First published: Sat Sep 30 2017(Updated: )
A stack buffer overflow in NumberingSystem in International Components for Unicode (ICU) for C/C++ before 60.2, as used in V8 in Google Chrome prior to 62.0.3202.75 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Credit: Yuan Deng Ant cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/chromium-browser | ||
debian/libv8 | ||
redhat/Chrome | <62.0.3202.75 | 62.0.3202.75 |
Google Chrome (Trace Event) | <62.0.3202.75 | 62.0.3202.75 |
Google Chrome | <62.0.3202.75 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Debian Linux | =8.0 | |
Debian Linux | =9.0 | |
Debian Linux | =10.0 | |
ICU (International Components for Unicode) | <60.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15396 is considered a high severity vulnerability due to its potential for remote exploitation leading to heap corruption.
To fix CVE-2017-15396, update to Google Chrome version 62.0.3202.75 or later.
CVE-2017-15396 affects Google Chrome versions prior to 62.0.3202.75, along with ICU for C/C++ versions before 60.2.
CVE-2017-15396 is a stack buffer overflow vulnerability.
Yes, CVE-2017-15396 can potentially be exploited remotely via a crafted HTML page.