NA

CVE-2023-4427

Published: 23/08/2023 Updated: 31/01/2024
CVSS v3 Base Score: 8.1 | Impact Score: 5.2 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

Out of bounds memory access in V8 in Google Chrome before 116.0.5845.110 allowed a remote malicious user to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google chrome

fedoraproject fedora 37

fedoraproject fedora 38

fedoraproject fedora 39

Vendor Advisories

Multiple security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure For the oldstable distribution (bullseye), these problems have been fixed in version 11605845110-1~deb11u1 For the stable distribution (bookworm), these problems have been fixed in version 116 ...
LTS-108 is being updated in the LTS channel to 10805359243 (Platform Version: 151831060) for most ChromeOS devices Want to know more about Long Term Support? Click hereThis update contains multiple Security fixes, including:1479274 High CVE-2023-4863 Heap buffer overflow in Web1472492 High CVE-202 ...
 A new LTC-114 version, 11405735332 (Platform Version: 15437680), was rolled out for most ChromeOS devices If you have devices in the LTC channel, they will be updated to this version The LTS channel remains on LTS-108 until September 26th, 2023 Release notes for LTC-114 can be found here Want to know more about Long-ter ...
The Stable and Extended stable channels has been updated to 11605845110 for Mac and Linux and 11605845110/111 for Windows, which will roll out over the coming days/weeks A full list of changes in this build is available in the logSecurity Fixes and RewardsNote: Access to bug details and links may be kept restricted until a majori ...
Check Point Reference: CPAI-2023-1686 Date Published: 7 May 2024 Severity: High ...

Github Repositories

CVE-2023-4427 CVE-2023-4427 was found by glazunov, and you can find RCA in his report chrome version: 1170593862 in linux from v8ctf I choose a very unstable method To bypass ASLR, use many iframes with different domains in mainhtml to brute high address, you can change your /etc/hosts to implement that locally, if you are a ctfer, you should know it's 1/256 lol, or