CVE-2024-7965 in Google and Microsoft Products
Published on August 21, 2024


Known Exploited Vulnerability
This Google Chromium V8 Inappropriate Implementation Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Google Chromium V8 contains an inappropriate implementation vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
The following remediation steps are recommended / required by September 18, 2024: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Vulnerability Analysis
CVE-2024-7965 can be exploited with network access, requires user interaction. This vulnerability is considered to have a low attack complexity. It has an exploitability score of 2.8 out of four. The potential impact of an exploit of this vulnerability is considered to be very high.
What is a Memory Corruption Vulnerability?
The software writes data past the end, or before the beginning, of the intended buffer. Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
CVE-2024-7965 has been classified to as a Memory Corruption vulnerability or weakness.
Products Associated with CVE-2024-7965
You can be notified by stack.watch whenever vulnerabilities like CVE-2024-7965 are published in these products:
What versions are vulnerable to CVE-2024-7965?
-
Google Chrome Fixed in Version 128.0.6613.84
-
Microsoft Edge Chromium Fixed in Version 128.0.2739.42