ESB-2017.2941 - [Linux] WebKitGTK+: Multiple vulnerabilities 2017-11-16

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.2941
                November 2017 Security Fixes in WebKitGTK+
                             16 November 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           WebKitGTK+
Publisher:         WebKitGTK+
Operating System:  Linux variants
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-13803 CVE-2017-13802 CVE-2017-13798
                   CVE-2017-13796 CVE-2017-13795 CVE-2017-13794
                   CVE-2017-13793 CVE-2017-13792 CVE-2017-13791
                   CVE-2017-13788 CVE-2017-13785 CVE-2017-13784
                   CVE-2017-13783  

Reference:         ESB-2017.2773
                   ESB-2017.2772
                   ESB-2017.2771
                   ESB-2017.2770
                   ESB-2017.2768

Original Bulletin: 
   https://webkitgtk.org/security/WSA-2017-0009.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- ------------------------------------------------------------------------
WebKitGTK+ Security Advisory                               WSA-2017-0009
- ------------------------------------------------------------------------

Date reported      : November 10, 2017
Advisory ID        : WSA-2017-0009
Advisory URL       : https://webkitgtk.org/security/WSA-2017-0009.html
CVE identifiers    : CVE-2017-13783, CVE-2017-13784, CVE-2017-13785,
                     CVE-2017-13788, CVE-2017-13791, CVE-2017-13792,
                     CVE-2017-13793, CVE-2017-13794, CVE-2017-13795,
                     CVE-2017-13796, CVE-2017-13798, CVE-2017-13802,
                     CVE-2017-13803.

Several vulnerabilities were discovered in WebKitGTK+.

CVE-2017-13783
    Versions affected: WebKitGTK+ before 2.18.1.
    Credit to Ivan Fratric of Google Project Zero.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2017-13784
    Versions affected: WebKitGTK+ before 2.18.1.
    Credit to Ivan Fratric of Google Project Zero.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2017-13785
    Versions affected: WebKitGTK+ before 2.18.1.
    Credit to Ivan Fratric of Google Project Zero.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2017-13788
    Versions affected: WebKitGTK+ before 2.18.3.
    Credit to xisigr of Tencent's Xuanwu Lab (tencent.com).
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2017-13791
    Versions affected: WebKitGTK+ before 2.18.1.
    Credit to Ivan Fratric of Google Project Zero.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2017-13792
    Versions affected: WebKitGTK+ before 2.18.1.
    Credit to Ivan Fratric of Google Project Zero.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2017-13793
    Versions affected: WebKitGTK+ before 2.18.1.
    Credit to Hanul Choi working with Trend Micro's Zero Day Initiative.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2017-13794
    Versions affected: WebKitGTK+ before 2.18.1.
    Credit to Ivan Fratric of Google Project Zero.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2017-13795
    Versions affected: WebKitGTK+ before 2.18.1.
    Credit to Ivan Fratric of Google Project Zero.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2017-13796
    Versions affected: WebKitGTK+ before 2.18.1.
    Credit to Ivan Fratric of Google Project Zero.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2017-13798
    Versions affected: WebKitGTK+ before 2.18.3.
    Credit to Ivan Fratric of Google Project Zero.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2017-13802
    Versions affected: WebKitGTK+ before 2.18.1.
    Credit to Ivan Fratric of Google Project Zero.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2017-13803
    Versions affected: WebKitGTK+ before 2.18.3.
    Credit to chenqin of Ant-financial Light-Year Security.
curity.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.


We recommend updating to the last stable version of WebKitGTK+. It is
the best way of ensuring that you are running a safe version of
WebKitGTK+. Please check our website for information about the last
stable releases.

Further information about WebKitGTK+ Security Advisories can be found
at: https://webkitgtk.org/security.html

The WebKitGTK+ team,
November 10, 2017

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=pDOe
-----END PGP SIGNATURE-----

« Back to bulletins