{"id":"CVE-2020-16044","details":"Use after free in WebRTC in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted SCTP packet.","modified":"2026-03-13T23:29:41.297264Z","published":"2021-02-09T14:15:14.450Z","related":["MGASA-2021-0012","MGASA-2021-0027","MGASA-2021-0406","SUSE-SU-2021:0071-1","SUSE-SU-2021:0072-1","SUSE-SU-2021:0080-1","SUSE-SU-2021:0122-1","SUSE-SU-2021:0123-1","SUSE-SU-2021:14595-1","openSUSE-SU-2021:0056-1","openSUSE-SU-2021:0063-1","openSUSE-SU-2021:0093-1","openSUSE-SU-2021:0127-1","openSUSE-SU-2021:0166-1","openSUSE-SU-2021:0173-1","openSUSE-SU-2021:0177-1","openSUSE-SU-2021:0186-1","openSUSE-SU-2021:0973-1","openSUSE-SU-2021:1016-1","openSUSE-SU-2024:10600-1","openSUSE-SU-2024:10601-1","openSUSE-SU-2024:10681-1","openSUSE-SU-2024:10977-1","openSUSE-SU-2024:12948-1","openSUSE-SU-2024:14572-1"],"references":[{"type":"ADVISORY","url":"https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop_19.html"},{"type":"REPORT","url":"https://crbug.com/1163228"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-16044.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"88.0.4324.96"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}