First published: Tue Jun 06 2017(Updated: )
Insufficient validation of untrusted input in V8 in Google Chrome prior to 59.0.3071.86 for Linux, Windows and Mac, and 59.0.3071.92 for Android allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Chrome | <59.0.3071.86 | 59.0.3071.86 |
Google Chrome (Trace Event) | <59.0.3071.86 | |
Apple iOS and macOS | ||
Linux Kernel | ||
Microsoft Windows | ||
Google Chrome (Trace Event) | <59.0.3071.92 | |
Android | ||
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5071 is classified as a high severity vulnerability due to the potential for remote exploitation via crafted HTML.
To fix CVE-2017-5071, update Google Chrome to version 59.0.3071.86 or later.
CVE-2017-5071 affects Google Chrome versions prior to 59.0.3071.86 on Linux, Windows, and Mac, as well as version 59.0.3071.92 on Android.
CVE-2017-5071 is an out of bounds read vulnerability identified in the V8 engine of Google Chrome.
Yes, CVE-2017-5071 can be exploited remotely through a specially crafted HTML page.