CVE-2014-1297
02.04.2014, 16:17
WebKit, as used in Apple Safari before 6.1.3 and 7.x before 7.0.3, does not properly validate WebProcess IPC messages, which allows remote attackers to bypass a sandbox protection mechanism and read arbitrary files by leveraging WebProcess access.Enginsight
Vendor | Product | Version |
---|---|---|
apple | safari | 𝑥 ≤ 6.1.2 |
apple | safari | 6.0 |
apple | safari | 6.0.1 |
apple | safari | 6.0.2 |
apple | safari | 6.0.3 |
apple | safari | 6.0.4 |
apple | safari | 6.0.5 |
apple | safari | 6.1 |
apple | safari | 6.1.1 |
apple | safari | 7.0 |
apple | safari | 7.0.1 |
apple | safari | 7.0.2 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Ubuntu Product | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
qtwebkit-opensource-src |
| ||||||||||||
qtwebkit-source |
| ||||||||||||
webkit |
| ||||||||||||
webkitgtk |
|
Common Weakness Enumeration