Vulnerability Description
Inappropriate implementation in Sandbox in Google Chrome on Windows prior to 112.0.5615.49 allowed a remote attacker who had compromised the renderer process to perform arbitrary read/write via a malicious file. (Chromium security severity: High)
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Chrome | < 112.0.5615.49 | |
| Microsoft | Windows | - |
References
- https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.Release NotesVendor Advisory
- https://crbug.com/1335974ExploitIssue TrackingVendor Advisory
- https://lists.fedoraproject.org/archives/list/[email protected]
- https://lists.fedoraproject.org/archives/list/[email protected]
- https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.Release NotesVendor Advisory
- https://crbug.com/1335974ExploitIssue TrackingVendor Advisory
- https://lists.fedoraproject.org/archives/list/[email protected]
- https://lists.fedoraproject.org/archives/list/[email protected]
FAQ
What is CVE-2023-2313?
CVE-2023-2313 is a vulnerability with a CVSS score of 8.8 (HIGH). Inappropriate implementation in Sandbox in Google Chrome on Windows prior to 112.0.5615.49 allowed a remote attacker who had compromised the renderer process to perform arbitrary read/write via a mali...
How severe is CVE-2023-2313?
CVE-2023-2313 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-2313?
Check the references section above for vendor advisories and patch information. Affected products include: Google Chrome, Microsoft Windows.