Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-27851

Опубликовано: 25 сент. 2024
Источник: redhat
CVSS3: 8.8
EPSS Низкий

Описание

The issue was addressed with improved bounds checks. This issue is fixed in tvOS 17.5, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. Processing maliciously crafted web content may lead to arbitrary code execution.

A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient bounds checks, which could be exploited by attackers to execute malicious code on affected systems.

Отчет

This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users' systems just by visiting compromised websites, posing significant risks like data theft and system compromise.

Меры по смягчению последствий

Do not process or load untrusted web content with WebKitGTK. In Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp. This vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction. To mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface. Additionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6webkitgtkOut of support scope
Red Hat Enterprise Linux 7webkitgtk3Will not fix
Red Hat Enterprise Linux 7webkitgtk4Affected
Red Hat Enterprise Linux 8webkit2gtk3FixedRHSA-2024:963614.11.2024
Red Hat Enterprise Linux 8.2 Advanced Update Supportwebkit2gtk3FixedRHSA-2024:968014.11.2024
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Supportwebkit2gtk3FixedRHSA-2024:967914.11.2024
Red Hat Enterprise Linux 8.4 Telecommunications Update Servicewebkit2gtk3FixedRHSA-2024:967914.11.2024
Red Hat Enterprise Linux 8.4 Update Services for SAP Solutionswebkit2gtk3FixedRHSA-2024:967914.11.2024
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Supportwebkit2gtk3FixedRHSA-2024:965314.11.2024
Red Hat Enterprise Linux 8.6 Telecommunications Update Servicewebkit2gtk3FixedRHSA-2024:965314.11.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=2314704webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution

EPSS

Процентиль: 65%
0.00509
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 1 года назад

The issue was addressed with improved bounds checks. This issue is fixed in tvOS 17.5, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. Processing maliciously crafted web content may lead to arbitrary code execution.

CVSS3: 8.8
nvd
около 1 года назад

The issue was addressed with improved bounds checks. This issue is fixed in tvOS 17.5, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. Processing maliciously crafted web content may lead to arbitrary code execution.

CVSS3: 8.8
debian
около 1 года назад

The issue was addressed with improved bounds checks. This issue is fix ...

CVSS3: 8.8
github
около 1 года назад

The issue was addressed with improved bounds checks. This issue is fixed in tvOS 17.5, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. Processing maliciously crafted web content may lead to arbitrary code execution.

CVSS3: 8.8
fstec
около 1 года назад

Уязвимость модулей отображения веб-страниц WPE WebKit и WebKitGTK, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 65%
0.00509
Низкий

8.8 High

CVSS3