[arch-security] [ASA-201609-2] webkit2gtk: multiple issues

Levente Polyak anthraxx at archlinux.org
Thu Sep 1 21:43:36 UTC 2016


Arch Linux Security Advisory ASA-201609-2
=========================================

Severity: Critical
Date	: 2016-09-01
CVE-ID	: CVE-2016-4590 CVE-2016-4591 CVE-2016-4622 CVE-2016-4624
Package : webkit2gtk
Type	: multiple issues
Remote	: Yes
Link	: https://wiki.archlinux.org/index.php/CVE

Summary
=======

The package webkit2gtk before version 2.12.4-1 is vulnerable to multiple
issues.

Resolution
==========

Upgrade to 2.12.4-1.

# pacman -Syu "webkit2gtk>=2.12.4-1"

The problems have been fixed upstream in version 2.12.4.

Workaround
==========

None.

Description
===========

- CVE-2016-4590 (same-origin policy bypass)

xisigr of Tencent’s Xuanwu Lab discovered a vulnerability in the way
webkit handles URLs, which allows remote attackers to bypass the Same
Origin Policy via a crafted web site.

- CVE-2016-4591 (arbitrary filesystem access)

ma.la of LINE Corporation discoveered a vulnerability in the way webkit
handles the location variable, which allows remote attackers to access
the local filesystem via unspecified vectors.

- CVE-2016-4622 (arbitrary code execution)

Samuel Gross working with Trend Micro’s Zero Day Initiative discovered a
vulnerability that  allows remote attackers to execute arbitrary code or
cause a denial of service (memory corruption) via a crafted web site.

- CVE-2016-4624 (arbitrary code execution)

Apple found a vulnerability that allows remote attackers to execute
arbitrary code or cause a denial of service (memory corruption) via a
crafted web site.

Impact
======

A remote attacker can execute arbitrary code, gain arbitrary filesystem
access, crash a target system or bypass same-origin policies on the
affected host.

References
==========

https://webkitgtk.org/security/WSA-2016-0005.html#CVE-2016-4591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4590
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4624

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20160901/803766a1/attachment.asc>


More information about the arch-security mailing list