Vulnerability Name: | CVE-2021-4098 (CCN-215051) | ||||||||||||||||||||||||||||
Assigned: | 2021-12-13 | ||||||||||||||||||||||||||||
Published: | 2021-12-13 | ||||||||||||||||||||||||||||
Updated: | 2022-02-18 | ||||||||||||||||||||||||||||
Summary: | Insufficient data validation in Mojo in Google Chrome prior to 96.0.4664.110 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.4 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N) 6.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N/E:P/RL:O/RC:C)
7.9 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
| ||||||||||||||||||||||||||||
Vulnerability Type: | CWE-20 | ||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-4098 Source: CCN Type: Google Chrome Releases Web site Stable Channel Update for Desktop Source: MISC Type: Release Notes, Vendor Advisory https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop_13.html Source: MISC Type: Permissions Required, Vendor Advisory https://crbug.com/1263457 Source: XF Type: UNKNOWN google-chrome-cve20214098-code-exec(215051) Source: CCN Type: Packet Storm Security [01-13-2022] Chrome IPC::ChannelAssociatedGroupController Memory Corruption Source: CCN Type: SNYK-JS-ELECTRON-2332173 Improper Input Validation | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
BACK |