CVE-2024-1283
vulnerability analysis and mitigation

Overview

CVE-2024-1283 is a heap buffer overflow vulnerability discovered in the Skia graphics engine component of Google Chrome versions prior to 121.0.6167.160. The vulnerability was reported on January 25, 2024, by security researcher Jorge Buzeti (@r3tr074) and was publicly disclosed on February 6, 2024. This high-severity security flaw affects Google Chrome and other Chromium-based browsers (Chrome Release).

Technical details

The vulnerability is classified as a heap buffer overflow (CWE-787: Out-of-bounds Write) in the Skia graphics engine component. It received a CVSS v3.1 base score of 9.8 (CRITICAL) with a vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating remote exploitation potential with no required privileges or user interaction (NVD).

Impact

A successful exploitation of this vulnerability could allow a remote attacker to potentially exploit heap corruption through a specially crafted HTML page. Given the CVSS score and vector, successful exploitation could lead to complete compromise of system confidentiality, integrity, and availability (NVD).

Mitigation and workarounds

Users are advised to update to Google Chrome version 121.0.6167.160 or later. The vulnerability has been patched in this version for Windows, Mac, and Linux platforms. Fedora users can update using the dnf package manager to versions 121.0.6167.160-1.fc38 for Fedora 38 and 121.0.6167.160-1.fc39 for Fedora 39 (Fedora Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management