CVE-2024-4671

critical

Description

Use after free in Visuals in Google Chrome prior to 124.0.6367.201 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

References

https://thecyberthrone.in/2024/06/02/thecyberthrone-cybersecurity-newsletter-top-5-articles-may-2024/

https://securityaffairs.com/163285/cyber-crime/cisa-google-chrome-zero-day-known-exploited-vulnerabilities-catalog.html

https://www.hivepro.com/threat-digest/attacks-vulnerabilities-and-actors-6-to-12-may-2024/

https://www.bleepingcomputer.com/news/security/google-chrome-emergency-update-fixes-6th-zero-day-exploited-in-2024/?&web_view=true

https://www.schneier.com/blog/archives/2024/05/another-chrome-vulnerability.html

https://www.theregister.com/2024/05/13/infosec_in_brief/

https://blog.qualys.com/vulnerabilities-threat-research/2024/05/10/get-weekends-back-put-chrome-cves-like-cve-2024-4671-on-auto-patching

https://arstechnica.com/security/2024/05/google-patches-its-fifth-zero-day-vulnerability-of-the-year-in-chrome/

https://www.zdnet.com/article/update-your-chrome-browser-asap-google-has-confirmed-a-zero-day-exploited-in-the-wild/#ftag=RSSbaffb68

https://www.hivepro.com/threat-advisory/google-chrome-fixes-zero-day-cve-2024-4671-exploited-in-the-wild/

https://thecyberthrone.in/2024/05/10/google-patches-emergency-zeroday-vulnerability-in-chrome-cve-2024-4671/

https://securityaffairs.com/162976/hacking/5th-chrome-zero-day-2024.html

https://www.bleepingcomputer.com/news/security/google-fixes-fifth-chrome-zero-day-vulnerability-exploited-in-attacks-in-2024/?&web_view=true

https://www.bleepingcomputer.com/news/security/google-fixes-fifth-chrome-zero-day-vulnerability-exploited-in-attacks-in-2024/

https://thehackernews.com/2024/05/chrome-zero-day-alert-update-your.html

https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_9.html

https://lists.fedoraproject.org/archives/list/[email protected]/message/WSUWM73ZCXTN62AT2REYQDD5ZKPFMDZD/

https://lists.fedoraproject.org/archives/list/[email protected]/message/NTSN22LNYXMWHVTYNOYQVOY7VDZFHENQ/

https://lists.fedoraproject.org/archives/list/[email protected]/message/FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N/

https://lists.fedoraproject.org/archives/list/[email protected]/message/BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F/

https://lists.fedoraproject.org/archives/list/[email protected]/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/

https://issues.chromium.org/issues/339266700

https://issues.chromium.org/issues/339266700

https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_9.html

https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_9.html

Details

Source: Mitre, NVD

Published: 2024-05-14

Updated: 2024-07-03

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Severity: Critical