Vulnerabilities > CVE-2016-9642 - Out-of-bounds Read vulnerability in Webkit

047910
CVSS 4.3 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
webkit
CWE-125
nessus

Summary

JavaScriptCore in WebKit allows attackers to cause a denial of service (out-of-bounds heap read) via a crafted Javascript file.

Vulnerable Configurations

Part Description Count
Application
Webkit
1

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Overread Buffers
    An adversary attacks a target by providing input that causes an application to read beyond the boundary of a defined buffer. This typically occurs when a value influencing where to start or stop reading is set to reflect positions outside of the valid memory location of the buffer. This type of attack may result in exposure of sensitive information, a system crash, or arbitrary code execution.

Nessus

  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-3257-1.NASL
    descriptionA large number of security issues were discovered in the WebKitGTK+ Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id99278
    published2017-04-11
    reporterUbuntu Security Notice (C) 2017-2019 Canonical, Inc. / NASL script (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/99278
    titleUbuntu 16.04 LTS / 16.10 : webkit2gtk vulnerabilities (USN-3257-1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Ubuntu Security Notice USN-3257-1. The text 
    # itself is copyright (C) Canonical, Inc. See 
    # <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered 
    # trademark of Canonical, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(99278);
      script_version("3.7");
      script_cvs_date("Date: 2019/09/18 12:31:46");
    
      script_cve_id("CVE-2016-9642", "CVE-2016-9643", "CVE-2017-2364", "CVE-2017-2367", "CVE-2017-2376", "CVE-2017-2377", "CVE-2017-2386", "CVE-2017-2392", "CVE-2017-2394", "CVE-2017-2395", "CVE-2017-2396", "CVE-2017-2405", "CVE-2017-2415", "CVE-2017-2419", "CVE-2017-2433", "CVE-2017-2442", "CVE-2017-2445", "CVE-2017-2446", "CVE-2017-2447", "CVE-2017-2454", "CVE-2017-2455", "CVE-2017-2457", "CVE-2017-2459", "CVE-2017-2460", "CVE-2017-2464", "CVE-2017-2465", "CVE-2017-2466", "CVE-2017-2468", "CVE-2017-2469", "CVE-2017-2470", "CVE-2017-2471", "CVE-2017-2475", "CVE-2017-2476", "CVE-2017-2481");
      script_xref(name:"USN", value:"3257-1");
    
      script_name(english:"Ubuntu 16.04 LTS / 16.10 : webkit2gtk vulnerabilities (USN-3257-1)");
      script_summary(english:"Checks dpkg output for updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Ubuntu host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "A large number of security issues were discovered in the WebKitGTK+
    Web and JavaScript engines. If a user were tricked into viewing a
    malicious website, a remote attacker could exploit a variety of issues
    related to web browser security, including cross-site scripting
    attacks, denial of service attacks, and arbitrary code execution.
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Ubuntu security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://usn.ubuntu.com/3257-1/"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Update the affected libjavascriptcoregtk-4.0-18 and / or
    libwebkit2gtk-4.0-37 packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libjavascriptcoregtk-4.0-18");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libwebkit2gtk-4.0-37");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:16.04");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:16.10");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2017/02/03");
      script_set_attribute(attribute:"patch_publication_date", value:"2017/04/10");
      script_set_attribute(attribute:"plugin_publication_date", value:"2017/04/11");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"Ubuntu Security Notice (C) 2017-2019 Canonical, Inc. / NASL script (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Ubuntu Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("ubuntu.inc");
    include("misc_func.inc");
    
    if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/Ubuntu/release");
    if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu");
    release = chomp(release);
    if (! preg(pattern:"^(16\.04|16\.10)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 16.04 / 16.10", "Ubuntu " + release);
    if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu);
    
    flag = 0;
    
    if (ubuntu_check(osver:"16.04", pkgname:"libjavascriptcoregtk-4.0-18", pkgver:"2.16.1-0ubuntu0.16.04.1")) flag++;
    if (ubuntu_check(osver:"16.04", pkgname:"libwebkit2gtk-4.0-37", pkgver:"2.16.1-0ubuntu0.16.04.1")) flag++;
    if (ubuntu_check(osver:"16.10", pkgname:"libjavascriptcoregtk-4.0-18", pkgver:"2.16.1-0ubuntu0.16.10.1")) flag++;
    if (ubuntu_check(osver:"16.10", pkgname:"libwebkit2gtk-4.0-37", pkgver:"2.16.1-0ubuntu0.16.10.1")) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_WARNING,
        extra      : ubuntu_report_get()
      );
      exit(0);
    }
    else
    {
      tested = ubuntu_pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libjavascriptcoregtk-4.0-18 / libwebkit2gtk-4.0-37");
    }
    
