VARIoT IoT vulnerabilities database
| VAR-201810-0439 | CVE-2018-17786 | D-Link DIR-823G Access control vulnerabilities in devices |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
On D-Link DIR-823G devices, ExportSettings.sh, upload_settings.cgi, GetDownLoadSyslog.sh, and upload_firmware.cgi do not require authentication, which allows remote attackers to execute arbitrary code. D-Link DIR-823G The device contains an access control vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. D-Link DIR-823G is a wireless router of D-Link company. A security vulnerability exists in D-Link DIR-823G due to the fact that the ExportSettings.sh, upload_settings.cgi, GetDownLoadSyslog.sh and upload_firmware.cgi files do not require authentication
| VAR-201810-1615 | No CVE | Hollysys AutoThink Denial of Service Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Hollysys Group is a professional automation company integrating R & D, production, sales and technical services.
Hollysys AutoThink has a denial of service vulnerability. An attacker can use the vulnerability to construct a Hollysys AutoThink software denial of service vulnerability by constructing a specific packet.
| VAR-201810-0872 | CVE-2018-11072 | Dell Digital Delivery Injection vulnerability |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
Dell Digital Delivery versions prior to 3.5.1 contain a DLL Injection Vulnerability. A local authenticated malicious user with advance knowledge of the application workflow could potentially load and execute a malicious DLL with administrator privileges. Dell Digital Delivery Contains an injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Dell Digital Delivery is an application dedicated to Dell computer equipment and used to purchase computer pre-installed software online
| VAR-201901-1011 | CVE-2018-4212 | plural Apple In product ASSERT Vulnerability that causes an error |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks. plural Apple The product includes ASSERT A vulnerability that causes an error exists.Through unexpected operations, ASSERT An error may be caused. Apple iOS, etc. are all products of Apple (Apple). Apple iOS is an operating system developed for mobile devices; Safari is a web browser that is the default browser included with Mac OS X and iOS operating systems. iTunes for Windows is a media player application based on the Windows platform. WebKit is one of the web browser engine components. A security vulnerability exists in the WebKit component of several Apple products. Attackers can exploit this vulnerability to cause ASSERT to fail. The following products and versions are affected: Apple iOS prior to 11.3; Safari prior to 11.1; Windows-based iCloud prior to 7.4; tvOS prior to 11.3; watchOS prior to 4.3; Windows-based iTunes prior to 12.7.4. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201812-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: WebkitGTK+: Multiple vulnerabilities
Date: December 02, 2018
Bugs: #667892
ID: 201812-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in WebKitGTK+, the worst of
which may lead to arbitrary code execution.
Background
==========
WebKitGTK+ is a full-featured port of the WebKit rendering engine,
suitable for projects requiring any kind of web integration, from
hybrid HTML/CSS applications to full-fledged web browsers.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-libs/webkit-gtk < 2.22.0 >= 2.22.0
Description
===========
Multiple vulnerabilities have been discovered in WebKitGTK+. Please
review the referenced CVE identifiers for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All WebkitGTK+ users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.22.0"
References
==========
[ 1 ] CVE-2018-4191
https://nvd.nist.gov/vuln/detail/CVE-2018-4191
[ 2 ] CVE-2018-4197
https://nvd.nist.gov/vuln/detail/CVE-2018-4197
[ 3 ] CVE-2018-4207
https://nvd.nist.gov/vuln/detail/CVE-2018-4207
[ 4 ] CVE-2018-4208
https://nvd.nist.gov/vuln/detail/CVE-2018-4208
[ 5 ] CVE-2018-4209
https://nvd.nist.gov/vuln/detail/CVE-2018-4209
[ 6 ] CVE-2018-4210
https://nvd.nist.gov/vuln/detail/CVE-2018-4210
[ 7 ] CVE-2018-4212
https://nvd.nist.gov/vuln/detail/CVE-2018-4212
[ 8 ] CVE-2018-4213
https://nvd.nist.gov/vuln/detail/CVE-2018-4213
[ 9 ] CVE-2018-4299
https://nvd.nist.gov/vuln/detail/CVE-2018-4299
[ 10 ] CVE-2018-4306
https://nvd.nist.gov/vuln/detail/CVE-2018-4306
[ 11 ] CVE-2018-4309
https://nvd.nist.gov/vuln/detail/CVE-2018-4309
[ 12 ] CVE-2018-4311
https://nvd.nist.gov/vuln/detail/CVE-2018-4311
[ 13 ] CVE-2018-4312
https://nvd.nist.gov/vuln/detail/CVE-2018-4312
[ 14 ] CVE-2018-4314
https://nvd.nist.gov/vuln/detail/CVE-2018-4314
[ 15 ] CVE-2018-4315
https://nvd.nist.gov/vuln/detail/CVE-2018-4315
[ 16 ] CVE-2018-4316
https://nvd.nist.gov/vuln/detail/CVE-2018-4316
[ 17 ] CVE-2018-4317
https://nvd.nist.gov/vuln/detail/CVE-2018-4317
[ 18 ] CVE-2018-4318
https://nvd.nist.gov/vuln/detail/CVE-2018-4318
[ 19 ] CVE-2018-4319
https://nvd.nist.gov/vuln/detail/CVE-2018-4319
[ 20 ] CVE-2018-4323
https://nvd.nist.gov/vuln/detail/CVE-2018-4323
[ 21 ] CVE-2018-4328
https://nvd.nist.gov/vuln/detail/CVE-2018-4328
[ 22 ] CVE-2018-4358
https://nvd.nist.gov/vuln/detail/CVE-2018-4358
[ 23 ] CVE-2018-4359
https://nvd.nist.gov/vuln/detail/CVE-2018-4359
[ 24 ] CVE-2018-4361
https://nvd.nist.gov/vuln/detail/CVE-2018-4361
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201812-04
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us.
License
=======
Copyright 2018 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
. -----------------------------------------------------------------------
WebKitGTK+ and WPE WebKit Security Advisory WSA-2018-0007
------------------------------------------------------------------------
Date reported : September 26, 2018
Advisory ID : WSA-2018-0007
WebKitGTK+ Advisory URL :
https://webkitgtk.org/security/WSA-2018-0007.html
WPE WebKit Advisory URL :
https://wpewebkit.org/security/WSA-2018-0007.html
CVE identifiers : CVE-2018-4207, CVE-2018-4208, CVE-2018-4209,
CVE-2018-4210, CVE-2018-4212, CVE-2018-4213,
CVE-2018-4191, CVE-2018-4197, CVE-2018-4299,
CVE-2018-4306, CVE-2018-4309, CVE-2018-4311,
CVE-2018-4312, CVE-2018-4314, CVE-2018-4315,
CVE-2018-4316, CVE-2018-4317, CVE-2018-4318,
CVE-2018-4319, CVE-2018-4323, CVE-2018-4328,
CVE-2018-4358, CVE-2018-4359, CVE-2018-4361.
Several vulnerabilities were discovered in WebKitGTK+ and WPE WebKit.
CVE-2018-4207
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
CVE-2018-4208
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
CVE-2018-4209
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
CVE-2018-4210
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
Unexpected interaction with indexing types caused a failure. An
array indexing issue existed in the handling of a function in
JavaScriptCore.
CVE-2018-4212
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
CVE-2018-4213
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
CVE-2018-4191
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Google OSS-Fuzz.
CVE-2018-4197
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4299
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Samuel GroI2 (saelo) working with Trend Micro's Zero Day
Initiative.
Processing maliciously crafted web content may lead to arbitrary
code execution. Multiple memory corruption issues were addressed
with improved memory handling.
CVE-2018-4306
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4309
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to an anonymous researcher working with Trend Micro's Zero
Day Initiative.
A malicious website may be able to execute scripts in the context of
another website. A cross-site scripting issue existed in WebKit.
