8.8
CVSSv3

CVE-2018-6092

Published: 04/12/2018 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 685
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

An integer overflow on 32-bit systems in WebAssembly in Google Chrome before 66.0.3359.117 allowed a remote malicious user to execute arbitrary code inside a sandbox via a crafted HTML page.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google chrome

redhat linux desktop 6.0

redhat linux workstation 6.0

redhat linux server 6.0

debian debian linux 8.0

debian debian linux 9.0

Vendor Advisories

Synopsis Critical: chromium-browser security update Type/Severity Security Advisory: Critical Topic An update for chromium-browser is now available for Red Hat Enterprise Linux 6 SupplementaryRed Hat Product Security has rated this update as having a security impact of Critical A Common Vulnerability Scor ...
Several vulnerabilities have been discovered in the chromium web browser CVE-2018-6056 lokihardt discovered an error in the v8 javascript library CVE-2018-6057 Gal Beniamini discovered errors related to shared memory permissions CVE-2018-6060 Omair discovered a use-after-free issue in blink/webkit CVE-2018-6061 Guang Gong disco ...
An integer overflow on 32-bit systems in WebAssembly in Google Chrome prior to 6603359117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page ...
An integer overflow vulnerability has been found in the WebAssembly component of the Chromium browser before 6603359117 ...

Exploits

/* When v8 decodes the locals of a function, it performs a check: if ((count + type_list->size()) > kV8MaxWasmFunctionLocals) { decoder->error(decoder->pc() - 1, "local count too large"); return false; } On a 32-bit platform, this check can be bypassed due to an integer overflow This allows the number of functio ...