CVE-2020-16008

CWE-787Out-of-bounds Write10 documents8 sources
Severity
8.8HIGH
EPSS
1.3%
top 20.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 3
Latest updateMay 24

Description

Stack buffer overflow in WebRTC in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit stack corruption via a crafted WebRTC packet.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages5 packages

CVEListV5google/chromeunspecified86.0.4240.183
NVDgoogle/chrome< 86.0.4240.183
Debianchromium< 87.0.4280.88-0.1+3
NVDopensuse/leap15.1, 15.2+1

Also affects: Debian Linux 10.0, Fedora 32, 33

🔴Vulnerability Details

3
GHSA
GHSA-xvqc-4q7g-qm76: Stack buffer overflow in WebRTC in Google Chrome prior to 862022-05-24
CVEList
CVE-2020-16008: Stack buffer overflow in WebRTC in Google Chrome prior to 862020-11-03
OSV
CVE-2020-16008: Stack buffer overflow in WebRTC in Google Chrome prior to 862020-11-03

📋Vendor Advisories

3
Red Hat
chromium-browser: Stack buffer overflow in WebRTC2020-11-02
Chrome
Stable Channel Update for Desktop: CVE-2020-160072020-11-02
Debian
CVE-2020-16008: chromium - Stack buffer overflow in WebRTC in Google Chrome prior to 86.0.4240.183 allowed ...2020

💬Community

3
Bugzilla
CVE-2020-16004 CVE-2020-16005 CVE-2020-16006 CVE-2020-16008 CVE-2020-16009 chromium: various flaws [fedora-all]2020-11-03
Bugzilla
CVE-2020-16004 CVE-2020-16005 CVE-2020-16006 CVE-2020-16008 CVE-2020-16009 chromium: various flaws [epel-all]2020-11-03
Bugzilla
CVE-2020-16008 chromium-browser: Stack buffer overflow in WebRTC2020-11-03