CVE-2018-4311
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Erling Alf Ellingsen (@steike).
Cross-origin SecurityErrors includes the accessed frameas origin.
CVE-2018-4312
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4314
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4315
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4316
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to crixer, Hanming Zhang (@4shitak4) of Qihoo 360 Vulcan
Team.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4317
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4318
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4319
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to John Pettitt of Google.
A malicious website may cause unexepected cross-origin behavior. A
cross-origin issue existed with iframe elements.
CVE-2018-4323
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution. Multiple memory corruption issues were addressed
with improved memory handling.
CVE-2018-4328
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution. Multiple memory corruption issues were addressed
with improved memory handling.
CVE-2018-4358
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to @phoenhex team (@bkth_ @5aelo @_niklasb) working with
Trend Micro's Zero Day Initiative.
Processing maliciously crafted web content may lead to arbitrary
code execution. Multiple memory corruption issues were addressed
with improved memory handling.
CVE-2018-4359
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Samuel GroA (@5aelo).
Processing maliciously crafted web content may lead to arbitrary
code execution. Multiple memory corruption issues were addressed
with improved memory handling.
CVE-2018-4361
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Google OSS-Fuzz.
We recommend updating to the latest stable versions of WebKitGTK+ and
WPE WebKit. It is the best way to ensure that you are running safe
versions of WebKit. Please check our websites for information about the
latest stable releases.
Further information about WebKitGTK+ and WPE WebKit security advisories
can be found at: https://webkitgtk.org/security.html or
https://wpewebkit.org/security/.
The WebKitGTK+ and WPE WebKit team,
September 26, 2018
| VAR-201901-1012 | CVE-2018-4213 | plural Apple In product ASSERT Vulnerability that causes an error |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks. plural Apple The product includes ASSERT A vulnerability that causes an error exists.Through unexpected operations, ASSERT An error may be caused. Apple iOS, etc. are all products of Apple (Apple). Apple iOS is an operating system developed for mobile devices; Safari is a web browser that is the default browser included with Mac OS X and iOS operating systems. iTunes for Windows is a media player application based on the Windows platform. WebKit is one of the web browser engine components. A security vulnerability exists in the WebKit component of several Apple products. Attackers can exploit this vulnerability to cause ASSERT to fail. The following products and versions are affected: Apple iOS prior to 11.3; Safari prior to 11.1; Windows-based iCloud prior to 7.4; tvOS prior to 11.3; watchOS prior to 4.3; Windows-based iTunes prior to 12.7.4. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201812-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: WebkitGTK+: Multiple vulnerabilities
Date: December 02, 2018
Bugs: #667892
ID: 201812-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in WebKitGTK+, the worst of
which may lead to arbitrary code execution.
Background
==========
WebKitGTK+ is a full-featured port of the WebKit rendering engine,
suitable for projects requiring any kind of web integration, from
hybrid HTML/CSS applications to full-fledged web browsers.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-libs/webkit-gtk < 2.22.0 >= 2.22.0
Description
===========
Multiple vulnerabilities have been discovered in WebKitGTK+. Please
review the referenced CVE identifiers for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All WebkitGTK+ users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.22.0"
References
==========
[ 1 ] CVE-2018-4191
https://nvd.nist.gov/vuln/detail/CVE-2018-4191
[ 2 ] CVE-2018-4197
https://nvd.nist.gov/vuln/detail/CVE-2018-4197
[ 3 ] CVE-2018-4207
https://nvd.nist.gov/vuln/detail/CVE-2018-4207
[ 4 ] CVE-2018-4208
https://nvd.nist.gov/vuln/detail/CVE-2018-4208
[ 5 ] CVE-2018-4209
https://nvd.nist.gov/vuln/detail/CVE-2018-4209
[ 6 ] CVE-2018-4210
https://nvd.nist.gov/vuln/detail/CVE-2018-4210
[ 7 ] CVE-2018-4212
https://nvd.nist.gov/vuln/detail/CVE-2018-4212
[ 8 ] CVE-2018-4213
https://nvd.nist.gov/vuln/detail/CVE-2018-4213
[ 9 ] CVE-2018-4299
https://nvd.nist.gov/vuln/detail/CVE-2018-4299
[ 10 ] CVE-2018-4306
https://nvd.nist.gov/vuln/detail/CVE-2018-4306
[ 11 ] CVE-2018-4309
https://nvd.nist.gov/vuln/detail/CVE-2018-4309
[ 12 ] CVE-2018-4311
https://nvd.nist.gov/vuln/detail/CVE-2018-4311
[ 13 ] CVE-2018-4312
https://nvd.nist.gov/vuln/detail/CVE-2018-4312
[ 14 ] CVE-2018-4314
https://nvd.nist.gov/vuln/detail/CVE-2018-4314
[ 15 ] CVE-2018-4315
https://nvd.nist.gov/vuln/detail/CVE-2018-4315
[ 16 ] CVE-2018-4316
https://nvd.nist.gov/vuln/detail/CVE-2018-4316
[ 17 ] CVE-2018-4317
https://nvd.nist.gov/vuln/detail/CVE-2018-4317
[ 18 ] CVE-2018-4318
https://nvd.nist.gov/vuln/detail/CVE-2018-4318
[ 19 ] CVE-2018-4319
https://nvd.nist.gov/vuln/detail/CVE-2018-4319
[ 20 ] CVE-2018-4323
https://nvd.nist.gov/vuln/detail/CVE-2018-4323
[ 21 ] CVE-2018-4328
https://nvd.nist.gov/vuln/detail/CVE-2018-4328
[ 22 ] CVE-2018-4358
https://nvd.nist.gov/vuln/detail/CVE-2018-4358
[ 23 ] CVE-2018-4359
https://nvd.nist.gov/vuln/detail/CVE-2018-4359
[ 24 ] CVE-2018-4361
https://nvd.nist.gov/vuln/detail/CVE-2018-4361
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201812-04
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us.
License
=======
Copyright 2018 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
. -----------------------------------------------------------------------
WebKitGTK+ and WPE WebKit Security Advisory WSA-2018-0007
------------------------------------------------------------------------
Date reported : September 26, 2018
Advisory ID : WSA-2018-0007
WebKitGTK+ Advisory URL :
https://webkitgtk.org/security/WSA-2018-0007.html
WPE WebKit Advisory URL :
https://wpewebkit.org/security/WSA-2018-0007.html
CVE identifiers : CVE-2018-4207, CVE-2018-4208, CVE-2018-4209,
CVE-2018-4210, CVE-2018-4212, CVE-2018-4213,
CVE-2018-4191, CVE-2018-4197, CVE-2018-4299,
CVE-2018-4306, CVE-2018-4309, CVE-2018-4311,
CVE-2018-4312, CVE-2018-4314, CVE-2018-4315,
CVE-2018-4316, CVE-2018-4317, CVE-2018-4318,
CVE-2018-4319, CVE-2018-4323, CVE-2018-4328,
CVE-2018-4358, CVE-2018-4359, CVE-2018-4361.
Several vulnerabilities were discovered in WebKitGTK+ and WPE WebKit.
CVE-2018-4207
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
CVE-2018-4208
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
CVE-2018-4209
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
CVE-2018-4210
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
Unexpected interaction with indexing types caused a failure. An
array indexing issue existed in the handling of a function in
JavaScriptCore.
CVE-2018-4212
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
CVE-2018-4213
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
CVE-2018-4191
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Google OSS-Fuzz.
CVE-2018-4197
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4299
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Samuel GroI2 (saelo) working with Trend Micro's Zero Day
Initiative.
Processing maliciously crafted web content may lead to arbitrary
code execution. Multiple memory corruption issues were addressed
with improved memory handling.
CVE-2018-4306
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4309
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to an anonymous researcher working with Trend Micro's Zero
Day Initiative.
