Vulnerabilities > CVE-2012-5112 - Resource Management Errors vulnerability in multiple products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Use-after-free vulnerability in the SVG implementation in WebKit, as used in Google Chrome before 22.0.1229.94, allows remote attackers to execute arbitrary code via unspecified vectors.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-201210-07.NASL description The remote host is affected by the vulnerability described in GLSA-201210-07 (Chromium: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Chromium. Please review the CVE identifiers and release notes referenced below for details. Impact : A remote attacker could entice a user to open a specially crafted web site using Chromium, possibly resulting in the execution of arbitrary code with the privileges of the process, arbitrary file write, a Denial of Service condition, Cross-Site Scripting in SSL interstitial and various Universal Cross-Site Scripting attacks. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 62652 published 2012-10-22 reporter This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/62652 title GLSA-201210-07 : Chromium: Multiple vulnerabilities code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Gentoo Linux Security Advisory GLSA 201210-07. # # The advisory text is Copyright (C) 2001-2019 Gentoo Foundation, Inc. # and licensed under the Creative Commons - Attribution / Share Alike # license. See http://creativecommons.org/licenses/by-sa/3.0/ # include("compat.inc"); if (description) { script_id(62652); script_version("1.9"); script_cvs_date("Date: 2019/11/12"); script_cve_id("CVE-2012-2859", "CVE-2012-2860", "CVE-2012-2865", "CVE-2012-2866", "CVE-2012-2867", "CVE-2012-2868", "CVE-2012-2869", "CVE-2012-2872", "CVE-2012-2874", "CVE-2012-2876", "CVE-2012-2877", "CVE-2012-2878", "CVE-2012-2879", "CVE-2012-2880", "CVE-2012-2881", "CVE-2012-2882", "CVE-2012-2883", "CVE-2012-2884", "CVE-2012-2885", "CVE-2012-2886", "CVE-2012-2887", "CVE-2012-2888", "CVE-2012-2889", "CVE-2012-2891", "CVE-2012-2892", "CVE-2012-2894", "CVE-2012-2896", "CVE-2012-2900", "CVE-2012-5108", "CVE-2012-5110", "CVE-2012-5111", "CVE-2012-5112", "CVE-2012-5376"); script_bugtraq_id(54749, 55331, 55676, 55830, 55867); script_xref(name:"GLSA", value:"201210-07"); script_name(english:"GLSA-201210-07 : Chromium: Multiple vulnerabilities"); script_summary(english:"Checks for updated package(s) in /var/db/pkg"); script_set_attribute( attribute:"synopsis", value: "The remote Gentoo host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "The remote host is affected by the vulnerability described in GLSA-201210-07 (Chromium: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Chromium. Please review the CVE identifiers and release notes referenced below for details. Impact : A remote attacker could entice a user to open a specially crafted web site using Chromium, possibly resulting in the execution of arbitrary code with the privileges of the process, arbitrary file write, a Denial of Service condition, Cross-Site Scripting in SSL interstitial and various Universal Cross-Site Scripting attacks. Workaround : There is no known workaround at this time." ); # https://googlechromereleases.blogspot.com/2012/08/stable-channel-update_30.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?33992dc2" ); # https://googlechromereleases.blogspot.com/2012/09/stable-channel-update_25.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?d441b099" ); # https://googlechromereleases.blogspot.com/2012/10/stable-channel-update.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?e31d78d1" ); # https://googlechromereleases.blogspot.com/2012/10/stable-channel-update_6105.