Vulnerability Description
The UNIX IPC layer in WebKit, including WebKitGTK+ prior to 2.16.3, does not properly validate message size metadata, allowing a compromised secondary process to trigger an integer overflow and subsequent buffer overflow in the UI process. This vulnerability does not affect Apple products.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Webkitgtk | Webkitgtk\+ | < 2.16.3 |
Related Weaknesses (CWE)
References
- http://trac.webkit.org/changeset/217126/webkitPatch
- https://webkitgtk.org/security/WSA-2017-0007.htmlVendor Advisory
- http://trac.webkit.org/changeset/217126/webkitPatch
FAQ
What is CVE-2017-1000121?
CVE-2017-1000121 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The UNIX IPC layer in WebKit, including WebKitGTK+ prior to 2.16.3, does not properly validate message size metadata, allowing a compromised secondary process to trigger an integer overflow and subseq...
How severe is CVE-2017-1000121?
CVE-2017-1000121 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-1000121?
Check the references section above for vendor advisories and patch information. Affected products include: Webkitgtk Webkitgtk\+.