← Voltar para CVEs
CVE-2023-6345
CRITICALCISA KEV9.6
Descricao
Integer overflow in Skia in Google Chrome prior to 119.0.6045.199 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a malicious file. (Chromium security severity: High)
Detalhes CVE
Pontuacao CVSS v3.19.6
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioREQUIRED
Publicado11/29/2023
Ultima modificacao10/24/2025
Fontekev
Avistamentos honeypot0
CISA KEV
FornecedorGoogle
ProdutoChromium Skia
Nome da vulnerabilidadeGoogle Skia Integer Overflow Vulnerability
Data inclusao KEV2023-11-30
Prazo de remediacao2023-12-21
Uso em ransomwareUnknown
Produtos afetados
debian:debian_linuxfedoraproject:fedoragoogle:chromemicrosoft:edge_chromium
Fraquezas (CWE)
CWE-190CWE-190
Referencias
https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html(chrome-cve-admin@google.com)
https://crbug.com/1505053(chrome-cve-admin@google.com)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T7ABNYMOI4ZHVCSPCNP7HQTOLGF53A2/(chrome-cve-admin@google.com)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR/(chrome-cve-admin@google.com)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJROPNKWW65R34J4IYGTJ7A3OBPUL4IQ/(chrome-cve-admin@google.com)
https://security.gentoo.org/glsa/202401-34(chrome-cve-admin@google.com)
https://www.debian.org/security/2023/dsa-5569(chrome-cve-admin@google.com)
https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html(af854a3a-2127-422b-91ae-364da2661108)
https://crbug.com/1505053(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T7ABNYMOI4ZHVCSPCNP7HQTOLGF53A2/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJROPNKWW65R34J4IYGTJ7A3OBPUL4IQ/(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202401-34(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2023/dsa-5569(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-6345(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.