Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.704877
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-4877-1)
Summary:The remote host is missing an update for the Debian 'webkit2gtk' package(s) announced via the DSA-4877-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'webkit2gtk' package(s) announced via the DSA-4877-1 advisory.

Vulnerability Insight:
The following vulnerabilities have been discovered in the webkit2gtk web engine:

CVE-2020-27918

Liu Long discovered that processing maliciously crafted web content may lead to arbitrary code execution.

CVE-2020-29623

Simon Hunt discovered that users may be unable to fully delete their browsing history under some circumstances.

CVE-2021-1765

Eliya Stein discovered that maliciously crafted web content may violate iframe sandboxing policy.

CVE-2021-1789

@S0rryMybad discovered that processing maliciously crafted web content may lead to arbitrary code execution.

CVE-2021-1799

Gregory Vishnepolsky, Ben Seri and Samy Kamkar discovered that a malicious website may be able to access restricted ports on arbitrary servers.

CVE-2021-1801

Eliya Stein discovered that processing maliciously crafted web content may lead to arbitrary code execution.

CVE-2021-1870

An anonymous researcher discovered that processing maliciously crafted web content may lead to arbitrary code execution.

For the stable distribution (buster), these problems have been fixed in version 2.30.6-1~
deb10u1.

We recommend that you upgrade your webkit2gtk packages.

For the detailed security status of webkit2gtk please refer to its security tracker page at: [link moved to references]

Affected Software/OS:
'webkit2gtk' package(s) on Debian 10.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2020-27918
Debian Security Information: DSA-4877 (Google Search)
https://www.debian.org/security/2021/dsa-4877
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EQ3U3VBSOJB46WCO66TEWE5OAXLTU3YW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/
http://seclists.org/fulldisclosure/2020/Dec/32
https://security.gentoo.org/glsa/202104-03
https://support.apple.com/en-us/HT211928
https://support.apple.com/en-us/HT211929
https://support.apple.com/en-us/HT211930
https://support.apple.com/en-us/HT211931
https://support.apple.com/en-us/HT211933
https://support.apple.com/en-us/HT211934
https://support.apple.com/en-us/HT211935
http://www.openwall.com/lists/oss-security/2021/03/22/1
Common Vulnerability Exposure (CVE) ID: CVE-2020-29623
https://support.apple.com/en-us/HT212003
https://support.apple.com/en-us/HT212005
https://support.apple.com/en-us/HT212011
Common Vulnerability Exposure (CVE) ID: CVE-2021-1765
https://support.apple.com/en-us/HT212147
Common Vulnerability Exposure (CVE) ID: CVE-2021-1789
https://support.apple.com/en-us/HT212146
https://support.apple.com/en-us/HT212148
https://support.apple.com/en-us/HT212149
https://support.apple.com/en-us/HT212152
Common Vulnerability Exposure (CVE) ID: CVE-2021-1799
Common Vulnerability Exposure (CVE) ID: CVE-2021-1801
Common Vulnerability Exposure (CVE) ID: CVE-2021-1870
Common Vulnerability Exposure (CVE) ID: CVE-2021-21806
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1214
http://www.openwall.com/lists/oss-security/2021/07/23/1
CopyrightCopyright (C) 2021 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.