The UNIX IPC layer in WebKit, including WebKitGTK+ prior to 2.16.3, does not properly validate message size metadata, allowing a compromised secondary process to trigger an integer overflow and subsequent buffer overflow in the UI process. This vulnerability does not affect Apple products.
References
| Link | Resource |
|---|---|
| http://trac.webkit.org/changeset/217126/webkit | Patch |
| https://webkitgtk.org/security/WSA-2017-0007.html | Vendor Advisory |
Configurations
History
15 Feb 2024, 21:22
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://trac.webkit.org/changeset/217126/webkit - Patch |
Information
Published : 2017-11-01 21:29
Updated : 2024-02-15 21:22
NVD link : CVE-2017-1000121
Mitre link : CVE-2017-1000121
CVE.ORG link : CVE-2017-1000121
JSON object : View
Products Affected
webkitgtk
- webkitgtk\+
CWE
CWE-190
Integer Overflow or Wraparound
