First published: Tue Jun 06 2017(Updated: )
Insufficient validation of untrusted input in Skia in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac, and 59.0.3071.92 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Chrome | <59.0.3071.86 | 59.0.3071.86 |
Google Chrome (Trace Event) | <59.0.3071.86 | |
Apple iOS and macOS | ||
Linux Kernel | ||
Microsoft Windows | ||
Google Chrome (Trace Event) | <59.0.3071.92 | |
Android | ||
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5077 has a critical severity rating due to its potential for remote code execution through an out of bounds memory read.
To fix CVE-2017-5077, update Google Chrome to version 59.0.3071.86 or later.
CVE-2017-5077 affects all users of Google Chrome versions prior to 59.0.3071.86 on Linux, Windows, and Mac.
CVE-2017-5077 is caused by insufficient validation of untrusted input in the Skia component of Google Chrome.
Yes, CVE-2017-5077 can be exploited by attackers through a crafted HTML page.