CVE-2024-0222Use After Free in Google Chrome

CWE-416Use After Free12 documents9 sources
Severity
8.8HIGHNVD
EPSS
0.6%
top 31.70%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 4
Latest updateJan 9

Description

Use after free in ANGLE in Google Chrome prior to 120.0.6099.199 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

CVEListV5google/chrome120.0.6099.199120.0.6099.199
NVDgoogle/chrome< 120.0.6099.199
Debianchromium/chromium< 120.0.6099.199-1~deb11u1+3

Also affects: Fedora 38, 39

🔴Vulnerability Details

3
OSV
CVE-2024-0222: Use after free in ANGLE in Google Chrome prior to 1202024-01-04
CVEList
CVE-2024-0222: Use after free in ANGLE in Google Chrome prior to 1202024-01-04
GHSA
GHSA-c87c-56pw-mwgh: Use after free in ANGLE in Google Chrome prior to 1202024-01-04

📋Vendor Advisories

3
Microsoft
Chromium: CVE-2024-0222 Use after free in ANGLE2024-01-09
Chrome
Stable Channel Update for Desktop: CVE-2024-02222024-01-03
Debian
CVE-2024-0222: chromium - Use after free in ANGLE in Google Chrome prior to 120.0.6099.199 allowed a remot...2024

🕵️Threat Intelligence

5
Trendmicro
The January 2024 Security Update Review2024-01-09
Trendmicro
The January 2024 Security Update Review2024-01-09
Trendmicro
The January 2024 Security Update Review2024-01-09
Bleepingcomputer
Microsoft January 2024 Patch Tuesday fixes 49 flaws, 12 RCE bugs2024-01-09
Trendmicro
The January 2024 Security Update Review2024-01-09
CVE-2024-0222 — Use After Free in Google Chrome | cvebase