Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:45634
HistoryFeb 26, 2024 - 8:26 a.m.

Use After Free

2024-02-2608:26:26
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
12
chromium
vulnerability
memory handling
heap corruption
ui gestures
renderer process

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

6.9

Confidence

High

EPSS

0

Percentile

15.5%

chromium is vulnerable to Use After Free. The vulnerability arises due to improper handling of memory after it has been freed. This allows an attacker who has compromised the renderer process to potentially exploit heap corruption via specific UI gestures.

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

6.9

Confidence

High

EPSS

0

Percentile

15.5%