  • NASL familyMisc.
    NASL idAPPLETV_10_2.NASL
    descriptionAccording to its banner, the version of Apple TV on the remote device is prior to 10.2. It is, therefore, affected by multiple vulnerabilities : - An out-of-bounds read error exists in LibTIFF in the DumpModeEncode() function within file tif_dumpmode.c. An unauthenticated, remote attacker can exploit this to crash a process linked against the library or disclose memory contents. (CVE-2016-3619) - An out-of-bounds read error exists in WebKit when handling certain JavaScript code. An unauthenticated, remote attacker can exploit this to cause a denial of service condition or the disclosure of memory contents. (CVE-2016-9642) - A denial of service vulnerability exists in WebKit when handling certain regular expressions. An unauthenticated, remote attacker can exploit this, via a specially crafted web page, to exhaust available memory resources. (CVE-2016-9643) - An information disclosure vulnerability exists in WebKit when handling page loading due to improper validation of certain input. An unauthenticated, remote attacker can exploit this to disclose data cross-origin. (CVE-2017-2367) - A buffer overflow condition exists in the Carbon component when handling specially crafted DFONT files due to improper validation of certain input. An unauthenticated, remote attacker can exploit this, via a specially crafted file, to cause a denial of service condition or the execution of arbitrary code. (CVE-2017-2379) - An information disclosure vulnerability exists in WebKit when handling unspecified exceptions. An unauthenticated, remote attacker can exploit this, via specially crafted web content, to disclose data cross-origin. (CVE-2017-2386) - A flaw exists in the libarchive component due to the insecure creation of temporary files. A local attacker can exploit this, by using a symlink attack against an unspecified file, to cause unexpected changes to be made to file system permissions. (CVE-2017-2390) - Multiple memory corruption issues exist in WebKit that allow an unauthenticated, remote attacker to cause a denial of service condition or the execution of arbitrary code. (CVE-2017-2394, CVE-2017-2395, CVE-2017-2396, CVE-2017-2454, CVE-2017-2455, CVE-2017-2459, CVE-2017-2460, CVE-2017-2464, CVE-2017-2465, CVE-2017-2466, CVE-2017-2468, CVE-2017-2469, CVE-2017-2470, CVE-2017-2476) - A memory corruption issue exists in the Kernel component due to improper validation of certain input. An unauthenticated, remote attacker can exploit this, by convincing a user to run a specially crafted application, to cause a denial of service condition or the execution or arbitrary code. (CVE-2017-2401) - Multiple memory corruption issues exist in the FontParser component when handling font files due to improper validation of certain input. An unauthenticated, remote attacker can exploit these to cause a denial condition or the execution of arbitrary code. (CVE-2017-2406, CVE-2017-2407, CVE-2017-2487) - An unspecified type confusion error exists in WebKit that allows an unauthenticated, remote attacker to execute arbitrary code by using specially crafted web content. (CVE-2017-2415) - A memory corruption issue exists in the ImageIO component, specifically in the GIFReadPlugin::init() function, when handling image files due to improper validation of certain input. An unauthenticated, remote attacker can exploit this, via a specially crafted image file, to cause a denial of service condition or the execution of arbitrary code. (CVE-2017-2416) - An infinite recursion condition exists in the CoreGraphics component when handling image files. An unauthenticated, remote can exploit this, via a specially crafted image file, to cause a denial of service condition. (CVE-2017-2417) - An unspecified flaw exists related to nghttp2 and LibreSSL. An unauthenticated, remote attacker can exploit this, by convincing a user to access a malicious HTTP/2 server, to have an unspecified impact on confidentiality, integrity, and availability. (CVE-2017-2428) - A type confusion error exists in the Audio component when parsing specially crafted M4A audio files due to improper validation of certain input. An unauthenticated, remote attacker can exploit this, via a specially crafted file, to cause a denial of service condition or the execution of arbitrary code. (CVE-2017-2430) - An integer overflow condition exists in the ImageIO component when handling JPEG files due to improper validation of certain input. An unauthenticated, remote attacker can exploit this, via a specially crafted file, to cause a denial of service condition or the execution of arbitrary code. (CVE-2017-2432) - A memory corruption issue exists in the CoreText component when handling font files due to improper validation of certain input. An unauthenticated, remote attacker can exploit this, via a specially crafted file, to cause a denial of service condition or the execution of arbitrary code. (CVE-2017-2435) - An out-of-bounds read error exists in the FontParser component when handling font files. An unauthenticated, remote attacker can exploit this, via a specially crafted file, to disclose process memory. (CVE-2017-2439) - An integer overflow condition exists in the Kernel component due to improper validation of certain input. An unauthenticated, remote attacker can exploit this, by convincing a user to run a specially crafted application, to execute arbitrary code with kernel-level privileges. (CVE-2017-2440) - A use-after-free error exists in libc++abi when demangling C++ applications. An unauthenticated, remote attacker can exploit this, by convincing a user to run a specially crafted application, to execute arbitrary code. (CVE-2017-2441) - A memory corruption issue exists in WebKit within the CoreGraphics component due to improper validation of certain input. An unauthenticated, remote attacker can exploit this, via specially crafted web content, to cause a denial of service condition or the execution of arbitrary code. (CVE-2017-2444) - A universal cross-site scripting (XSS) vulnerability exists in WebKit when handling frame objects due to improper validation of certain input. An unauthenticated, remote attacker can exploit this, via specially crafted web content, to execute arbitrary script code in a user
    last seen2020-06-01
    modified2020-06-02
    plugin id99264
    published2017-04-10
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/99264
    titleApple TV < 10.2 Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(99264);
      script_version("1.9");
      script_cvs_date("Date: 2019/11/13");
    
