4.3
CVSSv2

CVE-2017-15396

Published: 28/08/2018 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

A stack buffer overflow in NumberingSystem in International Components for Unicode (ICU) for C/C++ prior to 60.2, as used in V8 in Google Chrome prior to 62.0.3202.75 and other products, allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google chrome

redhat enterprise linux desktop 6.0

redhat enterprise linux server 6.0

redhat enterprise linux workstation 6.0

debian debian linux 8.0

debian debian linux 9.0

debian debian linux 10.0

icu-project international components for unicode

Vendor Advisories

Synopsis Important: chromium-browser security update Type/Severity Security Advisory: Important Topic An update for chromium-browser is now available for Red Hat Enterprise Linux 6 SupplementaryRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability S ...
Several vulnerabilities have been discovered in the chromium web browser In addition, this message serves as an annoucment that security support for chromium in the oldstable release (jessie), Debian 8, is now discontinued Debian 8 chromium users that desire continued security updates are strongly encouraged to upgrade now to the current stable r ...
A stack buffer overflow in NumberingSystem in International Components for Unicode (ICU) for C/C++ before 602, as used in V8 in Google Chrome prior to 620320275 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page ...
A stack overflow has been found in the V8 component of the chromium browser < 620320275 ...