Описание
Insufficient checks of pointer validity in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Insufficient checks of pointer validity in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2019-5760
- https://access.redhat.com/errata/RHSA-2019:0309
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://crbug.com/912074
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6
- https://www.debian.org/security/2019/dsa-4395
- http://www.securityfocus.com/bid/106767
Связанные уязвимости
Insufficient checks of pointer validity in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Insufficient checks of pointer validity in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Insufficient checks of pointer validity in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Insufficient checks of pointer validity in WebRTC in Google Chrome pri ...
Уязвимость реализации технологии WebRTC веб-браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании