CVE-2020-6496Use After Free in Google Chrome

CWE-416Use After Free10 documents8 sources
Severity
8.8HIGHNVD
EPSS
1.3%
top 20.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 3
Latest updateMay 24

Description

Use after free in payments in Google Chrome on MacOS prior to 83.0.4103.97 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages5 packages

CVEListV5google/chromeunspecified83.0.4103.97
NVDgoogle/chrome< 83.0.4103.97
Debianchromium/chromium< 83.0.4103.106-1+3
NVDopensuse/leap15.1

Also affects: Debian Linux 10.0, 9.0

🔴Vulnerability Details

3
GHSA
GHSA-83qh-8jfh-6rg6: Use after free in payments in Google Chrome on MacOS prior to 832022-05-24
CVEList
CVE-2020-6496: Use after free in payments in Google Chrome on MacOS prior to 832020-06-03
OSV
CVE-2020-6496: Use after free in payments in Google Chrome on MacOS prior to 832020-06-03

📋Vendor Advisories

3
Red Hat
chromium-browser: Use after free in payments2020-06-03
Chrome
Stable Channel Update for Desktop: CVE-2020-64962020-06-03
Debian
CVE-2020-6496: chromium - Use after free in payments in Google Chrome on MacOS prior to 83.0.4103.97 allow...2020

💬Community

3
Bugzilla
CVE-2020-6493 CVE-2020-6494 CVE-2020-6495 CVE-2020-6496 chromium: various flaws [epel-all]2020-06-05
Bugzilla
CVE-2020-6493 CVE-2020-6494 CVE-2020-6495 CVE-2020-6496 chromium: various flaws [fedora-all]2020-06-05
Bugzilla
CVE-2020-6496 chromium-browser: Use after free in payments2020-06-05
CVE-2020-6496 — Use After Free in Google Chrome | cvebase