CVE-2020-15969

Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Dec/24 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Dec/26 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Dec/27 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Dec/29 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Dec/30 Mailing List Third Party Advisory
https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html Release Notes Vendor Advisory
https://crbug.com/1124659 Permissions Required Vendor Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/24QFL4C3AZKMFVL7LVSYMU2DNE5VVUGS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SC3U3H6AISVZB5PLZLLNF4HMQ4UFFL7M/
https://security.gentoo.org/glsa/202101-30 Third Party Advisory
https://support.apple.com/kb/HT212003 Third Party Advisory
https://support.apple.com/kb/HT212005 Third Party Advisory
https://support.apple.com/kb/HT212007 Third Party Advisory
https://support.apple.com/kb/HT212009 Third Party Advisory
https://support.apple.com/kb/HT212011 Third Party Advisory
https://www.debian.org/security/2021/dsa-4824 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-11-03 03:15

Updated : 2024-02-04 21:23


NVD link : CVE-2020-15969

Mitre link : CVE-2020-15969

CVE.ORG link : CVE-2020-15969


JSON object : View

Products Affected

apple

  • macos
  • ipados
  • safari
  • iphone_os
  • watchos
  • tvos

debian

  • debian_linux

opensuse

  • backports_sle

google

  • chrome

fedoraproject

  • fedora
CWE
CWE-416

Use After Free

CWE-787

Out-of-bounds Write