CVE-2023-2931

8.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in Chrome's PDF renderer that allows remote attackers to trigger heap corruption via malicious PDF files. Successful exploitation could lead to arbitrary code execution or browser crashes. All Chrome users on versions before 114.0.5735.90 are affected.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers
Versions: All versions prior to 114.0.5735.90
Operating Systems: Windows, macOS, Linux, ChromeOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default Chrome installations with PDF viewing enabled are vulnerable. Chrome's built-in PDF viewer is affected.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the same privileges as the Chrome process, potentially leading to full system compromise if Chrome runs with elevated privileges.

🟠

Likely Case

Browser crash (denial of service) or limited memory corruption that could be leveraged for sandbox escape in combination with other vulnerabilities.

🟢

If Mitigated

Browser crash with no further impact if sandboxing works correctly and no other vulnerabilities are chained.

🌐 Internet-Facing: HIGH - Attackers can host malicious PDFs on websites or send them via email/chat, requiring only user interaction to open the file.
🏢 Internal Only: MEDIUM - Risk exists if users open malicious PDFs from internal sources, but external attack surface is reduced.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious PDF file. Use-after-free vulnerabilities in Chrome's sandboxed renderer process are commonly exploited in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 114.0.5735.90 and later

Vendor Advisory: https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html

Restart Required: Yes

Instructions:

1. Open Chrome menu > Help > About Google Chrome. 2. Chrome will automatically check for updates and install version 114.0.5735.90 or later. 3. Click 'Relaunch' to restart Chrome with the fixed version.

🔧 Temporary Workarounds

Disable Chrome's built-in PDF viewer

all

Force Chrome to download PDFs instead of opening them internally

Navigate to chrome://settings/content/pdfDocuments and toggle 'Download PDF files instead of automatically opening them in Chrome'

Use alternative PDF viewer extension

all

Install a third-party PDF viewer extension that doesn't use Chrome's vulnerable PDF renderer

🧯 If You Can't Patch

  • Implement web proxy/content filter to block PDF downloads from untrusted sources
  • Deploy application control to restrict Chrome usage or enforce PDF opening in alternative applications

🔍 How to Verify

Check if Vulnerable:

Check Chrome version: if version is less than 114.0.5735.90, the system is vulnerable.

Check Version:

chrome://version/ (on Chrome) or google-chrome --version (command line)

Verify Fix Applied:

Confirm Chrome version is 114.0.5735.90 or higher after update.

📡 Detection & Monitoring

Log Indicators:

  • Chrome crash reports with PDF-related stack traces
  • Unexpected Chrome renderer process terminations

Network Indicators:

  • Downloads of PDF files from suspicious sources followed by Chrome crashes

SIEM Query:

source="chrome_crash_reports" AND process="chrome" AND module="pdfium" OR source="proxy_logs" AND file_type="pdf" AND user_agent="Chrome/<114.0.5735.90"

🔗 References

📤 Share & Export