CVE-2023-6706Use After Free in Google Chrome

CWE-416Use After Free7 documents6 sources
Severity
8.8HIGHNVD
EPSS
0.3%
top 43.41%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 14
Latest updateJan 18

Description

Use after free in FedCM in Google Chrome prior to 120.0.6099.109 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages6 packages

CVEListV5google/chrome120.0.6099.109120.0.6099.109
NVDgoogle/chrome< 120.0.6099.109
debiandebian/chromium< chromium 120.0.6099.109-1~deb12u1 (bookworm)
Debianchromium/chromium< 120.0.6099.109-1~deb11u1+3

🔴Vulnerability Details

2
GHSA
GHSA-jqrg-rvpw-5fw5: Use after free in FedCM in Google Chrome prior to 1202023-12-15
OSV
CVE-2023-6706: Use after free in FedCM in Google Chrome prior to 1202023-12-14

📋Vendor Advisories

4
Chrome
Long Term Support Channel Update for ChromeOS: CVE-2023-67062024-01-18
Microsoft
Chromium: CVE-2023-6706 Use after free in FedCM2023-12-12
Chrome
Stable Channel Update for Desktop: CVE-2023-67052023-12-12
Debian
CVE-2023-6706: chromium - Use after free in FedCM in Google Chrome prior to 120.0.6099.109 allowed a remot...2023