Vulnerability Name: | CVE-2017-5949 (CCN-128647) | ||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2017-01-20 | ||||||||||||||||||||||||||||||||||||||||||||
Published: | 2017-01-20 | ||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2017-04-11 | ||||||||||||||||||||||||||||||||||||||||||||
Summary: | JavaScriptCore in WebKit, as distributed in Safari Technology Preview Release 22, allows remote attackers to cause a denial of service (heap-based out-of-bounds write and application crash) or possibly have unspecified other impact via crafted JavaScript code that triggers access to red-zone memory locations, related to jit/ThunkGenerators.cpp, llint/LowLevelInterpreter32_64.asm, and llint/LowLevelInterpreter64.asm. | ||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-787 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-5949 Source: BID Type: Third Party Advisory, VDB Entry 97298 Source: CCN Type: BID-97298 WebKit CVE-2017-5949 Denial of Service Vulnerability Source: CCN Type: WebKit Bugzilla Bug 167239 ArityFixup should adjust SP first Source: CONFIRM Type: Issue Tracking, Third Party Advisory https://bugs.webkit.org/show_bug.cgi?id=167239 Source: XF Type: UNKNOWN webkit-cve20175949-dos(128647) Source: CONFIRM Type: Issue Tracking, Third Party Advisory https://trac.webkit.org/changeset/211479 Source: CCN Type: WebKit TracChangeset Change 211479 WebKit | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
BACK |