CVE-2019-13767

Name
CVE-2019-13767
Description
Use after free in media picker in Google Chrome prior to 79.0.3945.88 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Permissions Required https://crbug.com/1031653
Vendor Advisory https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop_17.html
Third Party Advisory http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00005.html
Third Party Advisory https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/
Third Party Advisory https://seclists.org/bugtraq/2020/Jan/27
Third Party Advisory https://www.debian.org/security/2020/dsa-4606
MISC http://packetstormsecurity.com/files/156563/Chrome-DesktopMediaPickerController-WebContentsDestroyed-Use-After-Free.html
GENTOO https://security.gentoo.org/glsa/202003-08

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* chrome >= None < 79.0.3945.88

Vulnerable and fixed packages

Source package Branch Version Maintainer Status