CVE-2022-4191Use After Free in Google Chrome

CWE-416Use After Free7 documents7 sources
Severity
8.8HIGHNVD
EPSS
0.2%
top 55.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 30
Latest updateDec 13

Description

Use after free in Sign-In in Google Chrome prior to 108.0.5359.71 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via profile destruction. (Chromium security severity: Medium)

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages6 packages

CVEListV5google/chromeunspecified108.0.5359.71
NVDgoogle/chrome< 108.0.5359.71
debiandebian/chromium< chromium 108.0.5359.71-1 (bookworm)
Debianchromium/chromium< 108.0.5359.71-2~deb11u1+3

🔴Vulnerability Details

2
GHSA
GHSA-ghrv-5rxq-4p89: Use after free in Sign-In in Google Chrome prior to 1082022-11-30
OSV
CVE-2022-4191: Use after free in Sign-In in Google Chrome prior to 1082022-11-30

💥Exploits & PoCs

1
Nuclei
GitLab GraphQL API User Enumeration

📋Vendor Advisories

3
Microsoft
Chromium: CVE-2022-4191 Use after free in Sign-In2022-12-13
Chrome
Stable Channel Update for Desktop: CVE-2022-41892022-11-29
Debian
CVE-2022-4191: chromium - Use after free in Sign-In in Google Chrome prior to 108.0.5359.71 allowed a remo...2022