Skip to content

Commit

Permalink
Release: WSA-2024-0005
Browse files Browse the repository at this point in the history
  • Loading branch information
aperezdc committed Sep 25, 2024
1 parent f54a5ca commit 8fde241
Showing 1 changed file with 103 additions and 0 deletions.
103 changes: 103 additions & 0 deletions security/2024-09-25-security-advisory-2024-0005.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,103 @@
---
layout: post
title: WebKitGTK and WPE WebKit Security Advisory WSA-2024-0005
permalink: /security/WSA-2024-0005.html
tags: WSA
---

* Date Reported: **September 25, 2024**

* Advisory ID: **WSA-2024-0005**

* CVE identifiers: [CVE-2024-23271](#CVE-2024-23271), [CVE-2024-27808](#CVE-2024-27808), [CVE-2024-27820](#CVE-2024-27820), [CVE-2024-27830](#CVE-2024-27830), [CVE-2024-27833](#CVE-2024-27833), [CVE-2024-27838](#CVE-2024-27838), [CVE-2024-27850](#CVE-2024-27850), [CVE-2024-27851](#CVE-2024-27851), [CVE-2024-40857](#CVE-2024-40857), [CVE-2024-40866](#CVE-2024-40866), [CVE-2024-44187](#CVE-2024-44187)


Several vulnerabilities were discovered in WebKitGTK and WPE WebKit.

* <a name='CVE-2024-23271' href='https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271'>CVE-2024-23271</a>
* Versions affected: WebKitGTK and WPE WebKit before 2.42.5.
* Credit to James Lee (@Windowsrcer).
* Impact: A malicious website may cause unexpected cross-origin behavior. Description: A
logic issue was addressed with improved checks.
* WebKit Bugzilla: 265812

* <a name='CVE-2024-27808' href='https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808'>CVE-2024-27808</a>
* Versions affected: WebKitGTK and WPE WebKit before 2.44.2.
* Credit to Lukas Bernhard of CISPA Helmholtz Center for Information Security.
* Impact: Processing web content may lead to arbitrary code execution. Description: The
issue was addressed with improved memory handling.
* WebKit Bugzilla: 268221

* <a name='CVE-2024-27820' href='https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820'>CVE-2024-27820</a>
* Versions affected: WebKitGTK and WPE WebKit before 2.44.2.
* Credit to Jeff Johnson of underpassapp.com.
* Impact: Processing web content may lead to arbitrary code execution. Description: The
issue was addressed with improved memory handling.
* WebKit Bugzilla: 270139

* <a name='CVE-2024-27830' href='https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27830'>CVE-2024-27830</a>
* Versions affected: WebKitGTK and WPE WebKit before 2.44.3.
* Credit to Joe Rutkowski (@Joe12387) of Crawless and @abrahamjuliot.
* Impact: A maliciously crafted webpage may be able to fingerprint the user.
Description: This issue was addressed through improved state management.
* WebKit Bugzilla: 271159

* <a name='CVE-2024-27833' href='https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833'>CVE-2024-27833</a>
* Versions affected: WebKitGTK and WPE WebKit before 2.44.2.
* Credit to Manfred Paul (@_manfp) working with Trend Micro Zero Day Initiative.
* Impact: Processing maliciously crafted web content may lead to arbitrary code
execution. Description: An integer overflow was addressed with improved input
validation.
* WebKit Bugzilla: 271491

* <a name='CVE-2024-27838' href='https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27838'>CVE-2024-27838</a>
* Versions affected: WebKitGTK and WPE WebKit before 2.44.3.
* Credit to Emilio Cobos of Mozilla.
* Impact: A maliciously crafted webpage may be able to fingerprint the user.
Description: The issue was addressed by adding additional logic.
* WebKit Bugzilla: 262337

* <a name='CVE-2024-27850' href='https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27850'>CVE-2024-27850</a>
* Versions affected: WebKitGTK and WPE WebKit before 2.44.2.
* Credit to an anonymous researcher.
* Impact: A maliciously crafted webpage may be able to fingerprint the user.
Description: This issue was addressed with improvements to the noise injection
algorithm.
* WebKit Bugzilla: 270767

* <a name='CVE-2024-27851' href='https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27851'>CVE-2024-27851</a>
* Versions affected: WebKitGTK and WPE WebKit before 2.44.3.
* Credit to Nan Wang (@eternalsakura13) of 360 Vulnerability Research Institute.
* Impact: Processing maliciously crafted web content may lead to arbitrary code
execution. Description: The issue was addressed with improved bounds checks.
* WebKit Bugzilla: 272106

* <a name='CVE-2024-40857' href='https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40857'>CVE-2024-40857</a>
* Versions affected: WebKitGTK and WPE WebKit before 2.46.0.
* Credit to Ron Masas.
* Impact: Processing maliciously crafted web content may lead to universal cross site
scripting. Description: This issue was addressed through improved state management.
* WebKit Bugzilla: 268724

* <a name='CVE-2024-40866' href='https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40866'>CVE-2024-40866</a>
* Versions affected: WebKitGTK and WPE WebKit before 2.46.0.
* Credit to Hafiizh and YoKo Kho (@yokoacc) of HakTrak.
* Impact: Visiting a malicious website may lead to address bar spoofing. Description:
The issue was addressed with improved UI.
* WebKit Bugzilla: 279451

* <a name='CVE-2024-44187' href='https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44187'>CVE-2024-44187</a>
* Versions affected: WebKitGTK and WPE WebKit before 2.46.0.
* Credit to Narendra Bhati, Manager of Cyber Security at Suma Soft Pvt. Ltd, Pune (India).
* Impact: A malicious website may exfiltrate data cross-origin. Description: A cross-
origin issue existed with "iframe" elements. This was addressed with improved tracking
of security origins.
* WebKit Bugzilla: 279452

We recommend updating to the latest stable versions of WebKitGTK and WPE WebKit. It is the
best way to ensure that you are running safe versions of WebKit. Please check our websites
for information about the latest stable releases.

Further information about WebKitGTK and WPE WebKit security advisories can be found at:
[webkitgtk.org/security.html](https://webkitgtk.org/security.html) or
[wpewebkit.org/security](https://wpewebkit.org/security).

0 comments on commit 8fde241

Please sign in to comment.