Vulnerability Description
Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Chrome | < 84.0.4147.89 | |
| Opensuse | Backports Sle | 15.0 |
| Opensuse | Leap | 15.1 |
| Fedoraproject | Fedora | 31 |
| Debian | Debian Linux | 9.0 |
| Canonical | Ubuntu Linux | 16.04 |
| Apple | Safari | < 13.1.2 |
| Apple | Ipados | < 13.6 |
| Apple | Iphone Os | < 13.6 |
| Apple | Tvos | < 13.4.8 |
| Apple | Watchos | < 6.2.8 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00022.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00032.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.htmlMailing ListThird Party Advisory
- http://packetstormsecurity.com/files/158697/WebRTC-usrsctp-Incorrect-Call.htmlExploitThird Party AdvisoryVDB Entry
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.Release NotesVendor Advisory
- https://crbug.com/1076703ExploitIssue TrackingVendor Advisory
- https://lists.debian.org/debian-lts-announce/2020/07/msg00027.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2020/08/msg00006.htmlMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
FAQ
What is CVE-2020-6514?
CVE-2020-6514 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream.
How severe is CVE-2020-6514?
CVE-2020-6514 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-6514?
Check the references section above for vendor advisories and patch information. Affected products include: Google Chrome, Opensuse Backports Sle, Opensuse Leap, Fedoraproject Fedora, Debian Debian Linux.