Table of Contents
  • Home
  • /
  • Blog
  • /
  • How to Fix CVE-2023-7024 – A New Heap Buffer Overflow in WebRTC Component of Chrome?
December 21, 2023
|
3m

How to Fix CVE-2023-7024 – A New Heap Buffer Overflow in WebRTC Component of Chrome?


How To Fix Cve 2023 7024 A New Heap Buffer Overflow In Webrtc Component Of Chrome

Google has published a security advisory against a new, high-severity heap buffer overflow vulnerability in the WebRTC component of the Chrome browser. The vulnerability, tracked as CVE-2023-7024, allows remote attackers who have compromised the renderer process to potentially perform a sandbox escape and execute arbitrary code via a crafted HTML page. All Chrome users need to fix this vulnerability before they face any damage. We created this post to let you know how to Fix CVE-2023-7024- high severity heap buffer overflow in the WebRTC component of Chrome browser.

Summary of CVE-2023-7024

According to the Chrome release notes, this is a high severity heap buffer overflow in the WebRTC component that could enable a remote attacker to escape the sandbox and execute arbitrary code on the host system if they can entice a user to visit a malicious web page.

Google has restricted the technical details due to security reasons but has confirmed that exploit code for CVE-2023-7024 exists in the wild. Further details about the root cause and implications will be revealed when a majority of users have installed the security update.

How to Fix CVE-2023-7024 – The Heap Buffer Overflow in Chrome’s WebRTC?

To fix this vulnerability, Google has released Chrome 120.0.6099.129 for Mac, Linux and 120.0.6099.129/130 for Windows. All Chrome users should manually update to the latest version by going to Help > About Google Chrome and clicking on Update Google Chrome if an update is available.

You can also enable automatic background updates in Chromes settings. To do this, go to Settings > Advanced > Privacy & security and toggle on Use automatic background updates.

Once updated, your browser will contain the fix for this high severity vulnerability, preventing remote code execution and sandbox escapes. We recommend installing the update as soon as possible before threat actors start actively exploiting this flaw.

We hope this post helps you know about how to Fix CVE-2023-7024- high severity heap buffer overflow in the WebRTC component of Chrome browser. Please share this post and help secure the digital world. Visit our website thesecmaster.com, and our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium, and Instagram and subscribe to receive updates like this.

You may also like these articles:

Arun KL

Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.

Recently added

Vulnerabilities

View All

Learn More About Cyber Security Security & Technology

“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”

Cybersecurity All-in-One For Dummies - 1st Edition

"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.

Tools

Featured

View All

Learn Something New with Free Email subscription

Subscribe

Subscribe