First published: Thu Dec 03 2020(Updated: )
An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.1 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in a remote code execution. The victim needs to visit a malicious web site to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/webkit2gtk | 2.36.4-1~deb10u1 2.38.6-0+deb10u1 2.40.5-1~deb11u1 2.42.4-1~deb11u1 2.42.2-1~deb12u1 2.42.4-1~deb12u1 2.42.4-1 | |
debian/wpewebkit | 2.38.6-1~deb11u1 2.38.6-1 2.42.4-1 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.2.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.1.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.0.0 | |
WebKitGTK+ | =2.30.1 | |
Fedoraproject Fedora | =32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13584 is an exploitable use-after-free vulnerability in WebKitGTK browser version 2.30.1 x64.
A remote attacker can exploit CVE-2020-13584 by persuading a victim to visit a specially crafted website, allowing the attacker to execute arbitrary code or cause a denial-of-service condition.
CVE-2020-13584 has a severity level of high with a CVSS score of 8.8.
IBM Cloud Pak for Security (CP4S) versions 1.7.2.0, 1.7.1.0, and 1.7.0.0, WebKitGTK version 2.30.1 x64, and Fedora version 32 are affected by CVE-2020-13584.
To fix CVE-2020-13584, update your software to the recommended versions: WebKitGTK to version 2.42.1-2, deb packages wpewebkit to version 2.42.1-1, and webkit2gtk to version 2.42.1-2.