First published: Tue Jun 06 2017(Updated: )
Use after free in print preview in Blink in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac, and 59.0.3071.92 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Chrome | <59.0.3071.86 | 59.0.3071.86 |
Google Chrome (Trace Event) | <59.0.3071.86 | |
Apple iOS and macOS | ||
Linux Kernel | ||
Microsoft Windows | ||
Google Chrome (Trace Event) | <59.0.3071.92 | |
Android | ||
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5073 has been assigned a high severity rating due to its potential to allow remote exploitation via crafted HTML.
To fix CVE-2017-5073, update Google Chrome to version 59.0.3071.86 or later.
CVE-2017-5073 affects Google Chrome versions prior to 59.0.3071.86 for Linux, Windows, and Mac, and earlier than 59.0.3071.92 for Android.
CVE-2017-5073 is a use-after-free vulnerability in the print preview component of Blink in Google Chrome.
Yes, CVE-2017-5073 allows a remote attacker to perform an out-of-bounds memory read via a crafted HTML page.