      script_cve_id(
        "CVE-2016-3619",
        "CVE-2016-9642",
        "CVE-2016-9643",
        "CVE-2017-2367",
        "CVE-2017-2379",
        "CVE-2017-2386",
        "CVE-2017-2390",
        "CVE-2017-2394",
        "CVE-2017-2395",
        "CVE-2017-2396",
        "CVE-2017-2401",
        "CVE-2017-2406",
        "CVE-2017-2407",
        "CVE-2017-2415",
        "CVE-2017-2416",
        "CVE-2017-2417",
        "CVE-2017-2428",
        "CVE-2017-2430",
        "CVE-2017-2432",
        "CVE-2017-2435",
        "CVE-2017-2439",
        "CVE-2017-2440",
        "CVE-2017-2441",
        "CVE-2017-2444",
        "CVE-2017-2445",
        "CVE-2017-2446",
        "CVE-2017-2447",
        "CVE-2017-2448",
        "CVE-2017-2450",
        "CVE-2017-2451",
        "CVE-2017-2454",
        "CVE-2017-2455",
        "CVE-2017-2456",
        "CVE-2017-2458",
        "CVE-2017-2459",
        "CVE-2017-2460",
        "CVE-2017-2461",
        "CVE-2017-2462",
        "CVE-2017-2464",
        "CVE-2017-2465",
        "CVE-2017-2466",
        "CVE-2017-2467",
        "CVE-2017-2468",
        "CVE-2017-2469",
        "CVE-2017-2470",
        "CVE-2017-2472",
        "CVE-2017-2473",
        "CVE-2017-2474",
        "CVE-2017-2475",
        "CVE-2017-2476",
        "CVE-2017-2478",
        "CVE-2017-2481",
        "CVE-2017-2482",
        "CVE-2017-2483",
        "CVE-2017-2485",
        "CVE-2017-2487",
        "CVE-2017-2490",
        "CVE-2017-2491",
        "CVE-2017-2492"
      );
      script_bugtraq_id(
        85919,
        94554,
        94559,
        97130,
        97131,
        97132,
        97134,
        97137,
        97143,
        97146,
        97301,
        98316
      );
      script_xref(name:"APPLE-SA", value:"APPLE-SA-2017-03-27-6");
    
      script_name(english:"Apple TV < 10.2 Multiple Vulnerabilities");
      script_summary(english:"Checks the build number.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote Apple TV device is affected by multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "According to its banner, the version of Apple TV on the remote device
    is prior to 10.2. It is, therefore, affected by multiple
    vulnerabilities :
    
      - An out-of-bounds read error exists in LibTIFF in the
        DumpModeEncode() function within file tif_dumpmode.c.
        An unauthenticated, remote attacker can exploit this
        to crash a process linked against the library or
        disclose memory contents. (CVE-2016-3619)
    
      - An out-of-bounds read error exists in WebKit when
        handling certain JavaScript code. An unauthenticated,
        remote attacker can exploit this to cause a denial of
        service condition or the disclosure of memory contents.
        (CVE-2016-9642)
    
