Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2018-6155 : What You Need to Know

Learn about CVE-2018-6155, a vulnerability in Google Chrome versions before 68.0.3440.75 allowing remote attackers to exploit heap corruption via crafted video files. Find mitigation steps here.

A vulnerability was found in Google Chrome versions before 68.0.3440.75 that involved the mishandling of frames in the VP8 parser, potentially leading to heap corruption through a crafted video file.

Understanding CVE-2018-6155

This CVE relates to a specific vulnerability in Google Chrome that could be exploited by a remote attacker.

What is CVE-2018-6155?

The vulnerability in Google Chrome versions prior to 68.0.3440.75 allowed for heap corruption through a specially crafted video file due to mishandling of frames in the VP8 parser.

The Impact of CVE-2018-6155

The exploit could potentially enable a remote attacker to cause heap corruption on the targeted system.

Technical Details of CVE-2018-6155

This section provides more technical insights into the vulnerability.

Vulnerability Description

The vulnerability stemmed from the incorrect handling of frames in the VP8 parser in Google Chrome versions before 68.0.3440.75.

Affected Systems and Versions

        Product: Chrome
        Vendor: Google
        Versions Affected: Before 68.0.3440.75

Exploitation Mechanism

The exploit involved the mishandling of frames in the VP8 parser, allowing a remote attacker to potentially exploit heap corruption through a crafted video file.

Mitigation and Prevention

To address CVE-2018-6155, the following steps can be taken:

Immediate Steps to Take

        Update Google Chrome to version 68.0.3440.75 or later.
        Avoid opening video files from untrusted sources.

Long-Term Security Practices

        Regularly update software and applications to the latest versions.
        Exercise caution when downloading and opening files from unknown sources.

Patching and Updates

Ensure that Google Chrome is regularly updated to the latest version to mitigate the vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now