Vulnerabilities > CVE-2012-5112 - Resource Management Errors vulnerability in multiple products

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

Use-after-free vulnerability in the SVG implementation in WebKit, as used in Google Chrome before 22.0.1229.94, allows remote attackers to execute arbitrary code via unspecified vectors.

Vulnerable Configurations

Part Description Count
Application
Google
2460
OS
Apple
1

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201210-07.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201210-07 (Chromium: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Chromium. Please review the CVE identifiers and release notes referenced below for details. Impact : A remote attacker could entice a user to open a specially crafted web site using Chromium, possibly resulting in the execution of arbitrary code with the privileges of the process, arbitrary file write, a Denial of Service condition, Cross-Site Scripting in SSL interstitial and various Universal Cross-Site Scripting attacks. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id62652
    published2012-10-22
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/62652
    titleGLSA-201210-07 : Chromium: Multiple vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Gentoo Linux Security Advisory GLSA 201210-07.
    #
    # The advisory text is Copyright (C) 2001-2019 Gentoo Foundation, Inc.
    # and licensed under the Creative Commons - Attribution / Share Alike 
    # license. See http://creativecommons.org/licenses/by-sa/3.0/
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(62652);
      script_version("1.9");
      script_cvs_date("Date: 2019/11/12");
    
      script_cve_id("CVE-2012-2859", "CVE-2012-2860", "CVE-2012-2865", "CVE-2012-2866", "CVE-2012-2867", "CVE-2012-2868", "CVE-2012-2869", "CVE-2012-2872", "CVE-2012-2874", "CVE-2012-2876", "CVE-2012-2877", "CVE-2012-2878", "CVE-2012-2879", "CVE-2012-2880", "CVE-2012-2881", "CVE-2012-2882", "CVE-2012-2883", "CVE-2012-2884", "CVE-2012-2885", "CVE-2012-2886", "CVE-2012-2887", "CVE-2012-2888", "CVE-2012-2889", "CVE-2012-2891", "CVE-2012-2892", "CVE-2012-2894", "CVE-2012-2896", "CVE-2012-2900", "CVE-2012-5108", "CVE-2012-5110", "CVE-2012-5111", "CVE-2012-5112", "CVE-2012-5376");
      script_bugtraq_id(54749, 55331, 55676, 55830, 55867);
      script_xref(name:"GLSA", value:"201210-07");
    
      script_name(english:"GLSA-201210-07 : Chromium: Multiple vulnerabilities");
      script_summary(english:"Checks for updated package(s) in /var/db/pkg");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Gentoo host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The remote host is affected by the vulnerability described in GLSA-201210-07
    (Chromium: Multiple vulnerabilities)
    
        Multiple vulnerabilities have been discovered in Chromium. Please review
          the CVE identifiers and release notes referenced below for details.
      
    Impact :
    
        A remote attacker could entice a user to open a specially crafted web
          site using Chromium, possibly resulting in the execution of arbitrary
          code with the privileges of the process, arbitrary file write, a Denial
          of Service condition, Cross-Site Scripting in SSL interstitial and
          various Universal Cross-Site Scripting attacks.
      
    Workaround :
    
        There is no known workaround at this time."
      );
      # https://googlechromereleases.blogspot.com/2012/08/stable-channel-update_30.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?33992dc2"
      );
      # https://googlechromereleases.blogspot.com/2012/09/stable-channel-update_25.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?d441b099"
      );
      # https://googlechromereleases.blogspot.com/2012/10/stable-channel-update.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?e31d78d1"
      );
      # https://googlechromereleases.blogspot.com/2012/10/stable-channel-update_6105.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?359ba3a4"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security.gentoo.org/glsa/201210-07"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "All Chromium users should upgrade to the latest version:
          # emerge --sync
          # emerge --ask --oneshot --verbose
          '>=www-client/chromium-22.0.1229.94'"
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:chromium");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2012/08/06");
      script_set_attribute(attribute:"patch_publication_date", value:"2012/10/21");
      script_set_attribute(attribute:"plugin_publication_date", value:"2012/10/22");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Gentoo Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("qpkg.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
    if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (qpkg_check(package:"www-client/chromium", unaffected:make_list("ge 22.0.1229.94"), vulnerable:make_list("lt 22.0.1229.94"))) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = qpkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Chromium");
    }
    