      - A denial of service vulnerability exists in WebKit when
        handling certain regular expressions. An
        unauthenticated, remote attacker can exploit this, via a
        specially crafted web page, to exhaust available memory
        resources. (CVE-2016-9643)
    
      - An information disclosure vulnerability exists in WebKit
        when handling page loading due to improper validation of
        certain input. An unauthenticated, remote attacker can
        exploit this to disclose data cross-origin.
        (CVE-2017-2367)
    
      - A buffer overflow condition exists in the Carbon
        component when handling specially crafted DFONT files
        due to improper validation of certain input. An
        unauthenticated, remote attacker can exploit this, via
        a specially crafted file, to cause a denial of service
        condition or the execution of arbitrary code.
        (CVE-2017-2379)
    
      - An information disclosure vulnerability exists in WebKit
        when handling unspecified exceptions. An
        unauthenticated, remote attacker can exploit this, via
        specially crafted web content, to disclose data
        cross-origin. (CVE-2017-2386)
    
      - A flaw exists in the libarchive component due to the
        insecure creation of temporary files. A local attacker
        can exploit this, by using a symlink attack against an
        unspecified file, to cause unexpected changes to be made
        to file system permissions. (CVE-2017-2390)
    
      - Multiple memory corruption issues exist in WebKit that
        allow an unauthenticated, remote attacker to cause a
        denial of service condition or the execution of
        arbitrary code. (CVE-2017-2394, CVE-2017-2395,
        CVE-2017-2396, CVE-2017-2454, CVE-2017-2455,
        CVE-2017-2459, CVE-2017-2460, CVE-2017-2464,
        CVE-2017-2465, CVE-2017-2466, CVE-2017-2468,
        CVE-2017-2469, CVE-2017-2470, CVE-2017-2476)
    
      - A memory corruption issue exists in the Kernel component
        due to improper validation of certain input. An
        unauthenticated, remote attacker can exploit this, by
        convincing a user to run a specially crafted
        application, to cause a denial of service condition or
        the execution or arbitrary code. (CVE-2017-2401)
    
      - Multiple memory corruption issues exist in the FontParser
        component when handling font files due to improper
        validation of certain input. An unauthenticated, remote
        attacker can exploit these to cause a denial condition
        or the execution of arbitrary code. (CVE-2017-2406,
        CVE-2017-2407, CVE-2017-2487)
    
      - An unspecified type confusion error exists in WebKit
        that allows an unauthenticated, remote attacker to
        execute arbitrary code by using specially crafted web
        content. (CVE-2017-2415)
    
      - A memory corruption issue exists in the ImageIO
        component, specifically in the GIFReadPlugin::init()
        function, when handling image files due to improper
        validation of certain input. An unauthenticated, remote
        attacker can exploit this, via a specially crafted image
        file, to cause a denial of service condition or the
        execution of arbitrary code. (CVE-2017-2416)
    
      - An infinite recursion condition exists in the
        CoreGraphics component when handling image files. An
        unauthenticated, remote can exploit this, via a
        specially crafted image file, to cause a denial of
        service condition. (CVE-2017-2417)
    
      - An unspecified flaw exists related to nghttp2 and
        LibreSSL. An unauthenticated, remote attacker can
        exploit this, by convincing a user to access a malicious
        HTTP/2 server, to have an unspecified impact on
        confidentiality, integrity, and availability.
        (CVE-2017-2428)
    
      - A type confusion error exists in the Audio component
        when parsing specially crafted M4A audio files due to
        improper validation of certain input. An
        unauthenticated, remote attacker can exploit this, via a
        specially crafted file, to cause a denial of service
        condition or the execution of arbitrary code.
        (CVE-2017-2430)
    
      - An integer overflow condition exists in the ImageIO
        component when handling JPEG files due to improper
        validation of certain input. An unauthenticated, remote
        attacker can exploit this, via a specially crafted file,
        to cause a denial of service condition or the execution
        of arbitrary code. (CVE-2017-2432)
    
      - A memory corruption issue exists in the CoreText
        component when handling font files due to improper
        validation of certain input. An unauthenticated, remote
        attacker can exploit this, via a specially crafted file,
        to cause a denial of service condition or the execution
        of arbitrary code. (CVE-2017-2435)
    
      - An out-of-bounds read error exists in the FontParser
        component when handling font files. An unauthenticated,
        remote attacker can exploit this, via a specially
        crafted file, to disclose process memory.
        (CVE-2017-2439)
    
      - An integer overflow condition exists in the Kernel
        component due to improper validation of certain input.
        An unauthenticated, remote attacker can exploit this, by
        convincing a user to run a specially crafted
        application, to execute arbitrary code with kernel-level
        privileges. (CVE-2017-2440)
    
