CVE-2024-3516
Advisory lineage Upstream: 0 Downstream: 5
Modified
Published: 10 Apr 2024, 18:41
Last modified:13 Mar 2025, 17:44
Vulnerability Summary
Overall Risk (default)
medium
45/100 CVSS Score
8.8 HIGH
v3.1 (cve.org)
EPSS Score
0.56% LOW
1% probability -0.17%
KEV
Not listed
Ransomware
No reports
Public exploits
1 found
Dark Web
Not detected
Timeline
10 Apr 2024, 18:41
Published
Vulnerability first disclosed
13 Mar 2025, 17:44
Last Modified
Vulnerability information updated
Description
Heap buffer overflow in ANGLE in Google Chrome prior to 123.0.6312.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVSS Metrics
- v3.1•HIGH•Score: 8.8CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- v3.1•MEDIUM•Score: 6.5CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
EPSS Trends
Current EPSS score: 0.56%• Percentile: 68%
Techniques & Countermeasures
- CWE-787•Out-of-bounds Write
The product writes data past the end, or before the beginning, of the intended buffer.
- CWE-122•Heap-based Buffer Overflow
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Affected Systems
- fedoraproject•fedora
38 | 39 | 40
- Unknown•Chrome
≥ 123.0.6312.122, < 123.0.6312.122 | < 123.0.6312.122
References (5)
- https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_10.html
- https://issues.chromium.org/issues/328859176
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDHNEFD76ORM7WBWAEZT6HSYDMZVIED4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EW66LXDACTB5FCHLUPZOGD2KA2J62Q2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP/