Lucene search

K
archlinuxArchLinuxASA-201911-2
HistoryNov 02, 2019 - 12:00 a.m.

[ASA-201911-2] qt5-webengine: arbitrary code execution

2019-11-0200:00:00
security.archlinux.org
21

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.974 High

EPSS

Percentile

99.9%

Arch Linux Security Advisory ASA-201911-2

Severity: Critical
Date : 2019-11-02
CVE-ID : CVE-2019-13720
Package : qt5-webengine
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-1059

Summary

The package qt5-webengine before version 5.13.2-2 is vulnerable to
arbitrary code execution.

Resolution

Upgrade to 5.13.2-2.

pacman -Syu β€œqt5-webengine>=5.13.2-2”

The problem has been fixed upstream but no release is available yet.

Workaround

None.

Description

A use-after-free vulnerability has been found in the audio component of
the chromium browser before 78.0.3904.87. Google is aware of reports
that an exploit for this vulnerability exists in the wild.

Impact

A remote attacker can execute arbitrary code on the affected host.

References

https://bugs.archlinux.org/task/64347
https://code.qt.io/cgit/qt/qtwebengine-chromium.git/patch/?id=d6e5fc10e417efdf8665d9fba57c269f0534072f
https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_31.html
https://crbug.com/1019226
https://security.archlinux.org/CVE-2019-13720

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanyqt5-webengine<Β 5.13.2-2UNKNOWN

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.974 High

EPSS

Percentile

99.9%