First published: Thu Sep 28 2023(Updated: )
A specially crafted web page can abuse this vulnerability to cause memory corruption and potentially arbitrary code execution. A user would need to visit a malicious webpage to trigger this vulnerability. Reference: <a href="https://webkitgtk.org/security/WSA-2023-0009.html#CVE-2023-39928">https://webkitgtk.org/security/WSA-2023-0009.html#CVE-2023-39928</a>
Credit: talos-cna@cisco.com talos-cna@cisco.com talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
WebKitGTK WebKitGTK | =2.40.5 | |
Debian Debian Linux | =11.0 | |
Debian Debian Linux | =12.0 | |
Fedoraproject Fedora | =37 | |
ubuntu/webkit2gtk | <2.42.1-0ubuntu0.22.04.1 | 2.42.1-0ubuntu0.22.04.1 |
ubuntu/webkit2gtk | <2.42.1-0ubuntu0.23.04.1 | 2.42.1-0ubuntu0.23.04.1 |
ubuntu/webkit2gtk | <2.42.0 | 2.42.0 |
debian/webkit2gtk | <=2.36.4-1~deb10u1<=2.38.6-0+deb10u1 | 2.42.2-1~deb11u1 2.44.1-1~deb11u1 2.42.2-1~deb12u1 2.44.1-1~deb12u1 2.44.1-1 |
debian/wpewebkit | <=2.38.6-1~deb11u1<=2.38.6-1 | 2.44.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-39928.
The severity of CVE-2023-39928 is high with a severity value of 8.8.
The affected software versions are WebKitGTK 2.40.5.
This vulnerability can be exploited by visiting a malicious web page that abuses the MediaRecorder API of the affected WebKit GStreamer-based ports to cause memory corruption and potentially execute arbitrary code.
To fix CVE-2023-39928, update the WebKitGTK software to version 2.42.1-0ubuntu0.22.04.1 (for Ubuntu) or version 2.42.1-1 (for Debian).