ID

VAR-201404-0217


CVE

CVE-2014-1297


TITLE

Apple Safari Used in etc. WebKit Vulnerabilities that bypass the sandbox protection mechanism

Trust: 0.8

sources: JVNDB: JVNDB-2014-001870

DESCRIPTION

WebKit, as used in Apple Safari before 6.1.3 and 7.x before 7.0.3, does not properly validate WebProcess IPC messages, which allows remote attackers to bypass a sandbox protection mechanism and read arbitrary files by leveraging WebProcess access. Apple Safari Used in etc. WebKit is prone to an unspecified security-bypass vulnerability. WebKit is a set of open source web browser engines jointly developed by companies such as KDE, Apple (Apple), and Google (Google), and is currently used by browsers such as Apple Safari and Google Chrome. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2014-04-01-1 Safari 6.1.3 and Safari 7.0.3 Safari 6.1.3 and Safari 7.0.3 are now available and address the following: WebKit Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.2 Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling. This issue was addressed through additional validation of IPC messages. CVE-ID CVE-2014-1297 : Ian Beer of Google Project Zero For OS X Mavericks and OS X Mountain Lion systems, Safari 7.0.3 and Safari 6.1.3 may be obtained from Mac App Store. For OS X Lion systems Safari 6.1.3 is available via the Apple Software Update application. Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.22 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJTOwlLAAoJEPefwLHPlZEwmPYP/AoGVbrVVEQfbWZ/OMER6jCR bDN4ykWdExJFRKr972tsirke9mLrDX1Flqg3jYpqrna6lWsZxk1wA/IXy4TRG97O mpA75r7853lCJ482h5XImTdv6wWqMfTTNR1YzsK+TCLZA3sDlByQ4yshwGWhOf1Q nY+hPpaC05PEmPeNKMWw6PA9IgA9e84uy0b/3+c2acOUZ9aAYEXmydPySY+5uYLa ecXjvee83LVTu8Pq2/C9yCJ1kI1EMix6Q3CTb2Cv/Dtgu1q7rZMG7qKieFpMKO2J xM7RYm1qPNlZ4hf+ZPX+D4+k6g2sZMqYdocdG1qXubk8m314CinHajdsZH9jXDHO 01gnYeMRp2IUBJlClQ7mPyIveJqJV9XpzvMTciuTVEuhzWhMaazzly8dp+8NCu4Q QShPJKqAq16ACJqqOarwo8xaSumZ3UcKhVrD0Gxo1/dhzO1Hy52yo7WrWLaOVH89 bXPeVMfYIF0V9xysbixNmBIEro0mYDuor/XlXBFicZAjmyGEVE04K4UjenMeDoYO /1A2zaVyM9MD50y+X/rFErtz2cj7uNcZ1XSNqPdGameoti5WvvoRbKs/D/H7E8bX p8JDoVJoy46fOBfwNv6eaQYTGYzgtdoEtmTKL3zDauQC1bxI1Jwtma07S97D2SyJ urMcI/V2h8JnGD4sS/7L =kHuK -----END PGP SIGNATURE----- . ------------------------------------------------------------------------ WebKitGTK+ Security Advisory WSA-2015-0001 ------------------------------------------------------------------------ Date reported : January 26, 2015 Advisory ID : WSA-2015-0001 Advisory URL : http://webkitgtk.org/security/WSA-2015-0001.html Affected versions : 2.4 series before 2.4.1, 2.4.2 and 2.4.8. CVE identifiers : CVE-2013-2871, CVE-2014-1292, CVE-2014-1298, CVE-2014-1299, CVE-2014-1300, CVE-2014-1303, CVE-2014-1304, CVE-2014-1305, CVE-2014-1307, CVE-2014-1308, CVE-2014-1309, CVE-2014-1311, CVE-2014-1313, CVE-2014-1713, CVE-2014-1297, CVE-2013-2875, CVE-2013-2927, CVE-2014-1323, CVE-2014-1326, CVE-2014-1329, CVE-2014-1330, CVE-2014-1331, CVE-2014-1333, CVE-2014-1334, CVE-2014-1335, CVE-2014-1336, CVE-2014-1337, CVE-2014-1338, CVE-2014-1339, CVE-2014-1341, CVE-2014-1342, CVE-2014-1343, CVE-2014-1731, CVE-2014-1346, CVE-2014-1344, CVE-2014-1384, CVE-2014-1385, CVE-2014-1387, CVE-2014-1388, CVE-2014-1389, CVE-2014-1390. Several vulnerabilities were discovered on the 2.4 stable series of WebKitGTK+. CVE-2013-2871 Versions affected: WebKitGTK+ 2.4.X before 2.4.1. Credit to miaubiz. Use-after-free vulnerability in Google Chrome before 28.0.1500.71 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of input. CVE-2014-1292 Versions affected: WebKitGTK+ 2.4.X before 2.4.1. Credit to Google Chrome Security Team. WebKit, as used in Apple iOS before 7.1 and Apple TV before 6.