CVE-2020-6524
📋 TL;DR
This vulnerability allows a remote attacker to trigger a heap buffer overflow in Chrome's WebAudio component by tricking users into visiting a malicious HTML page. Successful exploitation could lead to arbitrary code execution or browser crashes. All users running vulnerable Chrome versions are affected.
💻 Affected Systems
- Google Chrome
📦 What is this software?
Backports Sle by Opensuse
Chrome by Google
Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...
Learn more about Chrome →Fedora by Fedoraproject
Fedora by Fedoraproject
Leap by Opensuse
Leap by Opensuse
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with the privileges of the Chrome process, potentially leading to full system compromise if Chrome is running with elevated privileges.
Likely Case
Browser crash (denial of service) or limited memory corruption that could be leveraged for information disclosure or further exploitation.
If Mitigated
With proper controls like sandboxing enabled, exploitation would be limited to the Chrome sandbox, preventing full system compromise.
🎯 Exploit Status
Exploitation requires crafting a malicious HTML page that triggers the WebAudio heap overflow. No public exploit code is known, but the vulnerability is actively patched.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 84.0.4147.89
Vendor Advisory: https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
Restart Required: Yes
Instructions:
1. Open Chrome. 2. Click the three-dot menu → Help → About Google Chrome. 3. Chrome will automatically check for updates and install version 84.0.4147.89 or later. 4. Click 'Relaunch' to restart Chrome.
🔧 Temporary Workarounds
Disable WebAudio
allDisable the WebAudio API in Chrome to prevent exploitation, but this will break audio functionality on websites.
chrome://flags/#enable-webaudio → Disabled
Use Chrome Enterprise policies
allEnterprise administrators can disable WebAudio via group policy or registry settings.
Set 'DefaultWebAudioSetting' to 2 in Chrome policies
🧯 If You Can't Patch
- Restrict users to trusted websites only using web filtering or proxy controls.
- Implement application whitelisting to prevent execution of malicious code if exploitation occurs.
🔍 How to Verify
Check if Vulnerable:
Check Chrome version: If version is below 84.0.4147.89, the system is vulnerable.
Check Version:
On Windows/macOS/Linux: Open Chrome and navigate to chrome://version/ or use 'google-chrome --version' in terminal.
Verify Fix Applied:
Confirm Chrome version is 84.0.4147.89 or higher after update.
📡 Detection & Monitoring
Log Indicators:
- Chrome crash logs with WebAudio-related stack traces
- Unexpected Chrome process termination events
Network Indicators:
- HTTP requests to known malicious domains hosting exploit code
- Unusual WebAudio API usage patterns
SIEM Query:
EventID=1000 OR EventID=1001 (Application Error) AND ProcessName="chrome.exe" AND FaultModuleName contains "webaudio"
🔗 References
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/1081722
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/
- https://security.gentoo.org/glsa/202007-08
- https://security.gentoo.org/glsa/202101-30
- https://www.debian.org/security/2021/dsa-4824
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/1081722
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/
- https://security.gentoo.org/glsa/202007-08
- https://security.gentoo.org/glsa/202101-30
- https://www.debian.org/security/2021/dsa-4824