Risk | Critical |
Patch available | YES |
Number of vulnerabilities | 9 |
CVE-ID | CVE-2022-46698 CVE-2022-42863 CVE-2022-46699 CVE-2022-46700 CVE-2022-42852 CVE-2022-46692 CVE-2022-46691 CVE-2022-42867 CVE-2022-42856 |
CWE-ID | CWE-200 CWE-119 CWE-125 CWE-254 CWE-843 |
Exploitation vector | Network |
Public exploit | Vulnerability #9 is being exploited in the wild. |
Vulnerable software Subscribe |
WebKitGTK+ Server applications / Frameworks for developing and running applications WPE WebKit Server applications / Frameworks for developing and running applications |
Vendor |
WebKitGTK WPE WebKit |
This security bulletin contains information about 9 vulnerabilities.
EUVDB-ID: #VU70243
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2022-46698
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output in WebKit. A remote attacker can gain unauthorized access to sensitive information on the system.
MitigationInstall update from vendor's website.
Vulnerable software versionsWebKitGTK+: 2.3.1a - 2.38.2
WPE WebKit: 2.30.0 - 2.38.2
http://support.apple.com/en-us/HT213532
http://webkitgtk.org/security/WSA-2022-0011.html
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70242
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-42863
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in WebKit when processing HTML content. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsWebKitGTK+: 2.37.1 - 2.37.91
WPE WebKit: 2.37.1 - 2.37.91
http://support.apple.com/en-us/HT213532
http://webkitgtk.org/security/WSA-2022-0011.html
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70241
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-46699
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in WebKit when processing HTML content. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsWebKitGTK+: 2.3.1a - 2.38.2
WPE WebKit: 2.30.0 - 2.38.2
http://support.apple.com/en-us/HT213532
http://webkitgtk.org/security/WSA-2022-0011.html
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70240
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-46700
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in WebKit when processing HTML content. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsWebKitGTK+: 2.3.1a - 2.38.2
WPE WebKit: 2.30.0 - 2.38.2
http://support.apple.com/en-us/HT213532
http://webkitgtk.org/security/WSA-2022-0011.html
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70238
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2022-42852
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in WebKit. A remote attacker can trick the victim to visit a specially crafted web page, trigger an out-of-bounds read error and read contents of memory on the system.
MitigationInstall update from vendor's website.
Vulnerable software versionsWebKitGTK+: 2.3.1a - 2.38.2
WPE WebKit: 2.30.0 - 2.38.2
http://support.apple.com/en-us/HT213532
http://webkitgtk.org/security/WSA-2022-0011.html
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70236
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2022-46692
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to a logic issue in WebKit. A remote attacker can trick the victim to visit a specially crafted web page and bypass Same Origin Policy.
MitigationInstall update from vendor's website.
Vulnerable software versionsWebKitGTK+: 2.3.1a - 2.38.2
WPE WebKit: 2.30.0 - 2.38.2
http://support.apple.com/en-us/HT213532
http://webkitgtk.org/security/WSA-2022-0011.html
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70235
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-46691
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in WebKit when processing HTML content. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
MitigationInstall update from vendor's website.
Vulnerable software versionsWebKitGTK+: 2.3.1a - 2.38.0
WPE WebKit: 2.30.0 - 2.38.0
http://support.apple.com/en-us/HT213532
http://webkitgtk.org/security/WSA-2022-0011.html
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70234
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-42867
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in WebKit when processing HTML content. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsWebKitGTK+: 2.3.1a - 2.38.2
WPE WebKit: 2.30.0 - 2.38.2
http://support.apple.com/en-us/HT213532
http://webkitgtk.org/security/WSA-2022-0011.html
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70195
Risk: Critical
CVSSv3.1:
CVE-ID: CVE-2022-42856
CWE-ID:
CWE-843 - Access of Resource Using Incompatible Type ('Type Confusion')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a type confusion error in WebKit. A remote attacker can trick the victim to visit a specially crafted website, trigger a type confusion error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Note, the vulnerability is being actively exploited in the wild.
Install update from vendor's website.
Vulnerable software versionsWPE WebKit: 2.30.0 - 2.38.2
WebKitGTK+: 2.3.1a - 2.38.2
http://webkitgtk.org/security/WSA-2022-0011.html
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?