CVE-2014-1297
02.04.2014, 16:17
WebKit, as used in Apple Safari before 6.1.3 and 7.x before 7.0.3, does not properly validate WebProcess IPC messages, which allows remote attackers to bypass a sandbox protection mechanism and read arbitrary files by leveraging WebProcess access.Enginsight
| Vendor | Product | Version |
|---|---|---|
| apple | safari | 𝑥 ≤ 6.1.2 |
| apple | safari | 6.0 |
| apple | safari | 6.0.1 |
| apple | safari | 6.0.2 |
| apple | safari | 6.0.3 |
| apple | safari | 6.0.4 |
| apple | safari | 6.0.5 |
| apple | safari | 6.1 |
| apple | safari | 6.1.1 |
| apple | safari | 7.0 |
| apple | safari | 7.0.1 |
| apple | safari | 7.0.2 |
𝑥
= Vulnerable software versions
Ubuntu Releases
Ubuntu Product | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| qtwebkit-opensource-src |
| ||||||||||||
| qtwebkit-source |
| ||||||||||||
| webkit |
| ||||||||||||
| webkitgtk |
|
Common Weakness Enumeration