CVE-2021-4057Use After Free in Google Chrome

CWE-416Use After Free6 documents6 sources
Severity
8.8HIGHNVD
EPSS
3.0%
top 13.47%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 23
Latest updateDec 24

Description

Use after free in file API in Google Chrome prior to 96.0.4664.93 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages6 packages

CVEListV5google/chromeunspecified96.0.4664.93
NVDgoogle/chrome< 96.0.4664.93
debiandebian/chromium< chromium 97.0.4692.71-0.1 (bookworm)
Debianchromium/chromium< 97.0.4692.71-0.1~deb11u1+3

Also affects: Debian Linux 10.0, 11.0, Fedora 34

🔴Vulnerability Details

2
GHSA
GHSA-r869-w852-f56r: Use after free in file API in Google Chrome prior to 962021-12-24
OSV
CVE-2021-4057: Use after free in file API in Google Chrome prior to 962021-12-23

📋Vendor Advisories

3
Microsoft
Chromium: CVE-2021-4057 Use after free in file API2021-12-14
Chrome
Stable Channel Update for Desktop: CVE-2021-40552021-12-06
Debian
CVE-2021-4057: chromium - Use after free in file API in Google Chrome prior to 96.0.4664.93 allowed a remo...2021