CVE-2023-3731

Use after free in Diagnostics in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)
References
Link Resource
https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-chromeos.html Vendor Advisory
https://crbug.com/1441306 Exploit Issue Tracking Permissions Required Vendor Advisory
https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-chromeos.html Vendor Advisory
https://crbug.com/1441306 Exploit Issue Tracking Permissions Required Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*

History

21 Nov 2024, 08:17

Type Values Removed Values Added
Summary
  • (es) user-after-free en Diagnósticos en Google Chrome en ChromeOS anterior a 115.0.5790.131 permitía a un atacante, que convenció a un usuario para instalar una extensión maliciosa, explotar potencialmente la corrupción del montículo a través de una extensión de Chrome manipulada. (Gravedad de seguridad de Chromium: Alta)
References () https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-chromeos.html - Vendor Advisory () https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-chromeos.html - Vendor Advisory
References () https://crbug.com/1441306 - Exploit, Issue Tracking, Permissions Required, Vendor Advisory () https://crbug.com/1441306 - Exploit, Issue Tracking, Permissions Required, Vendor Advisory

Information

Published : 2023-08-01 23:15

Updated : 2024-11-21 08:17


NVD link : CVE-2023-3731

Mitre link : CVE-2023-3731

CVE.ORG link : CVE-2023-3731


JSON object : View

Products Affected

google

  • chrome
  • chrome_os
CWE
CWE-416

Use After Free