Vulnerability Name: | CVE-2021-21198 (CCN-199175) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2020-12-21 | ||||||||||||||||||||||||||||||||||||
Published: | 2021-03-30 | ||||||||||||||||||||||||||||||||||||
Updated: | 2021-06-07 | ||||||||||||||||||||||||||||||||||||
Summary: | Out of bounds read in IPC in Google Chrome prior to 89.0.4389.114 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.4 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N) 6.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C)
5.9 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-125 | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-21198 Source: MISC Type: Third Party Advisory, VDB Entry http://packetstormsecurity.com/files/162973/Chrome-Legacy-ipc-Message-Passed-Via-Shared-Memory.html Source: CCN Type: Google Chrome Releases Web site Stable Channel Update for Desktop Source: MISC Type: Release Notes, Vendor Advisory https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop_30.html Source: MISC Type: Permissions Required, Vendor Advisory https://crbug.com/1184399 Source: XF Type: UNKNOWN google-chrome-cve202121198-info-disc(199175) Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-ff893e12c5 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-35d2bb4627 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-c3754414e7 Source: CCN Type: Packet Storm Security [06-04-2021] Chrome Legacy ipc::Message Passed Via Shared Memory Source: GENTOO Type: Third Party Advisory GLSA-202104-08 | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: ![]() | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |