CVE-2016-4763

Publication date 25 September 2016

Last updated 25 August 2025


Ubuntu priority

Cvss 3 Severity Score

6.8 · Medium

Score breakdown

WKWebView in WebKit in Apple iOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 does not properly verify X.509 certificates from HTTPS servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Read the notes from the security team

Status

Package Ubuntu Release Status
qtwebkit-source 16.10 yakkety Ignored end of life
16.04 LTS xenial Ignored no update available
14.04 LTS trusty Not in release
12.04 LTS precise Ignored end of life
webkit 16.10 yakkety Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
12.04 LTS precise Ignored end of life
webkit2gtk 16.10 yakkety
Not affected
16.04 LTS xenial
Not affected
14.04 LTS trusty Not in release
12.04 LTS precise Not in release
webkitgtk 16.10 yakkety Ignored end of life
16.04 LTS xenial Ignored no update available
14.04 LTS trusty Not in release
12.04 LTS precise Not in release
qtwebkit-opensource-src 16.10 yakkety Ignored end of life
16.04 LTS xenial Ignored no update available
14.04 LTS trusty Not in release
12.04 LTS precise Not in release

Notes


jdstrand

webkit receives limited support. For details, see https://wiki.ubuntu.com/SecurityTeam/FAQ#webkit webkit in Ubuntu uses the JavaScriptCore (JSC) engine, not V8

Severity score breakdown

Parameter Value
Base score 6.8 · Medium
Attack vector Network
Attack complexity High
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact None
Vector CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N