First published: Fri Oct 28 2022(Updated: )
Use after free in Extensions in Google Chrome prior to 108.0.5359.71 allowed an attacker who convinced a user to install an extension to potentially exploit heap corruption via a crafted Chrome Extension and UI interaction. (Chromium security severity: High)
Credit: Chaoyuan Peng @ret2happy chrome-cve-admin@google.com chrome-cve-admin@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome | <108.0.5359.71 | |
Google Chrome | <108.0.5359.71 | 108.0.5359.71 |
<108.0.5359.71 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2022-4177 is classified as high due to potential heap corruption exploits.
To fix CVE-2022-4177, update Google Chrome to version 108.0.5359.71 or later.
CVE-2022-4177 is a use-after-free vulnerability affecting extensions in Google Chrome.
Users of Google Chrome versions prior to 108.0.5359.71 are affected by CVE-2022-4177.
No, CVE-2022-4177 requires user interaction to install a malicious Chrome extension for exploitation.