Wednesday, March 3, 2021

Vulnerability Spotlight: Remote code execution vulnerability in WebKit WebAudio API



Marcin “Icewall” Noga of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw.

The WebKit browser engine contains a remote code execution vulnerability in its WebAudio API interface. A malicious web page code could trigger a use-after-free error, which could lead to arbitrary code execution. An attacker could exploit this vulnerability by tricking the user into visiting a specially crafted, malicious web page to trigger this vulnerability.

In accordance with our coordinated disclosure policy, Cisco Talos worked with WebKit to ensure that this issue is resolved and that an update is available for affected customers.

Vulnerability details

Webkit AudioSourceProviderGStreamer use-after-free vulnerability (TALOS-2020-1172/CVE-2020-13558)

A code execution vulnerability exists in the AudioSourceProviderGStreamer functionality of Webkit WebKitGTK 2.30.1. A specially crafted web page can lead to a use after free.

For more information on this vulnerability, read the complete advisory here.


Versions tested

Talos tested and confirmed that Webkit WebKitGTK, version 2.30.0, is affected by this vulnerability.


Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 56126 - 56127


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.