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-1289, CVE-2014-1290, CVE-2014-1291, CVE-2014-1293, and CVE-2014-1294. CVE-2014-1298 Versions affected: WebKitGTK+ 2.4.X before 2.4.1. Credit to Google Chrome Security Team. CVE-2014-1299 Versions affected: WebKitGTK+ 2.4.X before 2.4.1. Credit to Google Chrome Security Team, Apple, Renata Hodovan of University of Szeged / Samsung Electronics. CVE-2014-1300 Versions affected: WebKitGTK+ 2.4.X before 2.4.1. Credit to Ian Beer of Google Project Zero working with HP's Zero Day Initiative. CVE-2014-1303 Versions affected: WebKitGTK+ 2.4.X before 2.4.1. Credit to KeenTeam working with HP's Zero Day Initiative. CVE-2014-1304 Versions affected: WebKitGTK+ 2.4.X before 2.4.1. CVE-2014-1305 Versions affected: WebKitGTK+ 2.4.X before 2.4.1. CVE-2014-1307 Versions affected: WebKitGTK+ 2.4.X before 2.4.1. Credit to Google Chrome Security Team. CVE-2014-1308 Versions affected: WebKitGTK+ 2.4.X before 2.4.1. Credit to Google Chrome Security Team. CVE-2014-1309 Versions affected: WebKitGTK+ 2.4.X before 2.4.1. Credit to cloudfuzzer. CVE-2014-1311 Versions affected: WebKitGTK+ 2.4.X before 2.4.1. Credit to Google Chrome Security Team. CVE-2014-1313 Versions affected: WebKitGTK+ 2.4.X before 2.4.1. Credit to Google Chrome Security Team. CVE-2014-1713 Versions affected: WebKitGTK+ 2.4.X before 2.4.1. Credit to VUPEN working with HP's Zero Day Initiative. Use-after-free vulnerability in the AttributeSetter function in bindings/templates/attributes.cpp in the bindings in Blink, as used in Google Chrome before 33.0.1750.152 on OS X and Linux and before 33.0.1750.154 on Windows, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving the document.location value. CVE-2014-1297 Versions affected: WebKitGTK+ 2.4.X before 2.4.1. Credit to Ian Beer of Google Project Zero. CVE-2013-2875 Versions affected: WebKitGTK+ 2.4.X before 2.4.2. Credit to miaubiz. core/rendering/svg/SVGInlineTextBox.cpp in the SVG implementation in Blink, as used in Google Chrome before 28.0.1500.71, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. CVE-2013-2927 Versions affected: WebKitGTK+ 2.4.X before 2.4.2. Credit to cloudfuzzer. Use-after-free vulnerability in the HTMLFormElement::prepareForSubmission function in core/html/HTMLFormElement.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to submission for FORM elements. CVE-2014-1323 Versions affected: WebKitGTK+ 2.4.X before 2.4.2. Credit to banty. CVE-2014-1326 Versions affected: WebKitGTK+ 2.4.X before 2.4.2. CVE-2014-1329 Versions affected: WebKitGTK+ 2.4.X before 2.4.2. Credit to Google Chrome Security Team. CVE-2014-1330 Versions affected: WebKitGTK+ 2.4.X before 2.4.2. Credit to Google Chrome Security Team. CVE-2014-1331 Versions affected: WebKitGTK+ 2.4.X before 2.4.2. Credit to cloudfuzzer. CVE-2014-1333 Versions affected: WebKitGTK+ 2.4.X before 2.4.2. Credit to Google Chrome Security Team. CVE-2014-1334 Versions affected: WebKitGTK+ 2.4.X before 2.4.2. CVE-2014-1335 Versions affected: WebKitGTK+ 2.4.X before 2.4.2. Credit to Google Chrome Security Team. CVE-2014-1336 Versions affected: WebKitGTK+ 2.4.X before 2.4.2. CVE-2014-1337 Versions affected: WebKitGTK+ 2.4.X before 2.4.2. CVE-2014-1338 Versions affected: WebKitGTK+ 2.4.X before 2.4.2. Credit to Google Chrome Security Team. CVE-2014-1339 Versions affected: WebKitGTK+ 2.4.X before 2.4.2. Credit to Atte Kettunen of OUSPG. CVE-2014-1341 Versions affected: WebKitGTK+ 2.4.X before 2.4.2. Credit to Google Chrome Security Team. CVE-2014-1342 Versions affected: WebKitGTK+ 2.4.X before 2.4.2. CVE-2014-1343 Versions affected: WebKitGTK+ 2.4.X before 2.4.2. Credit to Google Chrome Security Team. CVE-2014-1731 Versions affected: WebKitGTK+ 2.4.X before 2.4.2. Credit to an anonymous member of the Blink development community. core/html/HTMLSelectElement.cpp in the DOM implementation in Blink, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, does not properly check renderer state upon a focus event, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion" for SELECT elements. CVE-2014-1346 Versions affected: WebKitGTK+ 2.4.X before 2.4.2. Credit to Erling Ellingsen of Facebook. CVE-2014-1344 Versions affected: WebKitGTK+ 2.4.X before 2.4.8. Credit to Ian Beer of Google Project Zero. CVE-2014-1384 Versions affected: WebKitGTK+ 2.4.X before 2.4.8. CVE-2014-1385 Versions affected: WebKitGTK+ 2.4.X before 2.4.8. CVE-2014-1387 Versions affected: WebKitGTK+ 2.4.X before 2.4.8. Credit to Google Chrome Security Team. CVE-2014-1388 Versions affected: WebKitGTK+ 2.4.X before 2.4.8. CVE-2014-1389 Versions affected: WebKitGTK+ 2.4.X before 2.4.8. CVE-2014-1390 Versions affected: WebKitGTK+ 2.4.X before 2.4.8. For the 2.4 series, these problems have been fixed in release 2.4.8. Further information about WebKitGTK+ Security Advisories can be found at: http://webkitgtk.org/security.html The WebKitGTK+ team, January 26, 2015

