CVE-2018-18342

high

Description

Execution of user supplied Javascript during object deserialization can update object length leading to an out of bounds write in V8 in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.

References

http://www.securityfocus.com/bid/106084

https://access.redhat.com/errata/RHSA-2018:3803

https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html

https://crbug.com/906313

https://security.gentoo.org/glsa/201908-18

https://www.debian.org/security/2018/dsa-4352

Details

Source: MITRE

Published: 2018-12-11

Updated: 2020-08-24

Type: CWE-787

Risk Information

CVSS v2

Base Score: 6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 2.8

Severity: HIGH