Vulnerability Details : CVE-2018-6088
An iterator-invalidation bug in PDFium in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file.
Vulnerability category: Input validationExecute code
Exploit prediction scoring system (EPSS) score for CVE-2018-6088
Probability of exploitation activity in the next 30 days: 5.93%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 93 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2018-6088
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2018-6088
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-6088
-
https://crbug.com/822091
822091 - Heap-use-after-free in PDFiumEngine::GetVisiblePageIndex - chromium - MonorailExploit;Issue Tracking;Patch;Vendor Advisory
-
https://www.debian.org/security/2018/dsa-4182
Debian -- Security Information -- DSA-4182-1 chromium-browserThird Party Advisory
-
https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html
Chrome Releases: Stable Channel Update for DesktopRelease Notes;Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2018:1195
RHSA-2018:1195 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://security.gentoo.org/glsa/201804-22
Chromium, Google Chrome: Multiple vulnerabilities (GLSA 201804-22) — Gentoo securityThird Party Advisory
-
http://www.securityfocus.com/bid/103917
Google Chrome Prior to 66.0.3359.117 Multiple Security VulnerabilitiesThird Party Advisory;VDB Entry
Products affected by CVE-2018-6088
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*