The UNIX IPC layer in WebKit, including WebKitGTK+ prior to 2.16.3, does not properly validate message size metadata, allowing a compromised secondary process to trigger an integer overflow and subsequent buffer overflow in the UI process. This vulnerability does not affect Apple products.
References
Link | Resource |
---|---|
http://trac.webkit.org/changeset/217126/webkit | Patch |
https://webkitgtk.org/security/WSA-2017-0007.html | Vendor Advisory |
http://trac.webkit.org/changeset/217126/webkit | Patch |
Configurations
History
21 Nov 2024, 03:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://trac.webkit.org/changeset/217126/webkit - Patch |
15 Feb 2024, 21:22
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) http://trac.webkit.org/changeset/217126/webkit - Patch |
Information
Published : 2017-11-01 21:29
Updated : 2024-11-21 03:04
NVD link : CVE-2017-1000121
Mitre link : CVE-2017-1000121
CVE.ORG link : CVE-2017-1000121
JSON object : View
Products Affected
webkitgtk
- webkitgtk\+
CWE
CWE-190
Integer Overflow or Wraparound