A malicious website may be able to execute scripts in the context of
another website. A cross-site scripting issue existed in WebKit.
CVE-2018-4311
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Erling Alf Ellingsen (@steike).
Cross-origin SecurityErrors includes the accessed frameas origin.
CVE-2018-4312
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4314
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4315
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4316
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to crixer, Hanming Zhang (@4shitak4) of Qihoo 360 Vulcan
Team.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4317
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4318
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4319
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to John Pettitt of Google.
A malicious website may cause unexepected cross-origin behavior. A
cross-origin issue existed with iframe elements.
CVE-2018-4323
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution. Multiple memory corruption issues were addressed
with improved memory handling.
CVE-2018-4328
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution. Multiple memory corruption issues were addressed
with improved memory handling.
CVE-2018-4358
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to @phoenhex team (@bkth_ @5aelo @_niklasb) working with
Trend Micro's Zero Day Initiative.
Processing maliciously crafted web content may lead to arbitrary
code execution. Multiple memory corruption issues were addressed
with improved memory handling.
CVE-2018-4359
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Samuel GroA (@5aelo).
Processing maliciously crafted web content may lead to arbitrary
code execution. Multiple memory corruption issues were addressed
with improved memory handling.
CVE-2018-4361
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Google OSS-Fuzz.
We recommend updating to the latest stable versions of WebKitGTK+ and
WPE WebKit. It is the best way to ensure that you are running safe
versions of WebKit. Please check our websites for information about the
latest stable releases.
Further information about WebKitGTK+ and WPE WebKit security advisories
can be found at: https://webkitgtk.org/security.html or
https://wpewebkit.org/security/.
The WebKitGTK+ and WPE WebKit team,
September 26, 2018
| VAR-201901-1010 | CVE-2018-4210 | plural Apple Product javascript Vulnerability related to array index in processing of functions in the core |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
In iOS before 11.3, Safari before 11.1, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, an array indexing issue existed in the handling of a function in javascript core. This issue was addressed with improved checks. plural Apple Product javascript An array index vulnerability exists in the processing of functions in the core.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Apple iOS, etc. are all products of Apple (Apple). Apple iOS is an operating system developed for mobile devices; Safari is a web browser that is the default browser included with Mac OS X and iOS operating systems. iTunes for Windows is a media player application based on the Windows platform. WebKit is one of the web browser engine components. A security vulnerability exists in the WebKit component of several Apple products. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements. The following products and versions are affected: Apple iOS prior to 11.3; Safari prior to 11.1; tvOS prior to 11.3; watchOS prior to 4.3; Windows-based iTunes prior to 12.7.4. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201812-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: WebkitGTK+: Multiple vulnerabilities
Date: December 02, 2018
Bugs: #667892
ID: 201812-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in WebKitGTK+, the worst of
which may lead to arbitrary code execution.
Background
==========
WebKitGTK+ is a full-featured port of the WebKit rendering engine,
suitable for projects requiring any kind of web integration, from
hybrid HTML/CSS applications to full-fledged web browsers.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-libs/webkit-gtk < 2.22.0 >= 2.22.0
Description
===========
Multiple vulnerabilities have been discovered in WebKitGTK+. Please
review the referenced CVE identifiers for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All WebkitGTK+ users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.22.0"
References
==========
[ 1 ] CVE-2018-4191
https://nvd.nist.gov/vuln/detail/CVE-2018-4191
[ 2 ] CVE-2018-4197
https://nvd.nist.gov/vuln/detail/CVE-2018-4197
[ 3 ] CVE-2018-4207
https://nvd.nist.gov/vuln/detail/CVE-2018-4207
[ 4 ] CVE-2018-4208
https://nvd.nist.gov/vuln/detail/CVE-2018-4208
[ 5 ] CVE-2018-4209
https://nvd.nist.gov/vuln/detail/CVE-2018-4209
[ 6 ] CVE-2018-4210
https://nvd.nist.gov/vuln/detail/CVE-2018-4210
[ 7 ] CVE-2018-4212
https://nvd.nist.gov/vuln/detail/CVE-2018-4212
[ 8 ] CVE-2018-4213
https://nvd.nist.gov/vuln/detail/CVE-2018-4213
[ 9 ] CVE-2018-4299
https://nvd.nist.gov/vuln/detail/CVE-2018-4299
[ 10 ] CVE-2018-4306
https://nvd.nist.gov/vuln/detail/CVE-2018-4306
[ 11 ] CVE-2018-4309
https://nvd.nist.gov/vuln/detail/CVE-2018-4309
[ 12 ] CVE-2018-4311
https://nvd.nist.gov/vuln/detail/CVE-2018-4311
[ 13 ] CVE-2018-4312
https://nvd.nist.gov/vuln/detail/CVE-2018-4312
[ 14 ] CVE-2018-4314
https://nvd.nist.gov/vuln/detail/CVE-2018-4314
[ 15 ] CVE-2018-4315
https://nvd.nist.gov/vuln/detail/CVE-2018-4315
[ 16 ] CVE-2018-4316
https://nvd.nist.gov/vuln/detail/CVE-2018-4316
[ 17 ] CVE-2018-4317
https://nvd.nist.gov/vuln/detail/CVE-2018-4317
[ 18 ] CVE-2018-4318
https://nvd.nist.gov/vuln/detail/CVE-2018-4318
[ 19 ] CVE-2018-4319
https://nvd.nist.gov/vuln/detail/CVE-2018-4319
[ 20 ] CVE-2018-4323
https://nvd.nist.gov/vuln/detail/CVE-2018-4323
[ 21 ] CVE-2018-4328
https://nvd.nist.gov/vuln/detail/CVE-2018-4328
[ 22 ] CVE-2018-4358
https://nvd.nist.gov/vuln/detail/CVE-2018-4358
[ 23 ] CVE-2018-4359
https://nvd.nist.gov/vuln/detail/CVE-2018-4359
[ 24 ] CVE-2018-4361
https://nvd.nist.gov/vuln/detail/CVE-2018-4361
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201812-04
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us.
License
=======
Copyright 2018 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
. -----------------------------------------------------------------------
WebKitGTK+ and WPE WebKit Security Advisory WSA-2018-0007
------------------------------------------------------------------------
Date reported : September 26, 2018
Advisory ID : WSA-2018-0007
WebKitGTK+ Advisory URL :
https://webkitgtk.org/security/WSA-2018-0007.html
WPE WebKit Advisory URL :
https://wpewebkit.org/security/WSA-2018-0007.html
CVE identifiers : CVE-2018-4207, CVE-2018-4208, CVE-2018-4209,
CVE-2018-4210, CVE-2018-4212, CVE-2018-4213,
CVE-2018-4191, CVE-2018-4197, CVE-2018-4299,
CVE-2018-4306, CVE-2018-4309, CVE-2018-4311,
CVE-2018-4312, CVE-2018-4314, CVE-2018-4315,
CVE-2018-4316, CVE-2018-4317, CVE-2018-4318,
CVE-2018-4319, CVE-2018-4323, CVE-2018-4328,
CVE-2018-4358, CVE-2018-4359, CVE-2018-4361.
Several vulnerabilities were discovered in WebKitGTK+ and WPE WebKit.
CVE-2018-4207
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
Unexpected interaction causes an ASSERT failure.
CVE-2018-4208
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
Unexpected interaction causes an ASSERT failure.
CVE-2018-4209
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
Unexpected interaction causes an ASSERT failure.
CVE-2018-4210
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
Unexpected interaction with indexing types caused a failure.
CVE-2018-4212
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
Unexpected interaction causes an ASSERT failure.
CVE-2018-4213
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
Unexpected interaction causes an ASSERT failure.
CVE-2018-4191
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Google OSS-Fuzz.
Unexpected interaction causes an ASSERT failure.
