A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability.
https://security.gentoo.org/glsa/202012-10
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1155
Source: MITRE
Published: 2020-12-03
Updated: 2020-12-23
Type: CWE-416
Base Score: 6.8
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact Score: 6.4
Exploitability Score: 8.6
Severity: MEDIUM
Base Score: 8.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 2.8
Severity: HIGH
OR
ID | Name | Product | Family | Severity |
---|---|---|---|---|
145374 | openSUSE Security Update : webkit2gtk3 (openSUSE-2020-2304) | Nessus | SuSE Local Security Checks | medium |
145331 | openSUSE Security Update : webkit2gtk3 (openSUSE-2020-2310) | Nessus | SuSE Local Security Checks | medium |
144597 | GLSA-202012-10 : WebkitGTK+: Multiple vulnerabilities | Nessus | Gentoo Local Security Checks | medium |
144432 | SUSE SLED15 / SLES15 Security Update : webkit2gtk3 (SUSE-SU-2020:3867-1) | Nessus | SuSE Local Security Checks | medium |
144427 | SUSE SLED15 / SLES15 Security Update : webkit2gtk3 (SUSE-SU-2020:3864-1) | Nessus | SuSE Local Security Checks | medium |