Trust: 2.16

sources: NVD: CVE-2014-1297 // JVNDB: JVNDB-2014-001870 // BID: 66580 // VULHUB: VHN-69236 // PACKETSTORM: 125981 // PACKETSTORM: 130110

AFFECTED PRODUCTS

vendor:applemodel:safariscope:eqversion:7.0.2

Trust: 1.6

vendor:applemodel:safariscope:eqversion:6.1

Trust: 1.6

vendor:applemodel:safariscope:eqversion:6.0.1

Trust: 1.6

vendor:applemodel:safariscope:eqversion:6.0.2

Trust: 1.6

vendor:applemodel:safariscope:eqversion:6.0.5

Trust: 1.6

vendor:applemodel:safariscope:eqversion:6.0

Trust: 1.6

vendor:applemodel:safariscope:eqversion:6.1.1

Trust: 1.6

vendor:applemodel:safariscope:eqversion:6.0.4

Trust: 1.6

vendor:applemodel:safariscope:eqversion:6.0.3

Trust: 1.6

vendor:applemodel:safariscope:lteversion:6.1.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:7.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:7.0.1

Trust: 1.0

vendor:applemodel:safariscope:ltversion:(os x mavericks v10.9.2)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:7.x (os x lion v10.7.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:7.x (os x mountain lion v10.8.5)

Trust: 0.8

vendor:applemodel:safariscope:eqversion:7.0.3

Trust: 0.8

vendor:applemodel:safariscope:ltversion:7.x (os x lion server v10.7.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:(os x lion server v10.7.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:(os x lion v10.7.5)

Trust: 0.8

vendor:applemodel:safariscope:eqversion:6.1.3

Trust: 0.8

vendor:applemodel:safariscope:ltversion:7.x (os x mavericks v10.9.2)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:(os x mountain lion v10.8.5)

Trust: 0.8

vendor:applemodel:safariscope:eqversion:6.1.2

Trust: 0.6

sources: JVNDB: JVNDB-2014-001870 // CNNVD: CNNVD-201404-038 // NVD: CVE-2014-1297

