// For flags

CVE-2020-13584

webkitgtk: use-after-free may lead to arbitrary code execution

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.1 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in a remote code execution. The victim needs to visit a malicious web site to trigger this vulnerability.

Se presenta una vulnerabilidad explotable de uso de la memoria previamente liberada en el navegador WebKitGTK versión 2.30.1 x64. Una página web HTML especialmente diseñada puede causar una condición de uso de la memoria previamente liberada, resultando en una ejecución de código remota. La víctima necesita visitar un sitio web malicioso para desencadenar esta vulnerabilidad

An update that fixes 5 vulnerabilities is now available. This update for webkit2gtk3 fixes the following issues. Fixed a use after free which could have led to arbitrary code execution. Fixed a use after free which could have led to arbitrary code execution. Fixed a type confusion which could have led to arbitrary code execution. Fixed a use after free which could have led to arbitrary code execution. Fixed an out of bounds write which could have led to arbitrary code execution. Same version. With JIT disabled. Also disable sampling profiler, since it conflicts with c_loop. This update was imported from the SUSE:SLE-15:Update update project.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-05-26 CVE Reserved
  • 2020-11-28 CVE Published
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • 2025-07-10 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-416: Use After Free
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Webkitgtk
Search vendor "Webkitgtk"
Webkitgtk
Search vendor "Webkitgtk" for product "Webkitgtk"
2.30.1
Search vendor "Webkitgtk" for product "Webkitgtk" and version "2.30.1"
x64
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
32
Search vendor "Fedoraproject" for product "Fedora" and version "32"
-
Affected