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?359ba3a4" ); script_set_attribute( attribute:"see_also", value:"https://security.gentoo.org/glsa/201210-07" ); script_set_attribute( attribute:"solution", value: "All Chromium users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose '>=www-client/chromium-22.0.1229.94'" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:chromium"); script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux"); script_set_attribute(attribute:"vuln_publication_date", value:"2012/08/06"); script_set_attribute(attribute:"patch_publication_date", value:"2012/10/21"); script_set_attribute(attribute:"plugin_publication_date", value:"2012/10/22"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Gentoo Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("qpkg.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo"); if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (qpkg_check(package:"www-client/chromium", unaffected:make_list("ge 22.0.1229.94"), vulnerable:make_list("lt 22.0.1229.94"))) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get()); else security_hole(0); exit(0); } else { tested = qpkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Chromium"); }
NASL family Windows NASL id ITUNES_11_0_3.NASL description The version of Apple iTunes installed on the remote Windows host is older than 11.0.3. It therefore is potentially affected by several issues : - An error exists related to certificate validation that could allow disclosure of sensitive information and could allow the application to trust data from untrusted sources. (CVE-2013-1014) - The included version of WebKit contains several errors that could lead to memory corruption and possibly arbitrary code execution. The vendor notes one possible attack vector is a man-in-the-middle attack while the application browses the last seen 2020-06-01 modified 2020-06-02 plugin id 66498 published 2013-05-17 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/66498 title Apple iTunes < 11.0.3 Multiple Vulnerabilities (credentialed check) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(66498); script_version("1.14"); script_cvs_date("Date: 2019/11/27"); script_cve_id( "CVE-2012-2824", "CVE-2012-2857", "CVE-2012-3748", "CVE-2012-5112", "CVE-2013-0879", "CVE-2013-0912", "CVE-2013-0948", "CVE-2013-0949", "CVE-2013-0950", "CVE-2013-0951", "CVE-2013-0952", "CVE-2013-0953", "CVE-2013-0954", "CVE-2013-0955", "CVE-2013-0956", "CVE-2013-0958", "CVE-2013-0959", "CVE-2013-0960", "CVE-2013-0961", "CVE-2013-0991", "CVE-2013-0992", "CVE-2013-0993", "CVE-2013-0994", "CVE-2013-0995", "CVE-2013-0996", "CVE-2013-0997", "CVE-2013-0998", "CVE-2013-0999", "CVE-2013-1000", "CVE-2013-1001", "CVE-2013-1002", "CVE-2013-1003", "CVE-2013-1004", "CVE-2013-1005", "CVE-2013-1006", "CVE-2013-1007", "CVE-2013-1008", "CVE-2013-1010", "CVE-2013-1011", "CVE-2013-1014" ); script_bugtraq_id( 54203, 54749, 55867, 56362, 57576, 57580, 57581, 57582, 57584, 57585, 57586, 57587, 57588, 57589, 57590, 58388, 58495, 58496, 59941, 59944, 59953, 59954, 59955, 59956, 59957, 59958, 59959, 59960, 59963, 59964, 59965, 59967, 59970, 59971, 59972, 59973, 59974, 59976, 59977 ); script_xref(name:"EDB-ID", value:"28081"); script_name(english:"Apple iTunes < 11.0.3 Multiple Vulnerabilities (credentialed check)"); script_summary(english:"Checks version of iTunes on Windows"); script_set_attribute(attribute:"synopsis", value: "The remote host contains an application that has multiple vulnerabilities."); script_set_attribute(attribute:"description", value: "The version of Apple iTunes installed on the remote Windows host is older than 11.0.3. It therefore is potentially affected by several issues : - An error exists related to certificate validation that could allow disclosure of sensitive information and could allow the application to trust data from untrusted sources. (CVE-2013-1014) - The included version of WebKit contains several errors that could lead to memory corruption and possibly arbitrary code execution. The vendor notes one possible attack vector is a man-in-the-middle attack while the application browses the 'iTunes