HIGH8.8
Inappropriate use of JIT optimisation in V8 in Google Chrome prior to 61.0.3163.100 for Linux, Windows, and Mac allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page, related to the escape analysis phase.
CVSS 2.0MEDIUM 6.8
CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:PCVSS 3.xHIGH 8.8
CVSS:3.x/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HReferences
- http://www.debian.org/security/2017/dsa-3985
- http://www.securityfocus.com/bid/100947
- http://www.securitytracker.com/id/1039497
- https://access.redhat.com/errata/RHSA-2017:2792
- https://blogs.technet.microsoft.com/mmpc/2017/10/18/browser-security-beyond-sandboxing/
- https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/765433
- https://security.gentoo.org/glsa/201709-25
- http://www.debian.org/security/2017/dsa-3985
- http://www.securityfocus.com/bid/100947
- http://www.securitytracker.com/id/1039497
- https://access.redhat.com/errata/RHSA-2017:2792
- https://blogs.technet.microsoft.com/mmpc/2017/10/18/browser-security-beyond-sandboxing/
- https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/765433
- https://security.gentoo.org/glsa/201709-25