CVE-2018-4197
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4299
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Samuel GroI2 (saelo) working with Trend Micro's Zero Day
Initiative.
Processing maliciously crafted web content may lead to arbitrary
code execution. Multiple memory corruption issues were addressed
with improved memory handling.
CVE-2018-4306
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4309
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to an anonymous researcher working with Trend Micro's Zero
Day Initiative.
A malicious website may be able to execute scripts in the context of
another website. A cross-site scripting issue existed in WebKit.
CVE-2018-4311
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Erling Alf Ellingsen (@steike).
Cross-origin SecurityErrors includes the accessed frameas origin.
CVE-2018-4312
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4314
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4315
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4316
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to crixer, Hanming Zhang (@4shitak4) of Qihoo 360 Vulcan
Team.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4317
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4318
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4319
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to John Pettitt of Google.
A malicious website may cause unexepected cross-origin behavior. A
cross-origin issue existed with iframe elements.
CVE-2018-4323
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution. Multiple memory corruption issues were addressed
with improved memory handling.
CVE-2018-4328
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution. Multiple memory corruption issues were addressed
with improved memory handling.
CVE-2018-4358
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to @phoenhex team (@bkth_ @5aelo @_niklasb) working with
Trend Micro's Zero Day Initiative.
Processing maliciously crafted web content may lead to arbitrary
code execution. Multiple memory corruption issues were addressed
with improved memory handling.
CVE-2018-4359
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Samuel GroA (@5aelo).
Processing maliciously crafted web content may lead to arbitrary
code execution. Multiple memory corruption issues were addressed
with improved memory handling.
CVE-2018-4361
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Google OSS-Fuzz.
Unexpected interaction causes an ASSERT failure.
We recommend updating to the latest stable versions of WebKitGTK+ and
WPE WebKit. It is the best way to ensure that you are running safe
versions of WebKit. Please check our websites for information about the
latest stable releases.
Further information about WebKitGTK+ and WPE WebKit security advisories
can be found at: https://webkitgtk.org/security.html or
https://wpewebkit.org/security/.
The WebKitGTK+ and WPE WebKit team,
September 26, 2018
| VAR-201901-1008 | CVE-2018-4208 | plural Apple In product ASSERT Vulnerability that causes an error |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks. plural Apple The product includes ASSERT A vulnerability that causes an error exists.Through unexpected operations, ASSERT An error may be caused. Apple iOS, etc. are all products of Apple (Apple). Apple iOS is an operating system developed for mobile devices; Safari is a web browser that is the default browser included with Mac OS X and iOS operating systems. iTunes for Windows is a media player application based on the Windows platform. WebKit is one of the web browser engine components. A security vulnerability exists in the WebKit component of several Apple products. Attackers can exploit this vulnerability to cause ASSERT to fail. The following products and versions are affected: Apple iOS prior to 11.3; Safari prior to 11.1; Windows-based iCloud prior to 7.4; tvOS prior to 11.3; watchOS prior to 4.3; Windows-based iTunes prior to 12.7.4. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201812-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: WebkitGTK+: Multiple vulnerabilities
Date: December 02, 2018
Bugs: #667892
ID: 201812-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in WebKitGTK+, the worst of
which may lead to arbitrary code execution.
Background
==========
WebKitGTK+ is a full-featured port of the WebKit rendering engine,
suitable for projects requiring any kind of web integration, from
hybrid HTML/CSS applications to full-fledged web browsers.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-libs/webkit-gtk < 2.22.0 >= 2.22.0
Description
===========
Multiple vulnerabilities have been discovered in WebKitGTK+. Please
review the referenced CVE identifiers for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All WebkitGTK+ users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.22.0"
References
==========
[ 1 ] CVE-2018-4191
https://nvd.nist.gov/vuln/detail/CVE-2018-4191
[ 2 ] CVE-2018-4197
https://nvd.nist.gov/vuln/detail/CVE-2018-4197
[ 3 ] CVE-2018-4207
https://nvd.nist.gov/vuln/detail/CVE-2018-4207
[ 4 ] CVE-2018-4208
https://nvd.nist.gov/vuln/detail/CVE-2018-4208
[ 5 ] CVE-2018-4209
https://nvd.nist.gov/vuln/detail/CVE-2018-4209
[ 6 ] CVE-2018-4210
https://nvd.nist.gov/vuln/detail/CVE-2018-4210
[ 7 ] CVE-2018-4212
https://nvd.nist.gov/vuln/detail/CVE-2018-4212
[ 8 ] CVE-2018-4213
https://nvd.nist.gov/vuln/detail/CVE-2018-4213
[ 9 ] CVE-2018-4299
https://nvd.nist.gov/vuln/detail/CVE-2018-4299
[ 10 ] CVE-2018-4306
https://nvd.nist.gov/vuln/detail/CVE-2018-4306
[ 11 ] CVE-2018-4309
https://nvd.nist.gov/vuln/detail/CVE-2018-4309
[ 12 ] CVE-2018-4311
https://nvd.nist.gov/vuln/detail/CVE-2018-4311
[ 13 ] CVE-2018-4312
https://nvd.nist.gov/vuln/detail/CVE-2018-4312
[ 14 ] CVE-2018-4314
https://nvd.nist.gov/vuln/detail/CVE-2018-4314
[ 15 ] CVE-2018-4315
https://nvd.nist.gov/vuln/detail/CVE-2018-4315
[ 16 ] CVE-2018-4316
https://nvd.nist.gov/vuln/detail/CVE-2018-4316
[ 17 ] CVE-2018-4317
https://nvd.nist.gov/vuln/detail/CVE-2018-4317
[ 18 ] CVE-2018-4318
https://nvd.nist.gov/vuln/detail/CVE-2018-4318
[ 19 ] CVE-2018-4319
https://nvd.nist.gov/vuln/detail/CVE-2018-4319
[ 20 ] CVE-2018-4323
https://nvd.nist.gov/vuln/detail/CVE-2018-4323
[ 21 ] CVE-2018-4328
https://nvd.nist.gov/vuln/detail/CVE-2018-4328
[ 22 ] CVE-2018-4358
https://nvd.nist.gov/vuln/detail/CVE-2018-4358
[ 23 ] CVE-2018-4359
https://nvd.nist.gov/vuln/detail/CVE-2018-4359
[ 24 ] CVE-2018-4361
https://nvd.nist.gov/vuln/detail/CVE-2018-4361
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201812-04
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us.
License
=======
Copyright 2018 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
. -----------------------------------------------------------------------
WebKitGTK+ and WPE WebKit Security Advisory WSA-2018-0007
------------------------------------------------------------------------
Date reported : September 26, 2018
Advisory ID : WSA-2018-0007
WebKitGTK+ Advisory URL :
https://webkitgtk.org/security/WSA-2018-0007.html
WPE WebKit Advisory URL :
https://wpewebkit.org/security/WSA-2018-0007.html
CVE identifiers : CVE-2018-4207, CVE-2018-4208, CVE-2018-4209,
CVE-2018-4210, CVE-2018-4212, CVE-2018-4213,
CVE-2018-4191, CVE-2018-4197, CVE-2018-4299,
CVE-2018-4306, CVE-2018-4309, CVE-2018-4311,
CVE-2018-4312, CVE-2018-4314, CVE-2018-4315,
CVE-2018-4316, CVE-2018-4317, CVE-2018-4318,
CVE-2018-4319, CVE-2018-4323, CVE-2018-4328,
CVE-2018-4358, CVE-2018-4359, CVE-2018-4361.
Several vulnerabilities were discovered in WebKitGTK+ and WPE WebKit.
CVE-2018-4207
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
CVE-2018-4208
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
CVE-2018-4209
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
CVE-2018-4210
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
Unexpected interaction with indexing types caused a failure. An
array indexing issue existed in the handling of a function in
JavaScriptCore.