      - A use-after-free error exists in libc++abi when
        demangling C++ applications. An unauthenticated, remote
        attacker can exploit this, by convincing a user to run a
        specially crafted application, to execute arbitrary
        code. (CVE-2017-2441)
    
      - A memory corruption issue exists in WebKit within the
        CoreGraphics component due to improper validation of
        certain input. An unauthenticated, remote attacker can
        exploit this, via specially crafted web content, to
        cause a denial of service condition or the execution of
        arbitrary code. (CVE-2017-2444)
    
      - A universal cross-site scripting (XSS) vulnerability
        exists in WebKit when handling frame objects due to
        improper validation of certain input. An
        unauthenticated, remote attacker can exploit this, via
        specially crafted web content, to execute arbitrary
        script code in a user's browser session. (CVE-2017-2445)
    
      - A flaw exists in WebKit due to non-strict mode functions
        that are called from built-in strict mode scripts not
        being properly restricted from calling sensitive native
        functions. An unauthenticated, remote attacker can
        exploit this, via specially crafted web content, to
        execute arbitrary code. (CVE-2017-2446)
    
      - An out-of-bounds read error exists in WebKit when
        handling the bound arguments array of a bound function.
        An unauthenticated, remote attacker can exploit this,
        via specially crafted web content, to disclose memory
        contents. (CVE-2017-2447)
    
      - An unspecified flaw exists in the Security component due
        to improper validation of OTR packets under certain
        conditions. A man-in-the-middle attacker can exploit
        this to disclose and optionally manipulate transmitted
        data by spoofing the TLS/SSL server via a packet that
        appears to be valid. (CVE-2017-2448)
    
      - An out-of-bounds read error exists in CoreText component
        when handling font files. An unauthenticated, remote
        attacker can exploit this, via a specially crafted file,
        to disclose process memory. (CVE-2017-2450)
    
      - A buffer overflow condition exists in the Security
        component due to improper validation of certain input.
        An unauthenticated, remote attacker can exploit this,
        by convincing a user to run a specially crafted
        application, to execute arbitrary code with root
        root privileges. (CVE-2017-2451)
    
      - A race condition exists in the Kernel component when
        handling memory using the 'mach_msg' system call. An
        unauthenticated, remote attacker can exploit this, by
        convincing a user to run a specially crafted
        application, to cause a heap-based buffer overflow,
        resulting in a denial of service condition or the
        execution of arbitrary code with root privileges.
        CVE-2017-2456)
    
      - An buffer overflow condition exists in the Keyboards
        component due to improper validation of certain input.
        An unauthenticated, remote attacker can exploit this, by
        convincing a user to run a specially crafted
        application, to cause a denial of service condition or
        the execution of arbitrary code. (CVE-2017-2458)
    
      - A denial of service vulnerability exists in the
        CoreText component when handling specially crafted text
        messages due to improper validation of certain input. An
        unauthenticated, remote attacker can exploit this to
        exhaust available resources on the system.
        (CVE-2017-2461)
    
      - A heap buffer overflow condition exists in the Audio
        component when parsing specially crafted M4A audio files
        due to improper validation of certain input. An
        unauthenticated, remote attacker can exploit this, via a
        specially crafted file, to execute arbitrary code.
        (CVE-2017-2462)
    
      - An memory corruption issue exists in the ImageIO
        component when handling specially crafted files due to
        improper validation of certain input. An
        unauthenticated, remote attacker can exploit this, via
        a specially crafted file, to cause a denial of service
        condition or the execution of arbitrary code.
        (CVE-2017-2467)
    
      - A use-after-free error exists in the Kernel component in
        the XNU port actions extension due to improper handling
        of port references in error cases. An local attacker can
        exploit this to deference already freed memory,
        resulting in the execution of arbitrary code with
        kernel-level privileges. (CVE-2017-2472)
    
      - A signedness error exists in the Kernel component in the
        SIOCSIFORDER IOCTL due to improper validation of certain
        input. A local attacker can exploit this to cause an
        out-of-bounds read and memory corruption, resulting in
        a denial of service condition or the execution of
        arbitrary code with kernel-level privileges.
        (CVE-2017-2473)
    
      - A off-by-one overflow condition exists in the Kernel
        component in the SIOCSIFORDER IOCTL due to improper
        validation of certain input. A local attacker can exploit
        this to cause a heap-based buffer overflow, resulting in
        the execution of arbitrary code with kernel-level
        privileges. (CVE-2017-2474)
    
