Description
Use after free in WebRTC in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to potentially exploit heap corruption via a crafted SCTP packet.
References
https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html
Release NotesVendor Advisory
ExploitIssue TrackingPatchThird Party Advisory
https://security.gentoo.org/glsa/202107-06
Third Party Advisory
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 · High
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Modified
Published
2021-06-07T20:15:08.420
4 years agoLast modified
2023-11-07T03:33:04.040
1 year ago