CVE-2022-4924Use After Free in Google Chrome

CWE-416Use After Free5 documents5 sources
Severity
9.6CRITICALNVD
EPSS
0.8%
top 26.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 29

Description

Use after free in WebRTC in Google Chrome prior to 97.0.4692.71 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:HExploitability: 2.8 | Impact: 6.0

Affected Packages5 packages

CVEListV5google/chrome97.0.4692.7197.0.4692.71
NVDgoogle/chrome< 97.0.4692.71
debiandebian/chromium< chromium 97.0.4692.71-0.1 (bookworm)
Debianchromium/chromium< 97.0.4692.71-0.1~deb11u1+3

🔴Vulnerability Details

2
OSV
CVE-2022-4924: Use after free in WebRTC in Google Chrome prior to 972023-07-29
GHSA
GHSA-vvx4-72qg-p3h5: Use after free in WebRTC in Google Chrome prior to 972023-07-29

📋Vendor Advisories

2
Chrome
Stable Channel Update for Desktop: CVE-2022-01032022-01-04
Debian
CVE-2022-4924: chromium - Use after free in WebRTC in Google Chrome prior to 97.0.4692.71 allowed a remote...2022