Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2018.3878 WebKitGTK+ and WPE WebKit address RCE vulnerabilities 14 December 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: WebKitGTK+ WPE WebKit Publisher: WebKit Operating System: Linux variants Mac OS Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2018-4464 CVE-2018-4443 CVE-2018-4442 CVE-2018-4441 CVE-2018-4438 CVE-2018-4437 Reference: ESB-2018.3770 ESB-2018.3769 ESB-2018.3768 ESB-2018.3766 Original Bulletin: https://webkitgtk.org/security/WSA-2018-0009.html - --------------------------BEGIN INCLUDED TEXT-------------------- - ------------------------------------------------------------------------ WebKitGTK+ and WPE WebKit Security Advisory WSA-2018-0009 - ------------------------------------------------------------------------ Date reported : December 13, 2018 Advisory ID : WSA-2018-0009 WebKitGTK+ Advisory URL : https://webkitgtk.org/security/WSA-2018-0009.html WPE WebKit Advisory URL : https://wpewebkit.org/security/WSA-2018-0009.html CVE identifiers : CVE-2018-4437, CVE-2018-4438, CVE-2018-4441, CVE-2018-4442, CVE-2018-4443, CVE-2018-4464. Several vulnerabilities were discovered in WebKitGTK+ and WPE WebKit. CVE-2018-4437 Versions affected: WebKitGTK+ before 2.22.5 and WPE WebKit before 2.22.3. Credit to HyungSeok Han, DongHyeon Oh, and Sang Kil Cha of KAIST Softsec Lab, Korea. Processing maliciously crafted web content may lead to arbitrary code execution. Multiple memory corruption issues were addressed with improved memory handling. CVE-2018-4438 Versions affected: WebKitGTK+ before 2.22.3 and WPE WebKit before 2.22.1. Credit to lokihardt of Google Project Zero. Processing maliciously crafted web content may lead to arbitrary code execution. A logic issue existed resulting in memory corruption. This was addressed with improved state management. CVE-2018-4441 Versions affected: WebKitGTK+ before 2.22.3 and WPE WebKit before 2.22.1. Credit to lokihardt of Google Project Zero. Processing maliciously crafted web content may lead to arbitrary code execution. A memory corruption issue was addressed with improved memory handling. CVE-2018-4442 Versions affected: WebKitGTK+ before 2.22.3 and WPE WebKit before 2.22.1. Credit to lokihardt of Google Project Zero. Processing maliciously crafted web content may lead to arbitrary code execution. A memory corruption issue was addressed with improved memory handling. CVE-2018-4443 Versions affected: WebKitGTK+ before 2.22.3 and WPE WebKit before 2.22.1. Credit to lokihardt of Google Project Zero. Processing maliciously crafted web content may lead to arbitrary code execution. A memory corruption issue was addressed with improved memory handling. CVE-2018-4464 Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0. Credit to HyungSeok Han, DongHyeon Oh, and Sang Kil Cha of KAIST Softsec Lab, Korea. Processing maliciously crafted web content may lead to arbitrary code execution. Multiple memory corruption issues were addressed with improved memory handling. We recommend updating to the latest stable versions of WebKitGTK+ and WPE WebKit. It is the best way to ensure that you are running safe versions of WebKit. Please check our websites for information about the latest stable releases. Further information about WebKitGTK+ and WPE WebKit security advisories can be found at: https://webkitgtk.org/security.html or https://wpewebkit.org/security/. The WebKitGTK+ and WPE WebKit team, December 13, 2018 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXBNJU2aOgq3Tt24GAQgSXg//ZQXkUsauFc0LxMvxqRh5RfMUxfaXoQ8k EomyeY0dDtmO5W7/ueyotXjNs03TEPuPd/eUQmZe9FM6jh+HeqTW9GdueuAAnJB7 dHVxOe2SJpLkPeMHICc5GEGBGc95RADr6XINiV19bo+jgwBSlI+WomFLHGtbYp3+ /zSxRGCDQlWnKARUJKu2F4XAfAgV/aZRYG7lgqN8HX3v/v9U5l5B64LafjQCmZeR FYtilloLPajDp/tUcVgm6k8CFAUjott7VvmfvAi4ip7GsgkPZY9ZuHGwaMNASrR8 CJnuWhngcN0WyHt4+vflL5v5lu4y/Mmimy0y7Obz2ZqtwJmp+EpFL+az5qyl62YD kph+ZM8py16ehfK2FGfyUr5kGmuGV0Rz2Pi9vwZTd7Zg2o4N8qpZV58By2t1Uyny bMYz9yplOV+OgiM0Fjx9hib6PrhXOV3MT/x7Bkp2rtWv29rYGakEdFgt4zLU+Xib YTcyNB6erM/p+2Wf1P6c6MCZDg1aALAZfLDOoEAG7OnVig4gVJNdK47ZxsZQsnZ3 nwaIPVhDuSAgu/wqIN4r90iCo+YML9o+L/hvhBY2t/+smPsDkBRivkd6jrdkahpE UkbFyS4lJwKrgP6ikys886HNf6Xbi5y14tX7UdCTymeCqV5Dw1lBxoSz6kw/2JZV IMAMqVNiZ6A= =dOl5 -----END PGP SIGNATURE-----