CVE-2018-4212
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
CVE-2018-4213
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
CVE-2018-4191
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Google OSS-Fuzz.
CVE-2018-4197
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4299
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Samuel GroI2 (saelo) working with Trend Micro's Zero Day
Initiative.
Processing maliciously crafted web content may lead to arbitrary
code execution. Multiple memory corruption issues were addressed
with improved memory handling.
CVE-2018-4306
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4309
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to an anonymous researcher working with Trend Micro's Zero
Day Initiative.
A malicious website may be able to execute scripts in the context of
another website. A cross-site scripting issue existed in WebKit.
CVE-2018-4311
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Erling Alf Ellingsen (@steike).
Cross-origin SecurityErrors includes the accessed frameas origin.
CVE-2018-4312
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4314
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4315
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4316
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to crixer, Hanming Zhang (@4shitak4) of Qihoo 360 Vulcan
Team.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4317
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4318
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4319
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to John Pettitt of Google.
A malicious website may cause unexepected cross-origin behavior. A
cross-origin issue existed with iframe elements.
CVE-2018-4323
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution. Multiple memory corruption issues were addressed
with improved memory handling.
CVE-2018-4328
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution. Multiple memory corruption issues were addressed
with improved memory handling.
CVE-2018-4358
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to @phoenhex team (@bkth_ @5aelo @_niklasb) working with
Trend Micro's Zero Day Initiative.
Processing maliciously crafted web content may lead to arbitrary
code execution. Multiple memory corruption issues were addressed
with improved memory handling.
CVE-2018-4359
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Samuel GroA (@5aelo).
Processing maliciously crafted web content may lead to arbitrary
code execution. Multiple memory corruption issues were addressed
with improved memory handling.
CVE-2018-4361
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Google OSS-Fuzz.
We recommend updating to the latest stable versions of WebKitGTK+ and
WPE WebKit. It is the best way to ensure that you are running safe
versions of WebKit. Please check our websites for information about the
latest stable releases.
Further information about WebKitGTK+ and WPE WebKit security advisories
can be found at: https://webkitgtk.org/security.html or
https://wpewebkit.org/security/.
The WebKitGTK+ and WPE WebKit team,
September 26, 2018
| VAR-201901-1009 | CVE-2018-4209 | plural Apple In product ASSERT Vulnerability that causes an error |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks. plural Apple The product includes ASSERT A vulnerability that causes an error exists.Through unexpected operations, ASSERT An error may be caused. Apple iOS, etc. are all products of Apple (Apple). Apple iOS is an operating system developed for mobile devices; Safari is a web browser that is the default browser included with Mac OS X and iOS operating systems. iTunes for Windows is a media player application based on the Windows platform. WebKit is one of the web browser engine components. A security vulnerability exists in the WebKit component of several Apple products. Attackers can exploit this vulnerability to cause ASSERT to fail. The following products and versions are affected: Apple iOS prior to 11.3; Safari prior to 11.1; Windows-based iCloud prior to 7.4; tvOS prior to 11.3; watchOS prior to 4.3; Windows-based iTunes prior to 12.7.4. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201812-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: WebkitGTK+: Multiple vulnerabilities
Date: December 02, 2018
Bugs: #667892
ID: 201812-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in WebKitGTK+, the worst of
which may lead to arbitrary code execution.
Background
==========
WebKitGTK+ is a full-featured port of the WebKit rendering engine,
suitable for projects requiring any kind of web integration, from
hybrid HTML/CSS applications to full-fledged web browsers.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-libs/webkit-gtk < 2.22.0 >= 2.22.0
Description
===========
Multiple vulnerabilities have been discovered in WebKitGTK+. Please
review the referenced CVE identifiers for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All WebkitGTK+ users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.22.0"
References
==========
[ 1 ] CVE-2018-4191
https://nvd.nist.gov/vuln/detail/CVE-2018-4191
[ 2 ] CVE-2018-4197
https://nvd.nist.gov/vuln/detail/CVE-2018-4197
[ 3 ] CVE-2018-4207
https://nvd.nist.gov/vuln/detail/CVE-2018-4207
[ 4 ] CVE-2018-4208
https://nvd.nist.gov/vuln/detail/CVE-2018-4208
[ 5 ] CVE-2018-4209
https://nvd.nist.gov/vuln/detail/CVE-2018-4209
[ 6 ] CVE-2018-4210
https://nvd.nist.gov/vuln/detail/CVE-2018-4210
[ 7 ] CVE-2018-4212
https://nvd.nist.gov/vuln/detail/CVE-2018-4212
[ 8 ] CVE-2018-4213
https://nvd.nist.gov/vuln/detail/CVE-2018-4213
[ 9 ] CVE-2018-4299
https://nvd.nist.gov/vuln/detail/CVE-2018-4299
[ 10 ] CVE-2018-4306
https://nvd.nist.gov/vuln/detail/CVE-2018-4306
[ 11 ] CVE-2018-4309
https://nvd.nist.gov/vuln/detail/CVE-2018-4309
[ 12 ] CVE-2018-4311
https://nvd.nist.gov/vuln/detail/CVE-2018-4311
[ 13 ] CVE-2018-4312
https://nvd.nist.gov/vuln/detail/CVE-2018-4312
[ 14 ] CVE-2018-4314
https://nvd.nist.gov/vuln/detail/CVE-2018-4314
[ 15 ] CVE-2018-4315
https://nvd.nist.gov/vuln/detail/CVE-2018-4315
[ 16 ] CVE-2018-4316
https://nvd.nist.gov/vuln/detail/CVE-2018-4316
[ 17 ] CVE-2018-4317
https://nvd.nist.gov/vuln/detail/CVE-2018-4317
[ 18 ] CVE-2018-4318
https://nvd.nist.gov/vuln/detail/CVE-2018-4318
[ 19 ] CVE-2018-4319
https://nvd.nist.gov/vuln/detail/CVE-2018-4319
[ 20 ] CVE-2018-4323
https://nvd.nist.gov/vuln/detail/CVE-2018-4323
[ 21 ] CVE-2018-4328
https://nvd.nist.gov/vuln/detail/CVE-2018-4328
[ 22 ] CVE-2018-4358
https://nvd.nist.gov/vuln/detail/CVE-2018-4358
[ 23 ] CVE-2018-4359
https://nvd.nist.gov/vuln/detail/CVE-2018-4359
[ 24 ] CVE-2018-4361
https://nvd.nist.gov/vuln/detail/CVE-2018-4361
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201812-04
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us.
License
=======
Copyright 2018 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
. ==========================================================================
Ubuntu Security Notice USN-3781-1
October 03, 2018
webkit2gtk vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in WebKitGTK+.
Software Description:
- webkit2gtk: Web content engine library for GTK+
Details:
A large number of security issues were discovered in the WebKitGTK+ Web and
JavaScript engines.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS:
libjavascriptcoregtk-4.0-18 2.22.2-0ubuntu0.18.04.1
libwebkit2gtk-4.0-37 2.22.2-0ubuntu0.18.04.1
This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any applications
that use WebKitGTK+, such as Epiphany, to make all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3781-1
CVE-2018-4191, CVE-2018-4197, CVE-2018-4207, CVE-2018-4208,
CVE-2018-4209, CVE-2018-4210, CVE-2018-4212, CVE-2018-4213,
CVE-2018-4299, CVE-2018-4306, CVE-2018-4309, CVE-2018-4311,
CVE-2018-4312, CVE-2018-4314, CVE-2018-4315, CVE-2018-4316,
CVE-2018-4317, CVE-2018-4318, CVE-2018-4319, CVE-2018-4323,
CVE-2018-4328, CVE-2018-4358, CVE-2018-4359, CVE-2018-4361
Package Information:
https://launchpad.net/ubuntu/+source/webkit2gtk/2.22.2-0ubuntu0.18.04.1
. -----------------------------------------------------------------------
WebKitGTK+ and WPE WebKit Security Advisory WSA-2018-0007
------------------------------------------------------------------------
Date reported : September 26, 2018
Advisory ID : WSA-2018-0007
WebKitGTK+ Advisory URL :
https://webkitgtk.org/security/WSA-2018-0007.html
WPE WebKit Advisory URL :
https://wpewebkit.org/security/WSA-2018-0007.html
CVE identifiers : CVE-2018-4207, CVE-2018-4208, CVE-2018-4209,
CVE-2018-4210, CVE-2018-4212, CVE-2018-4213,
CVE-2018-4191, CVE-2018-4197, CVE-2018-4299,
CVE-2018-4306, CVE-2018-4309, CVE-2018-4311,
CVE-2018-4312, CVE-2018-4314, CVE-2018-4315,
CVE-2018-4316, CVE-2018-4317, CVE-2018-4318,
CVE-2018-4319, CVE-2018-4323, CVE-2018-4328,
CVE-2018-4358, CVE-2018-4359, CVE-2018-4361.
