CVE-2023-3729

Use after free in Splitscreen in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions. (Chromium security severity: High)
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*

History

21 Nov 2024, 08:17

Type Values Removed Values Added
Summary
  • (es) Vulnerabilidad de use-after-free en Splitscreen en Google Chrome en ChromeOS antes de 115.0.5790.131 permitió a un atacante remoto que convenció a un usuario a participar en interacciones específicas de interfaz de usuario para explotar potencialmente corrupción del montículo a través de las interacciones de interfaz de usuario de crafted. (Gravedad de seguridad de Chromium: Alta)
References () https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-chromeos.html - () https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-chromeos.html -
References () https://crbug.com/1451803 - Exploit, Issue Tracking, Permissions Required, Vendor Advisory () https://crbug.com/1451803 - Exploit, Issue Tracking, Permissions Required, Vendor Advisory

Information

Published : 2023-08-01 23:15

Updated : 2024-11-21 08:17


NVD link : CVE-2023-3729

Mitre link : CVE-2023-3729

CVE.ORG link : CVE-2023-3729


JSON object : View

Products Affected

google

  • chrome
  • chrome_os
CWE
CWE-416

Use After Free