  • NASL familyWindows
    NASL idITUNES_11_0_3.NASL
    descriptionThe version of Apple iTunes installed on the remote Windows host is older than 11.0.3. It therefore is potentially affected by several issues : - An error exists related to certificate validation that could allow disclosure of sensitive information and could allow the application to trust data from untrusted sources. (CVE-2013-1014) - The included version of WebKit contains several errors that could lead to memory corruption and possibly arbitrary code execution. The vendor notes one possible attack vector is a man-in-the-middle attack while the application browses the
    last seen2020-06-01
    modified2020-06-02
    plugin id66498
    published2013-05-17
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/66498
    titleApple iTunes < 11.0.3 Multiple Vulnerabilities (credentialed check)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(66498);
      script_version("1.14");
      script_cvs_date("Date: 2019/11/27");
    
      script_cve_id(
        "CVE-2012-2824",
        "CVE-2012-2857",
        "CVE-2012-3748",
        "CVE-2012-5112",
        "CVE-2013-0879",
        "CVE-2013-0912",
        "CVE-2013-0948",
        "CVE-2013-0949",
        "CVE-2013-0950",
        "CVE-2013-0951",
        "CVE-2013-0952",
        "CVE-2013-0953",
        "CVE-2013-0954",
        "CVE-2013-0955",
        "CVE-2013-0956",
        "CVE-2013-0958",
        "CVE-2013-0959",
        "CVE-2013-0960",
        "CVE-2013-0961",
        "CVE-2013-0991",
        "CVE-2013-0992",
        "CVE-2013-0993",
        "CVE-2013-0994",
        "CVE-2013-0995",
        "CVE-2013-0996",
        "CVE-2013-0997",
        "CVE-2013-0998",
        "CVE-2013-0999",
        "CVE-2013-1000",
        "CVE-2013-1001",
        "CVE-2013-1002",
        "CVE-2013-1003",
        "CVE-2013-1004",
        "CVE-2013-1005",
        "CVE-2013-1006",
        "CVE-2013-1007",
        "CVE-2013-1008",
        "CVE-2013-1010",
        "CVE-2013-1011",
        "CVE-2013-1014"
      );
      script_bugtraq_id(
        54203,
        54749,
        55867,
        56362,
        57576,
        57580,
        57581,
        57582,
        57584,
        57585,
        57586,
        57587,
        57588,
        57589,
        57590,
        58388,
        58495,
        58496,
        59941,
        59944,
        59953,
        59954,
        59955,
        59956,
        59957,
        59958,
        59959,
        59960,
        59963,
        59964,
        59965,
        59967,
        59970,
        59971,
        59972,
        59973,
        59974,
        59976,
        59977
      );
      script_xref(name:"EDB-ID", value:"28081");
    
      script_name(english:"Apple iTunes < 11.0.3 Multiple Vulnerabilities (credentialed check)");
      script_summary(english:"Checks version of iTunes on Windows");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote host contains an application that has multiple
    vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The version of Apple iTunes installed on the remote Windows host is
    older than 11.0.3.  It therefore is potentially affected by several
    issues :
    
      - An error exists related to certificate validation
        that could allow disclosure of sensitive information
        and could allow the application to trust data from
        untrusted sources. (CVE-2013-1014)
    
      - The included version of WebKit contains several errors
        that could lead to memory corruption and possibly
        arbitrary code execution. The vendor notes one possible
        attack vector is a man-in-the-middle attack while the
        application browses the 'iTunes Store'.
        (CVE-2012-2824, CVE-2012-2857, CVE-2012-3748,
        CVE-2012-5112, CVE-2013-0879, CVE-2013-0912,
        CVE-2013-0948, CVE-2013-0949, CVE-2013-0950,
        CVE-2013-0951, CVE-2013-0952, CVE-2013-0953,
        CVE-2013-0954, CVE-2013-0955, CVE-2013-0956,
        CVE-2013-0958, CVE-2013-0959, CVE-2013-0960,
        CVE-2013-0961, CVE-2013-0991, CVE-2013-0992,
        CVE-2013-0993, CVE-2013-0994, CVE-2013-0995,
        CVE-2013-0996, CVE-2013-0997, CVE-2013-0998,
        CVE-2013-0999, CVE-2013-1000, CVE-2013-1001,
        CVE-2013-1002, CVE-2013-1003, CVE-2013-1004,
        CVE-2013-1005, CVE-2013-1006, CVE-2013-1007,
        CVE-2013-1008, CVE-2013-1010, CVE-2013-1011)");
      script_set_attribute(attribute:"see_also", value:"http://www.zerodayinitiative.com/advisories/ZDI-13-107/");
      script_set_attribute(attribute:"see_also", value:"http://www.zerodayinitiative.com/advisories/ZDI-13-108/");
      script_set_attribute(attribute:"see_also", value:"http://www.zerodayinitiative.com/advisories/ZDI-13-109/");
      script_set_attribute(attribute:"see_also", value:"http://support.apple.com/kb/HT5766");
      script_set_attribute(attribute:"see_also", value:"http://lists.apple.com/archives/security-announce/2013/May/msg00000.html");
      script_set_attribute(attribute:"see_also", value:"http://www.securityfocus.com/archive/1/526623/30/0/threaded");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to Apple iTunes 11.0.3 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2012-5112");
    
