← Back to CVEs
CVE-2023-4362
HIGH8.8
Description
Heap buffer overflow in Mojom IDL in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process and gained control of a WebUI process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
CVE Details
CVSS v3.1 Score8.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionREQUIRED
Published8/15/2023
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
debian:debian_linuxgoogle:chrome
Weaknesses (CWE)
CWE-787
References
https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html(chrome-cve-admin@google.com)
https://crbug.com/1316379(chrome-cve-admin@google.com)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/(chrome-cve-admin@google.com)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/(chrome-cve-admin@google.com)
https://security.gentoo.org/glsa/202401-34(chrome-cve-admin@google.com)
https://www.debian.org/security/2023/dsa-5479(chrome-cve-admin@google.com)
https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html(af854a3a-2127-422b-91ae-364da2661108)
https://crbug.com/1316379(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202401-34(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2023/dsa-5479(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.