CVE-2023-3727Use After Free in Google Chrome

CWE-416Use After Free7 documents7 sources
Severity
8.8HIGHNVD
EPSS
0.5%
top 33.45%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 1
Latest updateMay 22

Description

Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages6 packages

CVEListV5google/chrome115.0.5790.98115.0.5790.98
NVDgoogle/chrome< 115.0.5790.98
debiandebian/chromium< chromium 115.0.5790.98-1~deb12u1 (bookworm)
Debianchromium/chromium< 115.0.5790.98-1~deb11u1+3

🔴Vulnerability Details

2
GHSA
GHSA-m6r7-j99r-j8cp: Use after free in WebRTC in Google Chrome prior to 1152023-08-02
OSV
CVE-2023-3727: Use after free in WebRTC in Google Chrome prior to 1152023-08-01

📋Vendor Advisories

3
Chrome
Stable Channel Update for Desktop: CVE-2023-37272023-07-18
Microsoft
Chromium: CVE-2023-3727 Use after free in WebRTC2023-07-11
Debian
CVE-2023-3727: chromium - Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remot...2023

💬Community

1
Bugzilla
CVE-2023-52745 kernel: IB/IPoIB: Fix legacy IPoIB due to wrong number of queues2024-05-22