CVE-2020-13543

MEDIUM

Description

A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability.

References

https://security.gentoo.org/glsa/202012-10

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1155

Details

Source: MITRE

Published: 2020-12-03

Updated: 2020-12-23

Type: CWE-416

Risk Information

CVSS v2.0

Base Score: 6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3.0

Base Score: 8.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 2.8

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:webkitgtk:webkitgtk:2.30.0:*:*:*:*:*:*:*

Tenable Plugins

View all (5 total)

IDNameProductFamilySeverity
145374openSUSE Security Update : webkit2gtk3 (openSUSE-2020-2304)NessusSuSE Local Security Checks
medium
145331openSUSE Security Update : webkit2gtk3 (openSUSE-2020-2310)NessusSuSE Local Security Checks
medium
144597GLSA-202012-10 : WebkitGTK+: Multiple vulnerabilitiesNessusGentoo Local Security Checks
medium
144432SUSE SLED15 / SLES15 Security Update : webkit2gtk3 (SUSE-SU-2020:3867-1)NessusSuSE Local Security Checks
medium
144427SUSE SLED15 / SLES15 Security Update : webkit2gtk3 (SUSE-SU-2020:3864-1)NessusSuSE Local Security Checks
medium