Vulnerability Description
A stack buffer overflow in the QUIC networking stack in Google Chrome prior to 62.0.3202.89 allowed a remote attacker to gain code execution via a malicious server.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Chrome | < 62.0.3202.89 | |
| Redhat | Enterprise Linux Desktop | 6.0 |
| Redhat | Enterprise Linux Server | 6.0 |
| Redhat | Enterprise Linux Workstation | 6.0 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/101692
- https://access.redhat.com/errata/RHSA-2017:3151
- https://chromereleases.googleblog.com/2017/11/stable-channel-update-for-desktop.
- https://crbug.com/777728
- https://security.gentoo.org/glsa/201711-02
- https://www.debian.org/security/2017/dsa-4024
- http://www.securityfocus.com/bid/101692
- https://access.redhat.com/errata/RHSA-2017:3151
- https://chromereleases.googleblog.com/2017/11/stable-channel-update-for-desktop.
- https://crbug.com/777728
- https://security.gentoo.org/glsa/201711-02
- https://www.debian.org/security/2017/dsa-4024
FAQ
What is CVE-2017-15398?
CVE-2017-15398 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A stack buffer overflow in the QUIC networking stack in Google Chrome prior to 62.0.3202.89 allowed a remote attacker to gain code execution via a malicious server.
How severe is CVE-2017-15398?
CVE-2017-15398 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-15398?
Check the references section above for vendor advisories and patch information. Affected products include: Google Chrome, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Server, Redhat Enterprise Linux Workstation, Debian Debian Linux.