CVE-2024-3833
Advisory lineage Upstream: 0 Downstream: 5
Analyzed
Published: 17 Apr 2024, 07:46
Last modified:13 Feb 2025, 17:53
Vulnerability Summary
Overall Risk (default)
medium
46/100 CVSS Score
8.8 HIGH
v3.1 (cve.org)
EPSS Score
4.15% LOW
4% probability +0.11%
KEV
Not listed
Ransomware
No reports
Public exploits
1 found
Dark Web
Not detected
Timeline
17 Apr 2024, 07:46
Published
Vulnerability first disclosed
13 Feb 2025, 17:53
Last Modified
Vulnerability information updated
Description
Object corruption in WebAssembly in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)
CVSS Metrics
- v3.1•HIGH•Score: 8.8CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Trends
Current EPSS score: 4.15%• Percentile: 89%
Techniques & Countermeasures
- CWE-374•Passing Mutable Objects to an Untrusted Method
The product sends non-cloned mutable data as an argument to a method or function.
Affected Systems
- fedoraproject•fedora
38 | 39 | 40
- Unknown•Chrome
≥ 124.0.6367.60, < 124.0.6367.60 | < 124.0.6367.60
References (8)
- https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html
- https://issues.chromium.org/issues/331383939
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/