• Home
  • |
  • Blog
  • |
  • How to Fix CVE-2023-7024 – A New Heap Buffer Overflow in WebRTC Component of Chrome?
How to Fix CVE-2023-7024 - A New Heap Buffer Overflow in WebRTC Component of Chrome

Google has published a security advisory against a new, high-severity heap buffer overflow vulnerability in the WebRTC component of the Chrome browser. The vulnerability, tracked as CVE-2023-7024, allows remote attackers who have compromised the renderer process to potentially perform a sandbox escape and execute arbitrary code via a crafted HTML page. All Chrome users need to fix this vulnerability before they face any damage. We created this post to let you know how to Fix CVE-2023-7024- high severity heap buffer overflow in the WebRTC component of Chrome browser.

Summary of CVE-2023-7024

According to the Chrome release notes, this is a high severity heap buffer overflow in the WebRTC component that could enable a remote attacker to escape the sandbox and execute arbitrary code on the host system if they can entice a user to visit a malicious web page.

Google has restricted the technical details due to security reasons but has confirmed that exploit code for CVE-2023-7024 exists in the wild. Further details about the root cause and implications will be revealed when a majority of users have installed the security update.

How to Fix CVE-2023-7024 – The Heap Buffer Overflow in Chrome’s WebRTC?

To fix this vulnerability, Google has released Chrome 120.0.6099.129 for Mac, Linux and 120.0.6099.129/130 for Windows. All Chrome users should manually update to the latest version by going to Help > About Google Chrome and clicking on “Update Google Chrome” if an update is available.

Update chrome

You can also enable automatic background updates in Chrome’s settings. To do this, go to Settings > Advanced > Privacy & security and toggle on “Use automatic background updates“.

Once updated, your browser will contain the fix for this high severity vulnerability, preventing remote code execution and sandbox escapes. We recommend installing the update as soon as possible before threat actors start actively exploiting this flaw.

We hope this post helps you know about how to Fix CVE-2023-7024- high severity heap buffer overflow in the WebRTC component of Chrome browser. Please share this post and help secure the digital world. Visit our website thesecmaster.com, and our social media page on FacebookLinkedInTwitterTelegramTumblrMedium, and Instagram and subscribe to receive updates like this.

Read More:

About the author

Arun KL

Arun KL is a cybersecurity professional with 15+ years of experience spanning IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.

To know more about him, you can visit his profile on LinkedIn.

Leave a Reply

Your email address will not be published. Required fields are marked

{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}

Learn Something New with Free Email subscription

Email is also one of the ways to be in touch with us. Our free subscription plan offers you to receive post updates straight to your inbox.