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-1297
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-1297
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201404-038
value: MEDIUM

Trust: 0.6

VULHUB: VHN-69236
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-1297
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-69236
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-69236 // JVNDB: JVNDB-2014-001870 // CNNVD: CNNVD-201404-038 // NVD: CVE-2014-1297

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-69236 // JVNDB: JVNDB-2014-001870 // NVD: CVE-2014-1297

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201404-038

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201404-038

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-001870

PATCH

title:HT6181url:http://support.apple.com/kb/HT6181

Trust: 0.8

title:HT6181url:http://support.apple.com/kb/HT6181?viewlocale=ja_JP

Trust: 0.8

title:iPhone6,2_7.0.3_11B511_Restoreurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=49087

Trust: 0.6

title:Safari6.1.3MountainLionurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=49086

Trust: 0.6

sources: JVNDB: JVNDB-2014-001870 // CNNVD: CNNVD-201404-038

EXTERNAL IDS

db:NVDid:CVE-2014-1297

Trust: 3.0

db:JVNid:JVNVU94409290

Trust: 0.8

db:JVNDBid:JVNDB-2014-001870

Trust: 0.8

db:CNNVDid:CNNVD-201404-038

Trust: 0.7

db:APPLEid:APPLE-SA-2014-04-01-1

Trust: 0.6

db:BIDid:66580

Trust: 0.4

db:VULHUBid:VHN-69236

Trust: 0.1

db:PACKETSTORMid:125981

Trust: 0.1

db:PACKETSTORMid:130110

Trust: 0.1

sources: VULHUB: VHN-69236 // BID: 66580 // JVNDB: JVNDB-2014-001870 // PACKETSTORM: 125981 // PACKETSTORM: 130110 // CNNVD: CNNVD-201404-038 // NVD: CVE-2014-1297

REFERENCES

url:http://archives.neohapsis.com/archives/bugtraq/2014-04/0009.html

Trust: 2.5

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-1297

Trust: 0.8

url:https://jvn.jp/vu/jvnvu94409290/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-1297

Trust: 0.8

url:http://www.webkit.org/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-1304

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1292

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1297

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1309

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1308

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1300

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1311

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1313

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1298

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1305

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1303

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1299

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-2871

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1307

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1291

Trust: 0.1

url:http://support.apple.com/kb/ht1222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2928

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1312

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2926

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1713

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1293

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1290

Trust: 0.1

url:http://gpgtools.org

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1294

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1289

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1301

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1310

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6625

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1302

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1334

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1337

Trust: 0.1

url:http://webkitgtk.org/security/wsa-2015-0001.html

Trust: 0.1

url:http://webkitgtk.org/security.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1336

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1326

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1331

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1338

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1323

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1335

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2927

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1333

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1339

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2875

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1329

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1330

Trust: 0.1

sources: VULHUB: VHN-69236 // BID: 66580 // JVNDB: JVNDB-2014-001870 // PACKETSTORM: 125981 // PACKETSTORM: 130110 // CNNVD: CNNVD-201404-038 // NVD: CVE-2014-1297

CREDITS

Ian Beer of Google Project Zero

Trust: 0.3

sources: BID: 66580

SOURCES

db:VULHUBid:VHN-69236
db:BIDid:66580
db:JVNDBid:JVNDB-2014-001870
db:PACKETSTORMid:125981
db:PACKETSTORMid:130110
db:CNNVDid:CNNVD-201404-038
db:NVDid:CVE-2014-1297

LAST UPDATE DATE

2025-04-13T20:39:04.406000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-69236date:2014-04-02T00:00:00
db:BIDid:66580date:2015-02-04T00:05:00
db:JVNDBid:JVNDB-2014-001870date:2014-04-08T00:00:00
db:CNNVDid:CNNVD-201404-038date:2014-04-04T00:00:00
db:NVDid:CVE-2014-1297date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-69236date:2014-04-02T00:00:00
db:BIDid:66580date:2014-04-02T00:00:00
db:JVNDBid:JVNDB-2014-001870date:2014-04-03T00:00:00
db:PACKETSTORMid:125981date:2014-04-02T11:02:22
db:PACKETSTORMid:130110date:2015-01-27T19:15:58
db:CNNVDid:CNNVD-201404-038date:2014-04-04T00:00:00
db:NVDid:CVE-2014-1297date:2014-04-02T16:17:06.870