Vulnerability Name:

CVE-2021-21198 (CCN-199175)

Assigned:2020-12-21
Published:2021-03-30
Updated:2021-06-07
Summary:Out of bounds read in IPC in Google Chrome prior to 89.0.4389.114 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
CVSS v3 Severity:7.4 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N)
6.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): None
6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)
5.9 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-125
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2021-21198

Source: MISC
Type: Third Party Advisory, VDB Entry
http://packetstormsecurity.com/files/162973/Chrome-Legacy-ipc-Message-Passed-Via-Shared-Memory.html

Source: CCN
Type: Google Chrome Releases Web site
Stable Channel Update for Desktop

Source: MISC
Type: Release Notes, Vendor Advisory
https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop_30.html

Source: MISC
Type: Permissions Required, Vendor Advisory
https://crbug.com/1184399

Source: XF
Type: UNKNOWN
google-chrome-cve202121198-info-disc(199175)

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2021-ff893e12c5

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2021-35d2bb4627

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2021-c3754414e7

Source: CCN
Type: Packet Storm Security [06-04-2021]
Chrome Legacy ipc::Message Passed Via Shared Memory

Source: GENTOO
Type: Third Party Advisory
GLSA-202104-08

Vulnerable Configuration:Configuration 1:
  • cpe:/a:google:chrome:*:*:*:*:*:*:*:* (Version < 89.0.4389.114)

  • Configuration 2:
  • cpe:/o:fedoraproject:fedora:32:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora:33:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora:34:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:112066
    P
    chromedriver-93.0.4577.82-1.1 on GA media (Moderate)
    2022-01-17
    oval:org.opensuse.security:def:105615
    P
    chromedriver-93.0.4577.82-1.1 on GA media (Moderate)
    2021-10-01
    oval:org.opensuse.security:def:111334
    P
    Security update for opera (Important)
    2021-04-22
    oval:org.opensuse.security:def:103152
    P
    Security update for chromium (Important)
    2021-04-07
    oval:org.opensuse.security:def:109809
    P
    Security update for chromium (Important)
    2021-04-07
    oval:org.opensuse.security:def:11194
    P
    Security update for chromium (Important)
    2021-04-07
    oval:org.opensuse.security:def:96462
    P
    Security update for chromium (Important)
    2021-04-07
    oval:org.opensuse.security:def:111302
    P
    Security update for chromium (Important)
    2021-04-05
    BACK
    google chrome *
    fedoraproject fedora 32
    fedoraproject fedora 33
    fedoraproject fedora 34