Several vulnerabilities were discovered in WebKitGTK+ and WPE WebKit.
CVE-2018-4207
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
CVE-2018-4208
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
CVE-2018-4209
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
CVE-2018-4210
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
Unexpected interaction with indexing types caused a failure. An
array indexing issue existed in the handling of a function in
JavaScriptCore.
CVE-2018-4212
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
CVE-2018-4213
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
CVE-2018-4191
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Google OSS-Fuzz.
CVE-2018-4197
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4299
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Samuel GroI2 (saelo) working with Trend Micro's Zero Day
Initiative.
Processing maliciously crafted web content may lead to arbitrary
code execution. Multiple memory corruption issues were addressed
with improved memory handling.
CVE-2018-4306
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4309
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to an anonymous researcher working with Trend Micro's Zero
Day Initiative.
A malicious website may be able to execute scripts in the context of
another website. A cross-site scripting issue existed in WebKit.
CVE-2018-4311
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Erling Alf Ellingsen (@steike).
Cross-origin SecurityErrors includes the accessed frameas origin.
CVE-2018-4312
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4314
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4315
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4316
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to crixer, Hanming Zhang (@4shitak4) of Qihoo 360 Vulcan
Team.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4317
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4318
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4319
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to John Pettitt of Google.
A malicious website may cause unexepected cross-origin behavior. A
cross-origin issue existed with iframe elements.
CVE-2018-4323
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution. Multiple memory corruption issues were addressed
with improved memory handling.
CVE-2018-4328
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution. Multiple memory corruption issues were addressed
with improved memory handling.
CVE-2018-4358
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to @phoenhex team (@bkth_ @5aelo @_niklasb) working with
Trend Micro's Zero Day Initiative.
Processing maliciously crafted web content may lead to arbitrary
code execution. Multiple memory corruption issues were addressed
with improved memory handling.
CVE-2018-4359
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Samuel GroA (@5aelo).
Processing maliciously crafted web content may lead to arbitrary
code execution. Multiple memory corruption issues were addressed
with improved memory handling.
CVE-2018-4361
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Google OSS-Fuzz.
We recommend updating to the latest stable versions of WebKitGTK+ and
WPE WebKit. It is the best way to ensure that you are running safe
versions of WebKit. Please check our websites for information about the
latest stable releases.
Further information about WebKitGTK+ and WPE WebKit security advisories
can be found at: https://webkitgtk.org/security.html or
https://wpewebkit.org/security/.
The WebKitGTK+ and WPE WebKit team,
September 26, 2018
| VAR-201901-1007 | CVE-2018-4207 | plural Apple In product ASSERT Vulnerability that causes an error |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks. plural Apple The product includes ASSERT A vulnerability that causes an error exists.Through unexpected operations, ASSERT An error may be caused. Apple iOS, etc. are all products of Apple (Apple). Apple iOS is an operating system developed for mobile devices; Safari is a web browser that is the default browser included with Mac OS X and iOS operating systems. iTunes for Windows is a media player application based on the Windows platform. WebKit is one of the web browser engine components. A security vulnerability exists in the WebKit component of several Apple products. Attackers can exploit this vulnerability to cause ASSERT to fail. The following products and versions are affected: Apple iOS prior to 11.3; Safari prior to 11.1; Windows-based iCloud prior to 7.4; tvOS prior to 11.3; watchOS prior to 4.3; Windows-based iTunes prior to 12.7.4. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201812-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: WebkitGTK+: Multiple vulnerabilities
Date: December 02, 2018
Bugs: #667892
ID: 201812-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in WebKitGTK+, the worst of
which may lead to arbitrary code execution.
Background
==========
WebKitGTK+ is a full-featured port of the WebKit rendering engine,
suitable for projects requiring any kind of web integration, from
hybrid HTML/CSS applications to full-fledged web browsers.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-libs/webkit-gtk < 2.22.0 >= 2.22.0
Description
===========
Multiple vulnerabilities have been discovered in WebKitGTK+. Please
review the referenced CVE identifiers for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All WebkitGTK+ users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.22.0"
References
==========
[ 1 ] CVE-2018-4191
https://nvd.nist.gov/vuln/detail/CVE-2018-4191
[ 2 ] CVE-2018-4197
https://nvd.nist.gov/vuln/detail/CVE-2018-4197
[ 3 ] CVE-2018-4207
https://nvd.nist.gov/vuln/detail/CVE-2018-4207
[ 4 ] CVE-2018-4208
https://nvd.nist.gov/vuln/detail/CVE-2018-4208
[ 5 ] CVE-2018-4209
https://nvd.nist.gov/vuln/detail/CVE-2018-4209
[ 6 ] CVE-2018-4210
https://nvd.nist.gov/vuln/detail/CVE-2018-4210
[ 7 ] CVE-2018-4212
https://nvd.nist.gov/vuln/detail/CVE-2018-4212
[ 8 ] CVE-2018-4213
https://nvd.nist.gov/vuln/detail/CVE-2018-4213
[ 9 ] CVE-2018-4299
https://nvd.nist.gov/vuln/detail/CVE-2018-4299
[ 10 ] CVE-2018-4306
https://nvd.nist.gov/vuln/detail/CVE-2018-4306
[ 11 ] CVE-2018-4309
https://nvd.nist.gov/vuln/detail/CVE-2018-4309
[ 12 ] CVE-2018-4311
https://nvd.nist.gov/vuln/detail/CVE-2018-4311
[ 13 ] CVE-2018-4312
https://nvd.nist.gov/vuln/detail/CVE-2018-4312
[ 14 ] CVE-2018-4314
https://nvd.nist.gov/vuln/detail/CVE-2018-4314
[ 15 ] CVE-2018-4315
https://nvd.nist.gov/vuln/detail/CVE-2018-4315
[ 16 ] CVE-2018-4316
https://nvd.nist.gov/vuln/detail/CVE-2018-4316
[ 17 ] CVE-2018-4317
https://nvd.nist.gov/vuln/detail/CVE-2018-4317
[ 18 ] CVE-2018-4318
https://nvd.nist.gov/vuln/detail/CVE-2018-4318
[ 19 ] CVE-2018-4319
https://nvd.nist.gov/vuln/detail/CVE-2018-4319
[ 20 ] CVE-2018-4323
https://nvd.nist.gov/vuln/detail/CVE-2018-4323
[ 21 ] CVE-2018-4328
https://nvd.nist.gov/vuln/detail/CVE-2018-4328
[ 22 ] CVE-2018-4358
https://nvd.nist.gov/vuln/detail/CVE-2018-4358
[ 23 ] CVE-2018-4359
https://nvd.nist.gov/vuln/detail/CVE-2018-4359
[ 24 ] CVE-2018-4361
https://nvd.nist.gov/vuln/detail/CVE-2018-4361
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201812-04
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us.
