6.8
CVSSv2

CVE-2017-5121

Published: 27/10/2017 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Inappropriate use of JIT optimisation in V8 in Google Chrome before 61.0.3163.100 for Linux, Windows, and Mac allowed a remote malicious user to execute arbitrary code inside a sandbox via a crafted HTML page, related to the escape analysis phase.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google chrome

debian debian linux 9.0

debian debian linux 10.0

redhat enterprise linux desktop 6.0

redhat enterprise linux server 6.0

redhat enterprise linux workstation 6.0

Vendor Advisories

Synopsis Important: chromium-browser security update Type/Severity Security Advisory: Important Topic An update for chromium-browser is now available for Red Hat Enterprise Linux 6 SupplementaryRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability S ...
Several vulnerabilities have been discovered in the chromium web browser CVE-2017-5111 Luat Nguyen discovered a use-after-free issue in the pdfium library CVE-2017-5112 Tobias Klein discovered a buffer overflow issue in the webgl library CVE-2017-5113 A buffer overflow issue was discovered in the skia library CVE-2017-5114 ...
An out-of-bounds access has been found in the V8 component of the chromium browser before 6103163100 ...

Github Repositories

Exploitation techniques to bypass Clang CFI when applied to Chromium

Clang Control Flow Integrity (CFI) Bypass Techniques In the following we demonstrate three exploitation techniques to bypass Clang's CFI implementation [0] when applied to Chromium [1] Clang implements fine-grained CFI, hence, unlike Microsoft's/Intel's CFI implementation CFGuard/CET, it cannot be bypassed using COOP [3] The first two proof-of-concept exploits