      - A universal cross-site scripting (XSS) vulnerability
        exists in WebKit when handling frames due to improper
        validation of certain input. An unauthenticated, remote
        attacker can exploit this, via specially crafted web
        content, to execute arbitrary script code in a user's
        browser session. (CVE-2017-2475)
    
      - A race condition exists in the Kernel component in the
        necp_open() function when closing files descriptors due
        to improper handling of proc_fd locks. A local attacker
        can exploit this to dereference already freed memory,
        resulting in the execution of arbitrary code with
        kernel-level privileges. (CVE-2017-2478)
    
      - A use-after-free error exists in WebKit when handling
        ElementData objects. An unauthenticated, remote attacker
        can exploit this, via specially crafted web content, to
        dereference already freed memory, resulting in the
        execution of arbitrary code. (CVE-2017-2481)
    
      - A heap buffer overflow condition exists in the Kernel
        component within the Berkeley Packet Filter (BPF)
        BIOCSBLEN IOCTL due to improper validation of certain
        input when reattaching to an interface. A local attacker
        can exploit this to cause a denial of service condition
        or the execution of arbitrary code with kernel-level
        privileges. (CVE-2017-2482)
    
      - An off-by-one error exists in the Kernel component,
        specifically in the audit_pipe_open() function, when
        handling auditpipe devices due to improper validation of
        certain input. A local attacker can exploit this to
        corrupt memory, resulting in a denial of service
        condition or the execution of arbitrary code with
        kernel-level privileges. (CVE-2017-2483)
    
      - An unspecified memory corruption issue exists in the
        Security component when parsing X.509 certificates due
        to improper validation of certain input. An
        unauthenticated, remote attacker can exploit this to
        cause a denial of service condition or the execution of
        arbitrary code. (CVE-2017-2485)
    
      - A double-free error exists in the Kernel component due
        to FSEVENTS_DEVICE_FILTER_64 IOCTL not properly locking
        devices. A local attacker can exploit this to corrupt
        memory, resulting in the execution of arbitrary code
        with elevated privileges. (CVE-2017-2490)
    
      - A use-after-free error exists in JavaScriptCore when
        handling the String.replace() method. An
        unauthenticated, remote attacker can exploit this to
        deference already freed memory, resulting in the
        execution of arbitrary code. (CVE-2017-2491)
    
      - A universal cross-site scripting (XSS) vulnerability
        exists in JavaScriptCore due to an unspecified prototype
        flaw. An unauthenticated, remote attacker can exploit
        this, via a specially crafted web page, to execute
        arbitrary code in a user's browser session.
        (CVE-2017-2492)
    
    Note that only 4th generation models are affected by these
    vulnerabilities.");
      script_set_attribute(attribute:"see_also", value:"https://support.apple.com/en-us/HT207601");
      # https://lists.apple.com/archives/security-announce/2017/Mar/msg00007.html
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?b1dbb626");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to Apple TV version 10.2 or later. Note that this update is
    only available for 4th generation models.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-2490");
    
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2016/04/07");
      script_set_attribute(attribute:"patch_publication_date", value:"2017/03/27");
      script_set_attribute(attribute:"plugin_publication_date", value:"2017/04/10");
    
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:apple:apple_tv");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Misc.");
    
      script_copyright(english:"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("appletv_version.nasl");
      script_require_keys("AppleTV/Version", "AppleTV/Model", "AppleTV/URL", "AppleTV/Port");
      script_require_ports("Services/www", 7000);
    
      exit(0);
    }
    
    include("audit.inc");
    include("appletv_func.inc");
    
    url = get_kb_item('AppleTV/URL');
    if (empty_or_null(url)) exit(0, 'Cannot determine Apple TV URL.');
    port = get_kb_item('AppleTV/Port');
    if (empty_or_null(port)) exit(0, 'Cannot determine Apple TV port.');
    
    build = get_kb_item('AppleTV/Version');
    if (empty_or_null(build)) audit(AUDIT_UNKNOWN_DEVICE_VER, 'Apple TV');
    
    model = get_kb_item('AppleTV/Model');
    if (empty_or_null(model)) exit(0, 'Cannot determine Apple TV model.');
    
    fixed_build = "14W265";
    tvos_ver = '10.2';
    
    # determine gen from the model
    gen = APPLETV_MODEL_GEN[model];
    
    appletv_check_version(
      build          : build,
      fix            : fixed_build,
      affected_gen   : 4,
      fix_tvos_ver   : tvos_ver,
      model          : model,
      gen            : gen,
      port           : port,
      url            : url,
      severity       : SECURITY_HOLE,
      xss            : TRUE
    );
    
