First published: Tue Feb 20 2018(Updated: )
A use-after-free in WebAssembly in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
Credit: Anonymous cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/chromium-browser | <66.0.3359.117 | 66.0.3359.117 |
debian/chromium-browser | ||
Google Chrome | <66.0.3359.117 | |
Redhat Linux Desktop | =6.0 | |
Redhat Linux Server | =6.0 | |
Redhat Linux Workstation | =6.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Google Chrome | <66.0.3359.117 | 66.0.3359.117 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2018-6087 is high.
The affected software for CVE-2018-6087 includes Google Chrome versions prior to 66.0.3359.117, Redhat Linux Desktop 6.0, Redhat Linux Server 6.0, Redhat Linux Workstation 6.0, Debian Linux 8.0, and Debian Linux 9.0.
A remote attacker can exploit CVE-2018-6087 by executing arbitrary code inside a sandbox via a crafted HTML page.
More information about CVE-2018-6087 can be found at the following references: http://www.securityfocus.com/bid/103917, https://access.redhat.com/errata/RHSA-2018:1195, https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html.
The Common Weakness Enumeration (CWE) of CVE-2018-6087 is CWE-416.