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/05/16");
      script_set_attribute(attribute:"patch_publication_date", value:"2013/05/16");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/05/17");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:apple:itunes");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows");
    
      script_copyright(english:"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("itunes_detect.nasl");
      script_require_keys("SMB/iTunes/Version");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    
    
    version = get_kb_item_or_exit("SMB/iTunes/Version");
    fixed_version = "11.0.3.42";
    path = get_kb_item_or_exit("SMB/iTunes/Path");
    
    if (ver_compare(ver:version, fix:fixed_version) == -1)
    {
      port = get_kb_item("SMB/transport");
      if (!port) port = 445;
    
      if (report_verbosity > 0)
      {
        report =
          '\n  Path              : '+path+
          '\n  Installed version : '+version+
          '\n  Fixed version     : '+fixed_version+'\n';
        security_hole(port:port, extra:report);
      }
      else security_hole(port);
    }
    else audit(AUDIT_INST_PATH_NOT_VULN, "iTunes", version, path);
    
  • NASL familyWindows
    NASL idGOOGLE_CHROME_22_0_1229_94.NASL
    descriptionThe version of Google Chrome installed on the remote host is earlier than 22.0.1229.94 and is, therefore, affected by the following vulnerabilities : - A use-after-free error exists related to SVG handling that can be used to exploit the renderer process. (Issue #154983) - An unspecified error exists related to IPC handling that can allow an attacker to escape the application sandbox. (Issue #154987) Successful exploitation of any of these issues could lead to an application crash or even allow arbitrary code execution, subject to the user
    last seen2020-06-01
    modified2020-06-02
    plugin id62519
    published2012-10-12
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/62519
    titleGoogle Chrome < 22.0.1229.94 Multiple Vulnerabilities
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_SAFARI6_0_2.NASL
    descriptionThe version of Apple Safari installed on the remote Mac OS X host is earlier than 6.0.2. It is, therefore, potentially affected by several issues : - A time-of-check-to-time-of-use issue in the handling of JavaScript array in WebKit could lead to arbitrary, remote code execution. (CVE-2012-3748) - A use-after-free issue in the handling of SVG images in WebKit code could lead to arbitrary, remote code execution. (CVE-2012-5112)
    last seen2020-06-01
    modified2020-06-02
    plugin id62802
    published2012-11-02
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/62802
    titleMac OS X : Apple Safari < 6.0.2 Multiple Vulnerabilities
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2012-20125.NASL
    descriptionWhat
    last seen2020-03-17
    modified2013-01-14
    plugin id63491
    published2013-01-14
    reporterThis script is Copyright (C) 2013-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/63491
    titleFedora 18 : webkitgtk-1.10.2-1.fc18 / webkitgtk3-1.10.2-1.fc18 (2012-20125)
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_09E83F7F132611E2AFE300262D5ED8EE.NASL
    descriptionGoogle Chrome Releases reports : [154983][154987] Critical CVE-2012-5112: SVG use-after-free and IPC arbitrary file write. Credit to Pinkie Pie.
    last seen2020-06-01
    modified2020-06-02
    plugin id62488
    published2012-10-11
    reporterThis script is Copyright (C) 2012-2013 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/62488
    titleFreeBSD : chromium -- multiple vulnerabilities (09e83f7f-1326-11e2-afe3-00262d5ed8ee)
  • NASL familyPeer-To-Peer File Sharing
    NASL idITUNES_11_0_3_BANNER.NASL
    descriptionThe version of Apple iTunes on the remote host is prior to version 11.0.3. It is, therefore, affected by multiple vulnerabilities : - An error exists related to certificate validation. A man-in-the-middle attacker can exploit this to spoof HTTPS servers, which allows the disclosure of sensitive information or the application to trust data from untrusted sources. Note that this issue affects the application regardless of the operating system. (CVE-2013-1014) - The version of WebKit included in iTunes contains several errors that can lead to memory corruption and arbitrary code execution. The vendor states that one possible vector is a man-in-the-middle attack while the application browses the
    last seen2020-06-01
    modified2020-06-02
    plugin id66499
    published2013-05-17
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/66499
    titleApple iTunes < 11.0.3 Multiple Vulnerabilities (uncredentialed check)

Oval

accepted2013-08-12T04:07:38.942-04:00
classvulnerability
contributors
  • nameShane Shaffer
    organizationG2, Inc.
  • nameMaria Kedovskaya
    organizationALTX-SOFT
definition_extensions
commentGoogle Chrome is installed
ovaloval:org.mitre.oval:def:11914
descriptionUse-after-free vulnerability in the SVG implementation in WebKit, as used in Google Chrome before 22.0.1229.94, allows remote attackers to execute arbitrary code via unspecified vectors.
familywindows
idoval:org.mitre.oval:def:15523
statusaccepted
submitted2012-10-11T14:00:26.230-04:00
titleUse-after-free vulnerability in the SVG implementation in WebKit, as used in Google Chrome before 22.0.1229.94
version42