License
=======
Copyright 2018 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
. -----------------------------------------------------------------------
WebKitGTK+ and WPE WebKit Security Advisory WSA-2018-0007
------------------------------------------------------------------------
Date reported : September 26, 2018
Advisory ID : WSA-2018-0007
WebKitGTK+ Advisory URL :
https://webkitgtk.org/security/WSA-2018-0007.html
WPE WebKit Advisory URL :
https://wpewebkit.org/security/WSA-2018-0007.html
CVE identifiers : CVE-2018-4207, CVE-2018-4208, CVE-2018-4209,
CVE-2018-4210, CVE-2018-4212, CVE-2018-4213,
CVE-2018-4191, CVE-2018-4197, CVE-2018-4299,
CVE-2018-4306, CVE-2018-4309, CVE-2018-4311,
CVE-2018-4312, CVE-2018-4314, CVE-2018-4315,
CVE-2018-4316, CVE-2018-4317, CVE-2018-4318,
CVE-2018-4319, CVE-2018-4323, CVE-2018-4328,
CVE-2018-4358, CVE-2018-4359, CVE-2018-4361.
Several vulnerabilities were discovered in WebKitGTK+ and WPE WebKit.
CVE-2018-4207
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
CVE-2018-4208
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
CVE-2018-4209
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
CVE-2018-4210
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
Unexpected interaction with indexing types caused a failure. An
array indexing issue existed in the handling of a function in
JavaScriptCore.
CVE-2018-4212
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
CVE-2018-4213
Versions affected: WebKitGTK+ before 2.20.0.
Credit to Google OSS-Fuzz.
CVE-2018-4191
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Google OSS-Fuzz.
CVE-2018-4197
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4299
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Samuel GroI2 (saelo) working with Trend Micro's Zero Day
Initiative.
Processing maliciously crafted web content may lead to arbitrary
code execution. Multiple memory corruption issues were addressed
with improved memory handling.
CVE-2018-4306
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4309
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to an anonymous researcher working with Trend Micro's Zero
Day Initiative.
A malicious website may be able to execute scripts in the context of
another website. A cross-site scripting issue existed in WebKit.
CVE-2018-4311
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Erling Alf Ellingsen (@steike).
Cross-origin SecurityErrors includes the accessed frameas origin.
CVE-2018-4312
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4314
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4315
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4316
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to crixer, Hanming Zhang (@4shitak4) of Qihoo 360 Vulcan
Team.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4317
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4318
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution.
CVE-2018-4319
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to John Pettitt of Google.
A malicious website may cause unexepected cross-origin behavior. A
cross-origin issue existed with iframe elements.
CVE-2018-4323
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution. Multiple memory corruption issues were addressed
with improved memory handling.
CVE-2018-4328
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Ivan Fratric of Google Project Zero.
Processing maliciously crafted web content may lead to arbitrary
code execution. Multiple memory corruption issues were addressed
with improved memory handling.
CVE-2018-4358
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to @phoenhex team (@bkth_ @5aelo @_niklasb) working with
Trend Micro's Zero Day Initiative.
Processing maliciously crafted web content may lead to arbitrary
code execution. Multiple memory corruption issues were addressed
with improved memory handling.
CVE-2018-4359
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Samuel GroA (@5aelo).
Processing maliciously crafted web content may lead to arbitrary
code execution. Multiple memory corruption issues were addressed
with improved memory handling.
CVE-2018-4361
Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0.
Credit to Google OSS-Fuzz.
We recommend updating to the latest stable versions of WebKitGTK+ and
WPE WebKit. It is the best way to ensure that you are running safe
versions of WebKit. Please check our websites for information about the
latest stable releases.
Further information about WebKitGTK+ and WPE WebKit security advisories
can be found at: https://webkitgtk.org/security.html or
https://wpewebkit.org/security/.
The WebKitGTK+ and WPE WebKit team,
September 26, 2018
| VAR-201810-0086 | CVE-2018-10605 | Martem TELEM GW6/GWM Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
Martem TELEM GW6/GWM versions prior to 2.0.87-4018403-k4 may allow unprivileged users to modify/upload a new system configuration or take the full control over the RTU using default credentials to connect to the RTU. Martem TELEM GW6/GWM Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. MartemTELEMGW6/GWM are data processor products from Martem, Estonia. A security vulnerability exists in versions prior to MartemTELEMGW6/GWM2.0.87-4018403-k4
| VAR-201810-0832 | CVE-2018-17218 | PTC ThingWorx Platform Cross-Site Scripting Vulnerability |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
An issue was discovered in PTC ThingWorx Platform 6.5 through 8.2. There is reflected XSS in the SQUEAL search function. PTC ThingWorx Platform Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. PTC ThingWorx Platform is a set of platforms for developing and deploying industrial IoT applications and augmented reality (AR). A remote attacker could use a specially crafted URL to exploit this vulnerability to execute a script in a user's web browser. SEC Consult Vulnerability Lab Security Advisory < 20181001-0 >
=======================================================================
title: Password disclosure vulnerability & XSS
product: PTC ThingWorx
vulnerable version: 6.5-7.4, 8.0.x, 8.1.x, 8.2.x
fixed version: see Solution section
CVE number: CVE-2018-17216, CVE-2018-17217, CVE-2018-17218
impact: critical
homepage: https://www.ptc.com
found: 2018-03-13
by: M. Tomaselli (Office Munich)
SEC Consult Vulnerability Lab
An integrated part of SEC Consult
Europe | Asia | North America
https://www.sec-consult.com
=======================================================================
Vendor description:
-------------------
"ThingWorx is more than an IoT platform; it provides the functionality,
flexibility and scalability that businesses need to drive industrial
innovationaincluding the ability to source, contextualize and synthesize
data while orchestrating processes and delivering powerful web, mobile
and AR experiences."
Source: https://www.ptc.com/en/thingworx8
Business recommendation:
------------------------
ThingWorx allows to configure Things to communicate with other services over
several protocols (e.g. LDAP integration via a DirectoryServices Thing). In
order to communicate with services that require authentification, ThingWorx
provides functionality to associate credentials to a Thing.
During a brief audit it was noticed that ThingWorx Composer leaks the
following sensitive data:
1) The PBKDF2WithHmac512 password hash of a user Thing
2) The AES encrypted password of several Things containing password attributes
Furthermore, the password used for encryption is hard-coded and thus identical
along all installations.
The vendor provides a patch which should be installed immediately.
It is recommended to perform further thorough security audits as the product
may be affected by other potential security vulnerabilities.
Vulnerability overview/description:
-----------------------------------
1) Disclosure of User Password Hashes to Privileged Users (CVE-2018-17216)
ThingWorx discloses the PBKDF2WithHmac512 hashed passwords of its application
users when doing exports with an administrative account. This enables an
attacker to conduct offline brute-force or dictionary attacks against the
obtained password hashes.
2) Disclosure of Encrypted Credentials and Use of Hard-Coded Passwords
(CVE-2018-17217)
A critical information disclosure vulnerability leaks the AES encrypted
passwords of services configured within ThingWorx. Due to a hard-coded
master password in the SecureData class, an attacker is able to decrypt the
obtained passwords which grants him access to other services. The AES encrypted
password gets disclosed in the server response when a user/attacker visits a
Thing that contains credentials.
3) Reflected Cross-Site Scripting (CVE-2018-17218)
The JavaScript part of the ThingWorx SQUEAL search functionality
(searchExpression parameter) which is responsible for parsing the obtained JSON
response fails to properly sanitize user supplied input. If the victim views
attacker-prepared content (e.g. on a website or in an HTML email) an attacker
is able to execute arbitrary actions in the context of its victims' sessions.
Proof of concept:
-----------------
The proof of concept has been removed from this advisory.