Store'. (CVE-2012-2824, CVE-2012-2857, CVE-2012-3748, CVE-2012-5112, CVE-2013-0879, CVE-2013-0912, CVE-2013-0948, CVE-2013-0949, CVE-2013-0950, CVE-2013-0951, CVE-2013-0952, CVE-2013-0953, CVE-2013-0954, CVE-2013-0955, CVE-2013-0956, CVE-2013-0958, CVE-2013-0959, CVE-2013-0960, CVE-2013-0961, CVE-2013-0991, CVE-2013-0992, CVE-2013-0993, CVE-2013-0994, CVE-2013-0995, CVE-2013-0996, CVE-2013-0997, CVE-2013-0998, CVE-2013-0999, CVE-2013-1000, CVE-2013-1001, CVE-2013-1002, CVE-2013-1003, CVE-2013-1004, CVE-2013-1005, CVE-2013-1006, CVE-2013-1007, CVE-2013-1008, CVE-2013-1010, CVE-2013-1011)"); script_set_attribute(attribute:"see_also", value:"http://www.zerodayinitiative.com/advisories/ZDI-13-107/"); script_set_attribute(attribute:"see_also", value:"http://www.zerodayinitiative.com/advisories/ZDI-13-108/"); script_set_attribute(attribute:"see_also", value:"http://www.zerodayinitiative.com/advisories/ZDI-13-109/"); script_set_attribute(attribute:"see_also", value:"http://support.apple.com/kb/HT5766"); script_set_attribute(attribute:"see_also", value:"http://lists.apple.com/archives/security-announce/2013/May/msg00000.html"); script_set_attribute(attribute:"see_also", value:"http://www.securityfocus.com/archive/1/526623/30/0/threaded"); script_set_attribute(attribute:"solution", value: "Upgrade to Apple iTunes 11.0.3 or later."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2012-5112"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploited_by_malware", value:"true"); script_set_attribute(attribute:"vuln_publication_date", value:"2013/05/16"); script_set_attribute(attribute:"patch_publication_date", value:"2013/05/16"); script_set_attribute(attribute:"plugin_publication_date", value:"2013/05/17"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:apple:itunes"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Windows"); script_copyright(english:"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("itunes_detect.nasl"); script_require_keys("SMB/iTunes/Version"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); version = get_kb_item_or_exit("SMB/iTunes/Version"); fixed_version = "11.0.3.42"; path = get_kb_item_or_exit("SMB/iTunes/Path"); if (ver_compare(ver:version, fix:fixed_version) == -1) { port = get_kb_item("SMB/transport"); if (!port) port = 445; if (report_verbosity > 0) { report = '\n Path : '+path+ '\n Installed version : '+version+ '\n Fixed version : '+fixed_version+'\n'; security_hole(port:port, extra:report); } else security_hole(port); } else audit(AUDIT_INST_PATH_NOT_VULN, "iTunes", version, path);
NASL family Windows NASL id GOOGLE_CHROME_22_0_1229_94.NASL description The version of Google Chrome installed on the remote host is earlier than 22.0.1229.94 and is, therefore, affected by the following vulnerabilities : - A use-after-free error exists related to SVG handling that can be used to exploit the renderer process. (Issue #154983) - An unspecified error exists related to IPC handling that can allow an attacker to escape the application sandbox. (Issue #154987) Successful exploitation of any of these issues could lead to an application crash or even allow arbitrary code execution, subject to the user last seen 2020-06-01 modified 2020-06-02 plugin id 62519 published 2012-10-12 reporter This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/62519 title Google Chrome < 22.0.1229.94 Multiple Vulnerabilities NASL family MacOS X Local Security Checks NASL id MACOSX_SAFARI6_0_2.NASL description The version of Apple Safari installed on the remote Mac OS X host is earlier than 6.0.2. It is, therefore, potentially affected by several issues : - A time-of-check-to-time-of-use issue in the handling of JavaScript array in WebKit could lead to arbitrary, remote code execution. (CVE-2012-3748) - A use-after-free issue in the handling of SVG images in WebKit code could lead to arbitrary, remote code execution. (CVE-2012-5112) last seen 2020-06-01 modified 2020-06-02 plugin id 62802 published 2012-11-02 reporter This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/62802 title Mac OS X : Apple Safari < 6.0.2 Multiple Vulnerabilities NASL family Fedora Local Security Checks NASL id