CVE-2023-4362

Heap buffer overflow in Mojom IDL in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process and gained control of a WebUI process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
Configurations

Configuration 1 (hide)

cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*

History

21 Nov 2024, 08:34

Type Values Removed Values Added
References () https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html - Release Notes, Vendor Advisory () https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html - Release Notes, Vendor Advisory
References () https://crbug.com/1316379 - Permissions Required () https://crbug.com/1316379 - Permissions Required
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/ -
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/ - Mailing List, Third Party Advisory () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/ - Mailing List, Third Party Advisory
References () https://security.gentoo.org/glsa/202401-34 - () https://security.gentoo.org/glsa/202401-34 -
References () https://www.debian.org/security/2023/dsa-5479 - Third Party Advisory () https://www.debian.org/security/2023/dsa-5479 - Third Party Advisory
Summary
  • (es) El desbordamiento del búfer heap en Mojom IDL en Google Chrome anterior a 116.0.5845.96 permitía a un atacante remoto que hubiera comprometido el proceso del renderizador y obtenido el control de un proceso WebUI explotar potencialmente la corrupción del heap a través de una página HTML manipulada. (Gravedad de seguridad de Chromium: Media)

31 Jan 2024, 17:15

Type Values Removed Values Added
References
  • () https://security.gentoo.org/glsa/202401-34 -

27 Aug 2023, 03:15

Type Values Removed Values Added
References
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/ -

22 Aug 2023, 15:33

Type Values Removed Values Added
CWE CWE-787
CPE cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
First Time Debian
Google
Debian debian Linux
Google chrome
References
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/ - Mailing List, Third Party Advisory
References (MISC) https://crbug.com/1316379 - (MISC) https://crbug.com/1316379 - Permissions Required
References (MISC) https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html - (MISC) https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html - Release Notes, Vendor Advisory
References (MISC) https://www.debian.org/security/2023/dsa-5479 - (MISC) https://www.debian.org/security/2023/dsa-5479 - Third Party Advisory

18 Aug 2023, 04:15

Type Values Removed Values Added
References
  • (MISC) https://www.debian.org/security/2023/dsa-5479 -

15 Aug 2023, 18:23

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-15 18:15

Updated : 2024-11-21 08:34


NVD link : CVE-2023-4362

Mitre link : CVE-2023-4362

CVE.ORG link : CVE-2023-4362


JSON object : View

Products Affected

debian

  • debian_linux

google

  • chrome
CWE
CWE-787

Out-of-bounds Write