CVE-2023-0932Use After Free in Google Chrome

CWE-416Use After Free6 documents6 sources
Severity
8.8HIGHNVD
EPSS
0.4%
top 36.34%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 22

Description

Use after free in WebRTC in Google Chrome on Windows prior to 110.0.5481.177 allowed a remote attacker who convinced the user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages6 packages

CVEListV5google/chrome110.0.5481.177110.0.5481.177
NVDgoogle/chrome< 110.0.5481.177
debiandebian/chromium< chromium 110.0.5481.177-1 (bookworm)
Debianchromium/chromium< 110.0.5481.177-1~deb11u1+3

🔴Vulnerability Details

2
OSV
CVE-2023-0932: Use after free in WebRTC in Google Chrome on Windows prior to 1102023-02-22
GHSA
GHSA-hh2g-39pc-2575: Use after free in WebRTC in Google Chrome on Windows prior to 1102023-02-22

📋Vendor Advisories

3
Chrome
Stable Channel Desktop Update: CVE-2023-09322023-02-22
Microsoft
Chromium: CVE-2023-0932 Use after free in WebRTC2023-02-14
Debian
CVE-2023-0932: chromium - Use after free in WebRTC in Google Chrome on Windows prior to 110.0.5481.177 all...2023