CVE-2023-0927Use After Free in Google Chrome

CWE-416Use After Free5 documents5 sources
Severity
8.8HIGHNVD
EPSS
0.3%
top 43.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 22

Description

Use after free in Web Payments API in Google Chrome on Android prior to 110.0.5481.177 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages5 packages

CVEListV5google/chrome110.0.5481.177110.0.5481.177
NVDgoogle/chrome< 110.0.5481.177
debiandebian/chromium< chromium 110.0.5481.177-1 (bookworm)
Debianchromium/chromium< 110.0.5481.177-1~deb11u1+3

🔴Vulnerability Details

2
GHSA
GHSA-4746-8222-r3vf: Use after free in Web Payments API in Google Chrome on Android prior to 1102023-02-22
OSV
CVE-2023-0927: Use after free in Web Payments API in Google Chrome on Android prior to 1102023-02-22

📋Vendor Advisories

2
Microsoft
Chromium: CVE-2023-0927 Use after free in Web Payments API2023-02-14
Debian
CVE-2023-0927: chromium - Use after free in Web Payments API in Google Chrome on Android prior to 110.0.54...2023