Heap-based Buffer Overflow Affecting chromium package, versions [,100.0.4896.60)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.22% (61st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-CHROMIUM-2959911
  • published24 Jul 2022
  • disclosed24 Jul 2022
  • creditLeecraso and Guang Gong of 360 Vulnerability Research Institute

Introduced: 24 Jul 2022

CVE-2022-1142  (opens in a new tab)
CWE-122  (opens in a new tab)

How to fix?

Upgrade chromium to version 100.0.4896.60 or higher.

Overview

Affected versions of this package are vulnerable to Heap-based Buffer Overflow via the WebUI component allowing, a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via specific input into DevTools.

When making a search in |string_id_map_|[1], there is no check whether the query result is end(). The out of bounds will occur when using |string_id_map_.end()|.

CVSS Scores

version 3.1