6.8
CVSSv2

CVE-2019-13720

Published: 25/11/2019 Updated: 15/02/2024
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 606
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Use after free in WebAudio in Google Chrome before 78.0.3904.87 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google chrome

opensuse leap 15.1

Vendor Advisories

Synopsis Important: chromium-browser security update Type/Severity Security Advisory: Important Topic An update for chromium-browser is now available for Red Hat Enterprise Linux 6 SupplementaryRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability S ...
Several vulnerabilities have been discovered in the chromium web browser CVE-2019-5869 Zhe Jin discovered a use-after-free issue CVE-2019-5870 Guang Gong discovered a use-after-free issue CVE-2019-5871 A buffer overflow issue was discovered in the skia library CVE-2019-5872 Zhe Jin discovered a use-after-free issue CVE-2019-58 ...
A use-after-free vulnerability has been found in the audio component of the chromium browser before 780390487 Google is aware of reports that an exploit for this vulnerability exists in the wild ...

Exploits

Google Chrome version 780390470 suffers from a use-after-free vulnerability that allows for remote code execution ...

Github Repositories

POC for CVE-2019-13720

cve-2019-13720 CVE-2019-13720 Exploit Tools 05 Nov 2019: Release POC: wwwyoutubecom/watch?v=0HdRJImwYww 06 Nov 2019: Release Tool cve201913720@gmailcom

PoC of CVE

CVE-2019-13720(aka WizardOpium) PoC work chrome version under 780390470 The original authors(Kaspersky Lab) have full license over all code You can see more information on here:(bugschromiumorg/p/chromium/issues/detail?id=1019226)

Recent Articles

The zero-day exploits of Operation WizardOpium
Securelist • Boris Larin Alexey Kulaev • 28 May 2020

Back in October 2019 we detected a classic watering-hole attack on a North Korea-related news site that exploited a chain of Google Chrome and Microsoft Windows zero-days. While we’ve already published blog posts briefly describing this operation (available here and here), in this blog post we’d like to take a deep technical dive into the exploits and vulnerabilities used in this attack. In the original blog post we described the exploit loader responsible for initial validation of the targe...

Mind the gap: Google patches holes in Chrome – exploit already out there for one of them after duo spot code fix
The Register • Thomas Claburn in San Francisco • 25 Feb 2020

Pair engineer malicious code from public source tweak before official binary releases If you're running Windows, I feel bad for you, son. Microsoft's got 99 problems, better fix each one

Google has updated Chrome for Linux, Mac, and Windows to address three security vulnerabilities – and exploit code for one of them is already public, so get patching. In a release note on Monday, Krishna Govind, a test engineer at Google, said Chrome version 80.0.3987.122 addresses three flaws identified by various researchers. Each is rated high severity. One, reported by André Bargull, is an integer-overflow bug in International Components for Unicode (ICU), a set of libraries for C/C++ and...

Chrome bug squashed, QNAP NAS nasty hits, BlueKeep malware spreads, and more
The Register • Shaun Nichols in San Francisco • 04 Nov 2019

Including Spanish camgirl sites spill info, domain registrars hacked

Roundup Let's check out some of the more recent security happenings beyond what we've already covered. Anyone running Chrome will want to update and restart their browser in order to make sure they have the latest build, as usual. Google has patched a bunch of flaws including a use-after-free() vulnerability (CVE-2019-13720) that was being actively exploited in the wild against victims. Make sure you're running version 78.0.3904.87 or higher for Windows, Mac, and Linux to be safe. More technical...

Chrome 0-day exploit CVE-2019-13720 used in Operation WizardOpium
Securelist • AMR GReAT • 01 Nov 2019

Kaspersky Exploit Prevention is a component part of Kaspersky products that has successfully detected a number of zero-day attacks in the past. Recently, it caught a new unknown exploit for Google’s Chrome browser. We promptly reported this to the Google Chrome security team. After reviewing of the PoC we provided, Google confirmed there was a zero-day vulnerability and assigned it CVE-2019-13720. Google has released Chrome version 78.0.3904.87 for Windows, Mac, and Linux and we recommend all ...