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201706-15.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201706-15 (WebKitGTK+: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in WebKitGTK+. Please review the CVE identifiers referenced below for details. Impact : A remote attack can use multiple vectors to execute arbitrary code or cause a denial of service condition. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id100675
    published2017-06-08
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/100675
    titleGLSA-201706-15 : WebKitGTK+: Multiple vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Gentoo Linux Security Advisory GLSA 201706-15.
    #
    # The advisory text is Copyright (C) 2001-2017 Gentoo Foundation, Inc.
    # and licensed under the Creative Commons - Attribution / Share Alike 
    # license. See http://creativecommons.org/licenses/by-sa/3.0/
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(100675);
      script_version("3.2");
      script_cvs_date("Date: 2019/04/10 16:10:17");
    
      script_cve_id("CVE-2015-2330", "CVE-2015-7096", "CVE-2015-7098", "CVE-2016-1723", "CVE-2016-1724", "CVE-2016-1725", "CVE-2016-1726", "CVE-2016-1727", "CVE-2016-1728", "CVE-2016-4692", "CVE-2016-4743", "CVE-2016-7586", "CVE-2016-7587", "CVE-2016-7589", "CVE-2016-7592", "CVE-2016-7598", "CVE-2016-7599", "CVE-2016-7610", "CVE-2016-7611", "CVE-2016-7623", "CVE-2016-7632", "CVE-2016-7635", "CVE-2016-7639", "CVE-2016-7640", "CVE-2016-7641", "CVE-2016-7642", "CVE-2016-7645", "CVE-2016-7646", "CVE-2016-7648", "CVE-2016-7649", "CVE-2016-7652", "CVE-2016-7654", "CVE-2016-7656", "CVE-2016-9642", "CVE-2016-9643", "CVE-2017-2350", "CVE-2017-2354", "CVE-2017-2355", "CVE-2017-2356", "CVE-2017-2362", "CVE-2017-2363", "CVE-2017-2364", "CVE-2017-2365", "CVE-2017-2366", "CVE-2017-2367", "CVE-2017-2369", "CVE-2017-2371", "CVE-2017-2373", "CVE-2017-2376", "CVE-2017-2377", "CVE-2017-2386", "CVE-2017-2392", "CVE-2017-2394", "CVE-2017-2395", "CVE-2017-2396", "CVE-2017-2405", "CVE-2017-2415", "CVE-2017-2419", "CVE-2017-2433", "CVE-2017-2442", "CVE-2017-2445", "CVE-2017-2446", "CVE-2017-2447", "CVE-2017-2454", "CVE-2017-2455", "CVE-2017-2457", "CVE-2017-2459", "CVE-2017-2460", "CVE-2017-2464", "CVE-2017-2465", "CVE-2017-2466", "CVE-2017-2468", "CVE-2017-2469", "CVE-2017-2470", "CVE-2017-2471", "CVE-2017-2475", "CVE-2017-2476", "CVE-2017-2481", "CVE-2017-2496", "CVE-2017-2504", "CVE-2017-2505", "CVE-2017-2506", "CVE-2017-2508", "CVE-2017-2510", "CVE-2017-2514", "CVE-2017-2515", "CVE-2017-2521", "CVE-2017-2525", "CVE-2017-2526", "CVE-2017-2528", "CVE-2017-2530", "CVE-2017-2531", "CVE-2017-2536", "CVE-2017-2539", "CVE-2017-2544", "CVE-2017-2547", "CVE-2017-2549", "CVE-2017-6980", "CVE-2017-6984");
      script_xref(name:"GLSA", value:"201706-15");
    
      script_name(english:"GLSA-201706-15 : WebKitGTK+: Multiple vulnerabilities");
      script_summary(english:"Checks for updated package(s) in /var/db/pkg");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Gentoo host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The remote host is affected by the vulnerability described in GLSA-201706-15
    (WebKitGTK+: Multiple vulnerabilities)
    
        Multiple vulnerabilities have been discovered in WebKitGTK+. Please
          review the CVE identifiers referenced below for details.
      
    Impact :
    
        A remote attack can use multiple vectors to execute arbitrary code or
          cause a denial of service condition.
      
