-
Date Reported: July 23, 2021
-
Advisory ID: WSA-2021-0004
-
CVE identifiers: CVE-2021-1817, CVE-2021-1820, CVE-2021-1825, CVE-2021-1826, CVE-2021-21775, CVE-2021-21779, CVE-2021-21806, CVE-2021-30661, CVE-2021-30663, CVE-2021-30665, CVE-2021-30666, CVE-2021-30682, CVE-2021-30689, CVE-2021-30720, CVE-2021-30734, CVE-2021-30744, CVE-2021-30749, CVE-2021-30758, CVE-2021-30761, CVE-2021-30762, CVE-2021-30795, CVE-2021-30797, CVE-2021-30799.
Several vulnerabilities were discovered in WebKitGTK and WPE WebKit.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.30.0.
- Credit to zhunki.
- Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Description: A memory corruption issue was addressed with improved state management.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.30.0.
- Credit to André Bargull.
- Impact: Processing maliciously crafted web content may result in the disclosure of process memory. Description: A memory initialization issue was addressed with improved memory handling.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.30.0.
- Credit to Alex Camboe of Aon’s Cyber Solutions.
- Impact: Processing maliciously crafted web content may lead to a cross site scripting attack. Description: An input validation issue was addressed with improved input validation.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.30.0.
- Credit to an anonymous researcher.
- Impact: Processing maliciously crafted web content may lead to universal cross site scripting. Description: A logic issue was addressed with improved restrictions.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.32.3.
- Credit to Marcin Towalski of Cisco Talos.
- A use-after-free vulnerability exists in the way certain events are processed for ImageLoader objects of WebKit. A specially crafted web page can lead to a potential information leak and further memory corruption. In order to trigger the vulnerability, a victim must be tricked into visiting a malicious webpage.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.32.3.
- Credit to Marcin Towalski of Cisco Talos.
- A use-after-free vulnerability exists in the way that WebKit GraphicsContext handles certain events. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.30.6.
- Credit to Marcin ‘Icewall’ Noga of Cisco Talos.
- An exploitable use-after-free vulnerability exists in WebKit. A specially crafted HTML web page can cause a use-after-free condition, resulting in remote code execution. The victim needs to visit a malicious web site to trigger the vulnerability.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.30.0.
- Credit to yangkang(@dnpushme) of 360 ATA.
- Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. Description: A use after free issue was addressed with improved memory management.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.32.3.
- Credit to an anonymous researcher.
- Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Description: An integer overflow was addressed with improved input validation.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.32.3.
- Credit to yangkang (@dnpushme)&zerokeeper&bianliang of 360 ATA.
- Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. Description: A memory corruption issue was addressed with improved state management.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.26.0.
- Credit to yangkang (@dnpushme)&zerokeeper&bianliang of 360 ATA.
- Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. Description: A buffer overflow issue was addressed with improved memory handling.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.32.0.
- Credit to an anonymous researcher and 1lastBr3ath.
- Impact: A malicious application may be able to leak sensitive user information. Description: A logic issue was addressed with improved restrictions.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.32.3.
- Credit to an anonymous researcher.
- Impact: Processing maliciously crafted web content may lead to universal cross site scripting. Description: A logic issue was addressed with improved state management.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.32.3.
- Credit to David Schütz (@xdavidhu).
- Impact: A malicious website may be able to access restricted ports on arbitrary servers. Description: A logic issue was addressed with improved restrictions.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.32.3.
- Credit to Jack Dates of RET2 Systems, Inc. (@ret2systems) working with Trend Micro Zero Day Initiative.
- Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Description: Multiple memory corruption issues were addressed with improved memory handling.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.32.3.
- Credit to Dan Hite of jsontop.
- Impact: Processing maliciously crafted web content may lead to universal cross site scripting. Description: A cross-origin issue with iframe elements was addressed with improved tracking of security origins.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.32.3.
- Credit to an anonymous researcher and mipu94 of SEFCOM lab, ASU. working with Trend Micro Zero Day Initiative.
- Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Description: Multiple memory corruption issues were addressed with improved memory handling.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.32.2.
- Credit to Christoph Guttandin of Media Codings.
- Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Description: A type confusion issue was addressed with improved state handling.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.26.0.
- Credit to an anonymous researcher.
- Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. Description: A memory corruption issue was addressed with improved state management.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.28.0.
- Credit to an anonymous researcher.
- Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. Description: A use after free issue was addressed with improved memory management.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.32.3.
- Credit to Sergei Glazunov of Google Project Zero.
- Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Description: A use after free issue was addressed with improved memory management.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.32.3.
- Credit to Ivan Fratric of Google Project Zero.
- Impact: Processing maliciously crafted web content may lead to code execution. Description: This issue was addressed with improved checks.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.32.3.
- Credit to Sergei Glazunov of Google Project Zero.
- Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Description: Multiple memory corruption issues were addressed with improved memory handling.
We recommend updating to the latest stable versions of WebKitGTK and WPE WebKit. It is the best way to ensure that you are running safe versions of WebKit. Please check our websites for information about the latest stable releases.
Further information about WebKitGTK and WPE WebKit security advisories can be found at: https://webkitgtk.org/security.html or https://wpewebkit.org/security/.