Risk | High |
Patch available | YES |
Number of vulnerabilities | 5 |
CVE-ID | CVE-2022-4437 CVE-2022-4436 CVE-2022-42720 CVE-2022-41674 CVE-2022-42719 |
CWE-ID | CWE-416 CWE-119 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Chrome OS Operating systems & Components / Operating system |
Vendor |
This security bulletin contains information about 5 vulnerabilities.
EUVDB-ID: #VU70359
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-4437
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error within the Mojo IPC component in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsChrome OS: before 102.0.5005.194
http://chromereleases.googleblog.com/2023/01/long-term-support-channel-update-for_5.html
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70358
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-4436
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error within the Blink Media component in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsChrome OS: before 102.0.5005.194
http://chromereleases.googleblog.com/2023/01/long-term-support-channel-update-for_5.html
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU68314
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-42720
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in the mac80211 stack in Linux kernel when parsing a multi-BSS element. A remote attacker on the local network can send specially crafted WLAN frames to the affected system, trigger a use-after-free error and execute arbitrary code. MitigationInstall update from vendor's website.
Vulnerable software versionsChrome OS: before 102.0.5005.194
http://chromereleases.googleblog.com/2023/01/long-term-support-channel-update-for_5.html
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU68311
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-41674
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing WLAN frames within the ieee80211_bss_info_update() function in net/mac80211/scan.c in Linux kernel. A remote attacker on the local network can send specially crafted WLAN frames to the affected system, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsChrome OS: before 102.0.5005.194
http://chromereleases.googleblog.com/2023/01/long-term-support-channel-update-for_5.html
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU68313
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-42719
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in the mac80211 stack in Linux kernel when parsing a multi-BSSID element. A remote attacker on the local network can send specially crafted WLAN frames to the affected system, trigger a use-after-free error and execute arbitrary code.
Install update from vendor's website.
Vulnerable software versionsChrome OS: before 102.0.5005.194
http://chromereleases.googleblog.com/2023/01/long-term-support-channel-update-for_5.html
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?