-gtk
mailing list