Vulnerable / tested versions:
-----------------------------
The vulnerabilities have been verified to exist in version 8.0.1-b39 which was
the latest version available at the time of the test.
The vendor provided further affected version information. See the Solution
section for reference.
Vendor contact timeline:
------------------------
2018-03-14: Contacting vendor through email
2018-03-16: Advisory sent to vendor via encrypted mail
2018-03 - 2018-09: Multiple phone calls with PTC R&D department
discussing release & multi-party disclosure
2018-08-15: Vendor provided private notifications to customers to give
45 days to upgrade
2018-10-01: Coordinated release of SEC Consult advisory
Solution:
---------
Best recommendation is to upgrade to the latest version of ThingWorx
to version 8.3.2 (at time of writing).
For newer verions, the issue of the hard coded password has been fixed
and the SQUEAL function removed.
The minimum upgrade to obtain mitigations for all 3 issues depends
on the version of ThingWorx in use.
For ThingWorx versions 6.5-7.4, upgrade to 7.4.14+
For ThingWorx version 8.0.x, upgrade to 8.0.12+
For ThingWorx version 8.1.x, upgrade to 8.1.7+
For ThingWorx version 8.2.x, upgrade to 8.2.4+
The vendor always recommends upgrading to the latest availabe service pack.
See the following advisory by the vendor for further information:
https://www.ptc.com/en/support/article?n=CS291004
Workaround:
-----------
1) Disclosure of User Password Hashes to Privileged Users
To limit exposure, disabling all native ThingWorx users and solely rely on
users that make use of Active Directory or Single Sign On (SSO) authentication,
since the password hashes are then not saved within ThingWorx.
2) Disclosure of Encrypted Credentials and Use of Hard-Coded Passwords
None. Removal
of this function will eliminate the XSS issue.
a.
b. For versions older than 8.1.0, a workaround is available at the PTC support
site.
Updating to fix all 3 issues is recommended.
Advisory URL:
-------------
https://www.sec-consult.com/en/vulnerability-lab/advisories/index.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
SEC Consult Vulnerability Lab
SEC Consult
Europe | Asia | North America
About SEC Consult Vulnerability Lab
The SEC Consult Vulnerability Lab is an integrated part of SEC Consult. It
ensures the continued knowledge gain of SEC Consult in the field of network
and application security to stay ahead of the attacker. The SEC Consult
Vulnerability Lab supports high-quality penetration testing and the evaluation
of new offensive and defensive technologies for our customers. Hence our
customers obtain the most current information about vulnerabilities and valid
recommendation about the risk profile of new technologies.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Interested to work with the experts of SEC Consult?
Send us your application https://www.sec-consult.com/en/career/index.html
Interested in improving your cyber security with the experts of SEC Consult?
Contact our local offices https://www.sec-consult.com/en/contact/index.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Mail: research at sec-consult dot com
Web: https://www.sec-consult.com
Blog: http://blog.sec-consult.com
Twitter: https://twitter.com/sec_consult
EOF M. Tomaselli / @2018
| VAR-201810-0420 | CVE-2018-17868 | DASAN H660GW Vulnerable to cross-site scripting |
CVSS V2: 3.5 CVSS V3: 4.8 Severity: MEDIUM |
DASAN H660GW devices have Stored XSS in the Port Forwarding functionality. DASAN H660GW Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. Dasan H660GW is a modem device manufactured by Dasan Corporation in South Korea. Remote attackers can exploit this vulnerability to inject malicious scripts into web pages and execute the scripts in the user's browser
| VAR-201810-0126 | CVE-2018-15702 | TP-Link TL-WRN841N Cross-Site Request Forgery Vulnerability |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
The web interface in TP-Link TL-WRN841N 0.9.1 4.16 v0348.0 is vulnerable to CSRF due to insufficient validation of the referer field. TP-Link TL-WRN841N Contains a cross-site request forgery vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. TP-LinkTL-WRN841N is a wireless router product of China TP-LINK. A remote attacker can exploit this vulnerability to perform unauthorized operations by constructing a domain name or subdomain of \342\200\230tplinklogin.net**\342\200\231, \342\200\230tplinkwifi.net*\342\200\231, or \342\200\230*\342\200\231
| VAR-201810-0124 | CVE-2018-15700 | TP-Link TL-WRN841N Input validation vulnerability |
CVSS V2: 6.1 CVSS V3: 6.5 Severity: MEDIUM |
The web interface in TP-Link TL-WRN841N 0.9.1 4.16 v0348.0 is vulnerable to a denial of service when an unauthenticated LAN user sends a crafted HTTP header containing an unexpected Referer field. TP-Link TL-WRN841N Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. TP-LinkTL-WRN841N is a wireless router product of China TP-LINK. A denial of service vulnerability exists in the web interface in the TP-LinkTL-WRN841N0.9.14.16v0348.0 release
| VAR-201810-0125 | CVE-2018-15701 | TP-Link TL-WRN841N Input validation vulnerability |
CVSS V2: 3.3 CVSS V3: 6.5 Severity: MEDIUM |
The web interface in TP-Link TL-WRN841N 0.9.1 4.16 v0348.0 is vulnerable to a denial of service when an unauthenticated LAN user sends a crafted HTTP header containing an unexpected Cookie field. TP-Link TL-WRN841N Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. TP-LinkTL-WRN841N is a wireless router product of China TP-LINK. A denial of service vulnerability exists in the Wbe interface in the TP-LinkTL-WRN841N0.9.14.16v0348.0 release
| VAR-201810-0419 | CVE-2018-17867 | DASAN H660GW Command injection vulnerability in devices |
CVSS V2: 9.0 CVSS V3: 7.2 Severity: HIGH |
The Port Forwarding functionality on DASAN H660GW devices allows remote attackers to execute arbitrary code via shell metacharacters in the cgi-bin/adv_nat_virsvr.asp Addr parameter (aka the Local IP Address field). DASAN H660GW The device contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Dasan H660GW is a modem device manufactured by Dasan Corporation in South Korea. There is a security hole in the Port Forwarding function in DASAN H660GW
| VAR-201810-0421 | CVE-2018-17869 | DASAN H660GW Device cross-site request forgery vulnerability |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
DASAN H660GW devices do not implement any CSRF protection mechanism. DASAN H660GW The device contains a cross-site request forgery vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Dasan H660GW is a modem device manufactured by Dasan Corporation in South Korea. There is a cross-site request forgery vulnerability in Dasan H660GW, which is caused by the fact that the program does not implement any cross-site request forgery protection mechanism. A remote attacker could use a malicious website to exploit this vulnerability to perform unauthorized operations
| VAR-201810-1614 | No CVE | Schneider Pelco Sarix Pro camera fastjpeg has unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Pelco Sarix Pro is a video surveillance device from Schneider Electric.
Schneider Pelco Sarix Pro camera fastjpeg has an unauthorized access vulnerability. The vulnerability stems from the lack of permission verification on the fastjpeg interface. Attackers can use the vulnerability to cause unauthorized access, and view real-time monitoring screenshot information.
| VAR-201810-1618 | No CVE | Schneider Pelco Sarix Pro camera set program system.opkg.remove has a command injection vulnerability |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
Pelco Sarix Pro is a video surveillance device from Schneider Electric.
A command injection vulnerability exists in the Schneider Pelco Sarix Pro camera set program system.opkg.remove. An attacker can use the vulnerability to execute arbitrary commands in the background through an HTTP request.
| VAR-201810-1621 | No CVE | siemens TD Keypad Designer has DLL hijacking vulnerability |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
TD Keypad Designer is Siemens keyboard designer for TD 100C, TD 200C, TD 400C.
siemens TD Keypad Designer V1.0.9.25 has a DLL hijacking vulnerability when processing td1 files. Attackers can use this vulnerability to load malicious dlls and execute malicious code.