Risk | High |
Patch available | YES |
Number of vulnerabilities | 6 |
CVE-ID | CVE-2022-3445 CVE-2022-3446 CVE-2022-3447 CVE-2022-3448 CVE-2022-3449 CVE-2022-3450 |
CWE-ID | CWE-416 CWE-122 CWE-358 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Google Chrome Client/Desktop applications / Web browsers |
Vendor |
This security bulletin contains information about 6 vulnerabilities.
EUVDB-ID: #VU68241
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-3445
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error within the Skia component in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to version 106.0.5249.119.
Vulnerable software versionsGoogle Chrome: 70.0.3538.67 - 106.0.5249.103
http://chromereleases.googleblog.com/2022/10/stable-channel-update-for-desktop_11.html
http://crbug.com/1364604
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-3445
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU68242
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-3446
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted HTML content in WebSQL. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
MitigationUpdate to version 106.0.5249.119.
Vulnerable software versionsGoogle Chrome: 70.0.3538.67 - 106.0.5249.103
http://chromereleases.googleblog.com/2022/10/stable-channel-update-for-desktop_11.html
http://crbug.com/1368076
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-3446
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU68243
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2022-3447
CWE-ID:
CWE-358 - Improperly Implemented Security Check for Standard
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to incorrect implementation in Custom Tabs in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it and compromise the system.
MitigationUpdate to version 106.0.5249.119.
Vulnerable software versionsGoogle Chrome: 70.0.3538.67 - 106.0.5249.103
http://chromereleases.googleblog.com/2022/10/stable-channel-update-for-desktop_11.html
http://crbug.com/1366582
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-3447
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU68244
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-3448
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error within the Permissions API component in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to version 106.0.5249.119.
Vulnerable software versionsGoogle Chrome: 70.0.3538.67 - 106.0.5249.103
http://chromereleases.googleblog.com/2022/10/stable-channel-update-for-desktop_11.html
http://crbug.com/1363040
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU68245
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-3449
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error within the Safe Browsing component in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to version 106.0.5249.119.
Vulnerable software versionsGoogle Chrome: 70.0.3538.67 - 106.0.5249.103
http://chromereleases.googleblog.com/2022/10/stable-channel-update-for-desktop_11.html
http://crbug.com/1364662
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-3449
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU68246
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-3450
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error within the Peer Connection component in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to version 106.0.5249.119.
Vulnerable software versionsGoogle Chrome: 70.0.3538.67 - 106.0.5249.103
http://chromereleases.googleblog.com/2022/10/stable-channel-update-for-desktop_11.html
http://crbug.com/1369882
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-3450
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?