Remote Heap Corruption Vulnerability in Google Chrome Prior to 120.0.6099.224
CVE-2024-0517

8.8HIGH

Key Information:

Vendor
Google
Status
Vendor
CVE Published:
16 January 2024

Badges

๐Ÿ“ˆ Trended๐Ÿ“ˆ Score: 4,500๐Ÿ‘พ Exploit Exists๐Ÿ“ฐ News Worthy

What is CVE-2024-0517?

CVE-2024-0517 is a remote heap corruption vulnerability found in Google Chrome prior to version 120.0.6099.224. This vulnerability arises from an out-of-bounds write in the V8 JavaScript engine, which could allow an attacker to exploit it through a specially crafted HTML page. The implications of this flaw are severe as it could be leveraged to execute malicious code remotely, compromising the security of users and organizations relying on the browser for safe web interactions.

Technical Details

The vulnerability is categorized as a high-severity flaw within the Chromium security framework. It involves a memory management error related to how the V8 engine handles memory allocation and access. An attacker can exploit this issue by tricking a user into visiting a malicious web page, which can lead to heap corruption, potentially resulting in unstable applications or unauthorized access to system resources. Users on older versions of Google Chrome are particularly at risk if they do not update their browsers to the latest version.

Impact of the Vulnerability

  1. Remote Code Execution: If successfully exploited, this vulnerability could enable attackers to execute arbitrary code on the affected system, leading to full compromise of the device.

  2. Data Breaches: Exploitation of this vulnerability could allow unauthorized access to sensitive data stored on the victim's device or within applications accessed through the browser.

  3. Wider Network Compromise: Organizations could face further security risks, as an exploited browser could act as a foothold for attackers to penetrate deeper into the corporate network, potentially affecting other connected systems.

Affected Version(s)

Chrome 120.0.6099.224

News Articles

Exploit Techniques Archives - Exodus Intelligence

Exodus Blog Category: Exploit Techniques Mind the Patch Gap: Exploiting an io_uring Vulnerability in Ubuntu March 27,...

7 months ago

CVE-2024-0517 - GitHub Advisory Database

GitHub is where people build software. More than 100 million people use GitHub to discover, fork, and contribute to over 420 million projects.

11 months ago

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • ๐Ÿ“ˆ

    Vulnerability started trending

  • ๐Ÿ‘พ

    Exploit known to exist

  • ๐Ÿ“ฐ

    First article discovered by GBHackers on Security

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre DatabaseGoogle Feed9 News Article(s)
.