CVE-2016-4733
Published: 25 September 2016
WebKit in Apple iOS before 10, Safari before 10, and tvOS before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4611, CVE-2016-4730, CVE-2016-4734, and CVE-2016-4735.
Notes
| Author | Note |
|---|---|
| jdstrand | webkit receives limited support. For details, see https://wiki.ubuntu.com/SecurityTeam/FAQ#webkit webkit in Ubuntu uses the JavaScriptCore (JSC) engine, not V8 |
Priority
Status
| Package | Release | Status |
|---|---|---|
|
qtwebkit-opensource-src Launchpad, Ubuntu, Debian |
precise |
Does not exist
|
| trusty |
Does not exist
(trusty was ignored [no update available])
|
|
| upstream |
Needs triage
|
|
| xenial |
Ignored
(no update available)
|
|
| yakkety |
Ignored
(end of life)
|
|
|
qtwebkit-source Launchpad, Ubuntu, Debian |
precise |
Ignored
(end of life)
|
| trusty |
Does not exist
(trusty was ignored [no update available])
|
|
| upstream |
Needs triage
|
|
| xenial |
Ignored
(no update available)
|
|
| yakkety |
Ignored
(end of life)
|
|
|
webkit Launchpad, Ubuntu, Debian |
precise |
Ignored
(end of life)
|
| trusty |
Does not exist
|
|
| upstream |
Needs triage
|
|
| xenial |
Does not exist
|
|
| yakkety |
Does not exist
|
|
|
webkit2gtk Launchpad, Ubuntu, Debian |
precise |
Does not exist
|
| trusty |
Does not exist
|
|
| upstream |
Released
(2.14.0)
|
|
| xenial |
Released
(2.14.2-0ubuntu0.16.04.1)
|
|
| yakkety |
Not vulnerable
(2.14.1-0ubuntu1)
|
|
|
webkitgtk Launchpad, Ubuntu, Debian |
precise |
Does not exist
|
| trusty |
Does not exist
(trusty was ignored [no update available])
|
|
| upstream |
Needs triage
|
|
| xenial |
Ignored
(no update available)
|
|
| yakkety |
Ignored
(end of life)
|
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 7.8 |
| Attack vector | Local |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | Required |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | High |
| Availability impact | High |
| Vector | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |