Use-after-free in mozjs68 (Alpine package)



Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2020-12387
CWE-ID CWE-416
Exploitation vector Network
Public exploit N/A
Vulnerable software
mozjs68 (Alpine package)
Operating systems & Components / Operating system package or component

Vendor Alpine Linux Development Team

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Use-after-free

EUVDB-ID: #VU27529

Risk: High

CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2020-12387

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error caused by the race condition when running shutdown code for Web Worker. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger a use-after-free error and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

mozjs68 (Alpine package): 68.7.0-r1 - 68.8.0-r0

CPE2.3 External links

https://git.alpinelinux.org/aports/commit/?id=aadba671901181be240a1d151a9f3a04f2ce3ca5
https://git.alpinelinux.org/aports/commit/?id=37e37d549603b29c55fafcde8f3732cfb9db1640
https://git.alpinelinux.org/aports/commit/?id=5d9ca1b5fa041ac0d09e2bd2038f505e06c7d7f5
https://git.alpinelinux.org/aports/commit/?id=8dc0bf1501171d97e4b280f12987e24bf3cc53f7
https://git.alpinelinux.org/aports/commit/?id=174183ffc582462ae8eaf468da032a6642e140c4
https://git.alpinelinux.org/aports/commit/?id=397c40a2e03948882e67f7fb7053d46e6dda50d3
https://git.alpinelinux.org/aports/commit/?id=4b76c8208fa0c29e289d14baf509b417f7c96a08
https://git.alpinelinux.org/aports/commit/?id=c9413fd0912a1f1e6cdc9e5fd25d15f4f22cc11a
https://git.alpinelinux.org/aports/commit/?id=1aeb9d76f321c652de13c181f2775af18eb8c42d


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###