CVE-2020-15969
HIGH | Platform: Safari | Changelog
CVE Details
Description
Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVSS 3.1 Score
| Metric | Value |
|---|---|
| Base Score | 8.8 (HIGH) |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Weakness
References
- Apple Security Advisory
- NVD Entry
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html (Mailing List, Third Party Advisory)
- http://seclists.org/fulldisclosure/2020/Dec/24 (Mailing List, Third Party Advisory)
- http://seclists.org/fulldisclosure/2020/Dec/26 (Mailing List, Third Party Advisory)
- http://seclists.org/fulldisclosure/2020/Dec/27 (Mailing List, Third Party Advisory)
- http://seclists.org/fulldisclosure/2020/Dec/29 (Mailing List, Third Party Advisory)
- http://seclists.org/fulldisclosure/2020/Dec/30 (Mailing List, Third Party Advisory)
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html (Release Notes, Vendor Advisory)
- https://crbug.com/1124659 (Permissions Required, Vendor Advisory)