Impact
A use‑after‑free bug in the Downloads component of Google Chrome on macOS permits a remote attacker to run arbitrary code by delivering a specially crafted HTML page. The flaw originates from freeing memory prematurely, exposing data that can be incorrectly accessed during subsequent processing of a download. Additionally, the bug results in improper resource cleanup (CWE‑825), further complicating the memory state. The resulting capability enables full control of the affected system, making it a critical threat to confidentiality, integrity, and availability.
Affected Systems
Google Chrome for macOS versions earlier than 148.0.7778.168 are vulnerable. The issue specifically targets the Downloads feature used when a user interacts with HTML content that references downloaded files. No other browsers or platforms are listed as affected.
Risk and Exploitability
The lack of an EPSS score indicates that publicly known exploitation activity has not yet been quantified, but the CVSS score of 8.8 indicates a high severity rating. The vulnerability involves a use‑after‑free (CWE‑416) and an improper resource cleanup (CWE‑825) in the Downloads module, allowing a remote attacker to present a malicious HTML page that triggers the download process. Because the flaw can lead to arbitrary code execution, the potential damage is substantial if the attacker succeeds. The CVE is not listed in CISA’s KEV catalog at this time.
OpenCVE Enrichment
Debian DSA