CVE-2021-37979
Advisory lineage Upstream: 0 Downstream: 9
Modified
Published: 02 Nov 2021, 20:25
Last modified:04 Aug 2024, 01:30
Vulnerability Summary
Overall Risk (default)
medium
46/100 CVSS Score
8.8 HIGH
v3.1 (nvd)
EPSS Score
1.71% LOW
2% probability 0.00%
KEV
Not listed
Ransomware
No reports
Public exploits
1 found
Dark Web
Not detected
Timeline
02 Nov 2021, 20:25
Published
Vulnerability first disclosed
04 Aug 2024, 01:30
Last Modified
Vulnerability information updated
Description
heap buffer overflow in WebRTC in Google Chrome prior to 94.0.4606.81 allowed a remote attacker who convinced a user to browse to a malicious website to potentially exploit heap corruption via a crafted HTML page.
CVSS Metrics
- v3.1•HIGH•Score: 8.8CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- v2.0•MEDIUM•Score: 6.8AV:N/AC:M/Au:N/C:P/I:P/A:P
EPSS Trends
Current EPSS score: 1.71%• Percentile: 82%
Techniques & Countermeasures
- CWE-787•Out-of-bounds Write
The product writes data past the end, or before the beginning, of the intended buffer.
Affected Systems
- debian•debian_linux
10.0 | 11.0
- fedoraproject•fedora
33
- Unknown•Chrome
< 94.0.4606.81 | ≥ unspecified, < 94.0.4606.81
References (5)
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop.html
- https://crbug.com/1247260
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RNARCF5HEZK7GJXZRN5TQ45AQDCRM2WO/
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1372
- https://www.debian.org/security/2022/dsa-5046