FEDORA_2012-20125.NASL description What last seen 2020-03-17 modified 2013-01-14 plugin id 63491 published 2013-01-14 reporter This script is Copyright (C) 2013-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/63491 title Fedora 18 : webkitgtk-1.10.2-1.fc18 / webkitgtk3-1.10.2-1.fc18 (2012-20125) NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_09E83F7F132611E2AFE300262D5ED8EE.NASL description Google Chrome Releases reports : [154983][154987] Critical CVE-2012-5112: SVG use-after-free and IPC arbitrary file write. Credit to Pinkie Pie. last seen 2020-06-01 modified 2020-06-02 plugin id 62488 published 2012-10-11 reporter This script is Copyright (C) 2012-2013 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/62488 title FreeBSD : chromium -- multiple vulnerabilities (09e83f7f-1326-11e2-afe3-00262d5ed8ee) NASL family Peer-To-Peer File Sharing NASL id ITUNES_11_0_3_BANNER.NASL description The version of Apple iTunes on the remote host is prior to version 11.0.3. It is, therefore, affected by multiple vulnerabilities : - An error exists related to certificate validation. A man-in-the-middle attacker can exploit this to spoof HTTPS servers, which allows the disclosure of sensitive information or the application to trust data from untrusted sources. Note that this issue affects the application regardless of the operating system. (CVE-2013-1014) - The version of WebKit included in iTunes contains several errors that can lead to memory corruption and arbitrary code execution. The vendor states that one possible vector is a man-in-the-middle attack while the application browses the last seen 2020-06-01 modified 2020-06-02 plugin id 66499 published 2013-05-17 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/66499 title Apple iTunes < 11.0.3 Multiple Vulnerabilities (uncredentialed check)
Oval
accepted | 2013-08-12T04:07:38.942-04:00 | ||||||||
class | vulnerability | ||||||||
contributors |
| ||||||||
definition_extensions |
| ||||||||
description | Use-after-free vulnerability in the SVG implementation in WebKit, as used in Google Chrome before 22.0.1229.94, allows remote attackers to execute arbitrary code via unspecified vectors. | ||||||||
family | windows | ||||||||
id | oval:org.mitre.oval:def:15523 | ||||||||
status | accepted | ||||||||
submitted | 2012-10-11T14:00:26.230-04:00 | ||||||||
title | Use-after-free vulnerability in the SVG implementation in WebKit, as used in Google Chrome before 22.0.1229.94 | ||||||||
version | 42 |
References
- http://archives.neohapsis.com/archives/bugtraq/2012-11/0012.html
- http://archives.neohapsis.com/archives/bugtraq/2012-11/0012.html
- http://archives.neohapsis.com/archives/bugtraq/2012-11/0013.html
- http://archives.neohapsis.com/archives/bugtraq/2012-11/0013.html
- http://blog.chromium.org/2012/10/pwnium-2-results-and-wrap-up_10.html
- http://blog.chromium.org/2012/10/pwnium-2-results-and-wrap-up_10.html
- http://code.google.com/p/chromium/issues/detail?id=154983
- http://code.google.com/p/chromium/issues/detail?id=154983
- http://code.google.com/p/chromium/issues/detail?id=154987
- http://code.google.com/p/chromium/issues/detail?id=154987
- http://googlechromereleases.blogspot.com/2012/10/stable-channel-update_6105.html
- http://googlechromereleases.blogspot.com/2012/10/stable-channel-update_6105.html
- http://lists.apple.com/archives/security-announce/2012/Nov/msg00000.html
- http://lists.apple.com/archives/security-announce/2012/Nov/msg00000.html
- http://lists.apple.com/archives/security-announce/2012/Nov/msg00001.html
- http://lists.apple.com/archives/security-announce/2012/Nov/msg00001.html
- http://osvdb.org/86149
- http://osvdb.org/86149
- http://secunia.com/advisories/50954
- http://secunia.com/advisories/50954
- http://support.apple.com/kb/HT5567
- http://support.apple.com/kb/HT5567
- http://support.apple.com/kb/HT5568
- http://support.apple.com/kb/HT5568
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15523
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15523