Search for vulnerabilities
Vulnerability details: VCID-usyf-upbk-aaaf
Vulnerability ID VCID-usyf-upbk-aaaf
Aliases CVE-2019-5797
Summary Double free in DOMStorage in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Status Published
Exploitability 2.0
Weighted Severity 8.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-5797.html
rhas Important https://access.redhat.com/errata/RHSA-2019:0708
cvssv3 6.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5797.json
epss 0.00344 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.00344 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.00344 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.00344 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.00344 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.00344 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.00344 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.00344 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.00344 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.00344 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.00344 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.00344 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.00532 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.00754 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.00754 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.00754 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.03112 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
epss 0.05226 https://api.first.org/data/v1/epss?cve=CVE-2019-5797
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1688199
cvssv3.1 7.5 https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html
generic_textual Medium https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html
ssvc Track https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html
cvssv3.1 7.5 https://crbug.com/916523
ssvc Track https://crbug.com/916523
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5787
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5788
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5789
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5790
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5791
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5792
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5793
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5794
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5795
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5796
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5797
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5799
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5800
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5802
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5803
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5844
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5845
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5846
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2019-5797
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2019-5797
archlinux High https://security.archlinux.org/AVG-923
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-5797.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5797.json
https://api.first.org/data/v1/epss?cve=CVE-2019-5797
https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html
https://crbug.com/916523
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5787
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5790
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5791
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5792
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5793
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5795
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5796
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5797
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5802
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5803
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5846
1688199 https://bugzilla.redhat.com/show_bug.cgi?id=1688199
ASA-201903-8 https://security.archlinux.org/ASA-201903-8
AVG-923 https://security.archlinux.org/AVG-923
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
CVE-2019-5797 Exploit https://bugs.chromium.org/p/project-zero/issues/detail?id=1744
CVE-2019-5797 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46565.txt
CVE-2019-5797 https://nvd.nist.gov/vuln/detail/CVE-2019-5797
GLSA-201903-23 https://security.gentoo.org/glsa/201903-23
RHSA-2019:0708 https://access.redhat.com/errata/RHSA-2019:0708
Data source Exploit-DB
Date added March 19, 2019
Description Google Chrome < M73 - Double-Destruction Race in StoragePartitionService
Ransomware campaign use Known
Source publication date March 19, 2019
Exploit type dos
Platform multiple
Source update date March 19, 2019
Source URL https://bugs.chromium.org/p/project-zero/issues/detail?id=1744
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5797.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-20T19:58:42Z/ Found at https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://crbug.com/916523
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-20T19:58:42Z/ Found at https://crbug.com/916523
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2019-5797
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2019-5797
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.72091
EPSS Score 0.00344
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.