    Workaround :
    
        There is no known workaround at this time."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security.gentoo.org/glsa/201706-15"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "All WebKitGTK+ users should upgrade to the latest version:
          # emerge --sync
          # emerge --ask --oneshot --verbose '>=net-libs/webkit-gtk-2.16.3:4'"
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:webkit-gtk");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2017/06/07");
      script_set_attribute(attribute:"plugin_publication_date", value:"2017/06/08");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Gentoo Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("qpkg.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
    if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (qpkg_check(package:"net-libs/webkit-gtk", unaffected:make_list("ge 2.16.3"), vulnerable:make_list("lt 2.16.3"))) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = qpkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "WebKitGTK+");
    }
    
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_SAFARI10_1.NASL
    descriptionThe version of Apple Safari installed on the remote macOS or Mac OS X host is prior to 10.1. It is, therefore, affected by multiple vulnerabilities: - An out-of-bounds read error exists in WebKit when handling certain JavaScript code. An unauthenticated, remote attacker can exploit this to cause a denial of service condition or the disclosure of memory contents. (CVE-2016-9642) - A denial of service vulnerability exists in WebKit when handling certain regular expressions. An unauthenticated, remote attacker can exploit this, via a specially crafted web page, to exhaust available memory resources. (CVE-2016-9643) - Multiple information disclosure vulnerabilities exist in WebKit when handling page loading due to improper validation of certain input. An unauthenticated, remote attacker can exploit these to disclose data cross-origin. (CVE-2017-2364, CVE-2017-2367) - An unspecified state management flaw exists that allows an unauthenticated, remote attacker to spoof the address bar. (CVE-2017-2376) - A denial of service vulnerability exists in the Web Inspector component when closing a window while the debugger is paused. An unauthenticated, remote attacker can exploit this to terminate the application. (CVE-2017-2377) - An unspecified flaw exists in WebKit when creating bookmarks using drag-and-drop due to improper validation of certain input. An unauthenticated, remote attacker can exploit this, via a specially crafted link, to spoof bookmarks or potentially execute arbitrary code. (CVE-2017-2378) - An information disclosure vulnerability exists in the Login AutofFill component that allows a local attacker to access keychain items. (CVE-2017-2385) - Multiple information disclosure vulnerabilities exist in WebKit when handling unspecified exceptions or elements. An unauthenticated, remote attacker can exploit these, via specially crafted web content, to disclose data cross-origin. (CVE-2017-2386, CVE-2017-2479, CVE-2017-2480) - An unspecified flaw exists in the handling of HTTP authentication that allows an unauthenticated, remote attacker to disclose authentication sheets on arbitrary websites or cause a denial of service condition. (CVE-2017-2389) - Multiple memory corruption issues exist in WebKit that allow an unauthenticated, remote attacker to cause a denial of service condition or the execution of arbitrary code. (CVE-2017-2394, CVE-2017-2395, CVE-2017-2396, CVE-2017-2433, CVE-2017-2454, CVE-2017-2455, CVE-2017-2459, CVE-2017-2460, CVE-2017-2464, CVE-2017-2465, CVE-2017-2466, CVE-2017-2468, CVE-2017-2469, CVE-2017-2470, CVE-2017-2476) - A memory corruption issue exists in WebKit within the Web Inspector component due to improper validation of certain input. An unauthenticated, remote attacker can exploit this to cause a denial of service condition or the execution of arbitrary code. (CVE-2017-2405) - An unspecified type confusion error exists that allows an unauthenticated remote attacker to execute arbitrary code by using specially crafted web content. (CVE-2017-2415) - A security bypass vulnerability exists in WebKit that allows an unauthenticated, remote attacker to bypass the Content Security Policy by using specially crafted web content. (CVE-2017-2419) - An unspecified flaw exists in WebKit when handling OpenGL shaders that allows an unauthenticated, remote attacker to disclose process memory content by using specially crafted web content. (CVE-2017-2424) - An information disclosure vulnerability exists in WebKit JavaScript Bindings when handling page loading due to unspecified logic flaws. An unauthenticated, remote attacker can exploit this, via specially crafted web content, to disclose data cross-origin. (CVE-2017-2442) - A memory corruption issue exists in WebKit within the CoreGraphics component due to improper validation of certain input. An unauthenticated, remote attacker can exploit this, via specially crafted web content, to cause a denial of service condition or the execution of arbitrary code. (CVE-2017-2444) - A universal cross-site scripting (XSS) vulnerability exists in WebKit when handling frame objects due to improper validation of certain input. An unauthenticated, remote attacker can exploit this, via specially crafted web content, to execute arbitrary script code in a user
    last seen2020-06-01
    modified2020-06-02
    plugin id99167
    published2017-04-03
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/99167
    titlemacOS : Apple Safari < 10.1 Multiple Vulnerabilities