Kaspersky ID:
KLA51621
Дата обнаружения:
02/08/2023
Обновлено:
25/01/2024

Описание

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. Heap buffer overflow vulnerability in Visuals can be exploited to cause denial of service.
  2. Out of bounds read vulnerability in WebGL can be exploited to cause denial of service.
  3. Data validation vulnerability in Extensions can be exploited to cause denial of service.
  4. Use after free vulnerability in Blink Task Scheduling can be exploited to cause denial of service or execute arbitrary code.
  5. Use after free vulnerability in Cast can be exploited to cause denial of service or execute arbitrary code.
  6. Use after free vulnerability in WebRTC can be exploited to cause denial of service or execute arbitrary code.
  7. Type confusion vulnerability in V8 can be exploited to cause denial of service.
  8. Implementation vulnerability in Extensions can be exploited to cause denial of service.
  9. Out of bounds memory access vulnerability in ANGLE can be exploited to cause denial of service.

Первичный источник обнаружения

Эксплуатация

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Связанные продукты

Список CVE

  • CVE-2023-4071
    critical
  • CVE-2023-4072
    critical
  • CVE-2023-4077
    critical
  • CVE-2023-4074
    critical
  • CVE-2023-4075
    critical
  • CVE-2023-4076
    critical
  • CVE-2023-4069
    critical
  • CVE-2023-4078
    critical
  • CVE-2023-4068
    critical
  • CVE-2023-4073
    critical
  • CVE-2023-4070
    critical

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.