CVE-2021-30602Use After Free in Google Chrome

CWE-416Use After Free8 documents7 sources
Severity
8.8HIGHNVD
EPSS
0.3%
top 44.47%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 26
Latest updateMay 24

Description

Use after free in WebRTC in Google Chrome prior to 92.0.4515.159 allowed an attacker who convinced a user to visit a malicious website to potentially exploit heap corruption via a crafted HTML page.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages6 packages

CVEListV5google/chromeunspecified92.0.4515.159
NVDgoogle/chrome< 92.0.4515.159
debiandebian/chromium< chromium 93.0.4577.82-1 (bookworm)
Debianchromium/chromium< 93.0.4577.82-1+3

Also affects: Fedora 33, 34, 35

Patches

🔴Vulnerability Details

2
GHSA
GHSA-m9vv-m3gv-47x8: Use after free in WebRTC in Google Chrome prior to 922022-05-24
OSV
CVE-2021-30602: Use after free in WebRTC in Google Chrome prior to 922021-08-26

📋Vendor Advisories

3
Chrome
Stable Channel Update for Desktop: CVE-2021-306012021-08-16
Microsoft
Chromium: CVE-2021-30602 Use after free in WebRTC2021-08-10
Debian
CVE-2021-30602: chromium - Use after free in WebRTC in Google Chrome prior to 92.0.4515.159 allowed an atta...2021

🕵️Threat Intelligence

2
Talos
Vulnerability Spotlight: Use-after-free vulnerability in Google Chrome could lead to code execution2021-11-17
Talos
Vulnerability Spotlight: Use-after-free vulnerability in Google Chrome could lead to code execution2021-11-17