First published: Fri Feb 03 2023(Updated: )
Stack buffer overflow in Crash reporting in Google Chrome on Windows prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: High)
Credit: chrome-cve-admin@google.com sunburst Ant Group Tianqiong Security Lab
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome | <111.0.5563.64 | |
Microsoft Windows | ||
Google Chrome | <111.0.5563.64 | 111.0.5563.64 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-1217 has a security severity rating of High due to its potential to allow remote attackers to obtain sensitive information.
To mitigate CVE-2023-1217, update Google Chrome to version 111.0.5563.64 or later.
CVE-2023-1217 exploits a stack buffer overflow in the crash reporting feature, enabling attackers to access process memory.
Users of Google Chrome on Windows prior to version 111.0.5563.64 are affected by CVE-2023-1217.
Yes, CVE-2023-1217 can be exploited via a crafted HTML page that targets the renderer process.