Multiple vulnerabilities in WebKitGTK and WPE WebKit



Published: 2022-07-29 | Updated: 2022-08-19
Risk Critical
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2022-32792
CVE-2022-32816
CVE-2022-2294
CWE-ID CWE-787
CWE-451
CWE-122
Exploitation vector Network
Public exploit Vulnerability #3 is being exploited in the wild.
Vulnerable software
Subscribe
WebKitGTK+
Server applications / Frameworks for developing and running applications

WPE WebKit
Server applications / Frameworks for developing and running applications

Vendor WebKitGTK
WPE WebKit

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Out-of-bounds write

EUVDB-ID: #VU65621

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-32792

CWE-ID: CWE-787 - Out-of-bounds Write

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input within the B3 JIT compiler in WebKit. A remote attacker can trick the victim into opening a specially crafted webpage, trigger an out-of-bounds write and execute arbitrary code on the target system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

WebKitGTK+: 2.36.0 - 2.36.4

WPE WebKit: 2.36.0 - 2.36.4


CPE2.3 External links

http://webkitgtk.org/security/WSA-2022-0007.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

2) Spoofing attack

EUVDB-ID: #VU65620

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2022-32816

CWE-ID: CWE-451 - User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to incorrect processing of user-supplied data in WebKit. A remote attacker can spoof page content.

Mitigation

Install update from vendor's website.

Vulnerable software versions

WebKitGTK+: 2.36.0 - 2.36.4

WPE WebKit: 2.36.0 - 2.36.4


CPE2.3 External links

http://webkitgtk.org/security/WSA-2022-0007.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

3) Heap-based buffer overflow

EUVDB-ID: #VU64910

Risk: Critical

CVSSv3.1:

CVE-ID: CVE-2022-2294

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within WebRTC implementation. A remote attacker can trick the victim ti visit a specially crafted website, trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Note, the vulnerability is being actively exploited in the wild.

Mitigation

Install update from vendor's website.

Vulnerable software versions

WebKitGTK+: 2.36.0 - 2.36.4

WPE WebKit: 2.36.0 - 2.36.4


CPE2.3 External links

http://webkitgtk.org/security/WSA-2022-0007.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###