Google has published a security advisory against a new, high-severity heap buffer overflow vulnerability in the WebRTC component of the Chrome browser. The vulnerability, tracked as CVE-2023-7024, allows remote attackers who have compromised the renderer process to potentially perform a sandbox escape and execute arbitrary code via a crafted HTML page. All Chrome users need to fix this vulnerability before they face any damage. We created this post to let you know how to Fix CVE-2023-7024- high severity heap buffer overflow in the WebRTC component of Chrome browser.
Table of Contents
Summary of CVE-2023-7024
According to the Chrome release notes, this is a high severity heap buffer overflow in the WebRTC component that could enable a remote attacker to escape the sandbox and execute arbitrary code on the host system if they can entice a user to visit a malicious web page.
Google has restricted the technical details due to security reasons but has confirmed that exploit code for CVE-2023-7024 exists in the wild. Further details about the root cause and implications will be revealed when a majority of users have installed the security update.
How to Fix CVE-2023-7024 – The Heap Buffer Overflow in Chrome’s WebRTC?
To fix this vulnerability, Google has released Chrome 120.0.6099.129 for Mac, Linux and 120.0.6099.129/130 for Windows. All Chrome users should manually update to the latest version by going to Help > About Google Chrome and clicking on “Update Google Chrome” if an update is available.
You can also enable automatic background updates in Chrome’s settings. To do this, go to Settings > Advanced > Privacy & security and toggle on “Use automatic background updates“.
Once updated, your browser will contain the fix for this high severity vulnerability, preventing remote code execution and sandbox escapes. We recommend installing the update as soon as possible before threat actors start actively exploiting this flaw.
We hope this post helps you know about how to Fix CVE-2023-7024- high severity heap buffer overflow in the WebRTC component of Chrome browser. Please share this post and help secure the digital world. Visit our website thesecmaster.com, and our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium, and Instagram and subscribe to receive updates like this.