First published: Wed Mar 07 2018(Updated: )
A heap buffer overflow in WebGL in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/chromium-browser | <65.0.3325.146 | 65.0.3325.146 |
debian/chromium-browser | ||
Google Chrome | <65.0.3325.146 | |
Redhat Linux Desktop | =6.0 | |
Redhat Linux Server | =6.0 | |
Redhat Linux Workstation | =6.0 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2018-6073.
Google Chrome prior to version 65.0.3325.146, Redhat Linux Desktop 6.0, Redhat Linux Server 6.0, Redhat Linux Workstation 6.0, and Debian Linux 9.0 are affected by this vulnerability.
The severity of CVE-2018-6073 is high with a CVSS score of 8.8.
A remote attacker can exploit this vulnerability by crafting a malicious HTML page that triggers a heap buffer overflow in WebGL.
Yes, the fix for this vulnerability is to update Google Chrome to version 65.0.3325.146 or later.