IRONSMITHINTEL
MEDIUMCVSS6.5
|CVE-2023-6345|Auth: none|Reboot: not required|Est. 10 minutes|Manual only

Google Chrome < 119.0.6045.199

An integer overflow in Chrome's Skia graphics library can be triggered by a malicious image or SVG, leading to memory corruption and potential code execution.

Published May 7, 2026 · Updated May 10, 2026
Why patchRisk explained in plain English
Worst-case scenarioIf unpatched

An attacker can serve a malicious web page containing crafted graphical content to trigger the integer overflow. Exploitation can lead to renderer process crash or, with additional research, code execution in the renderer sandbox. A complete exploit chain would require additional sandbox escape.

How the attack works

Google Chrome uses the Skia graphics library to render images, SVG, and canvas content. An integer overflow vulnerability in Skia can be triggered by crafted graphical content served from a web page. The overflow can lead to heap corruption in the renderer process.

Am I affected?Quick check

Probably yes if any of these apply:

Any server with Chrome installed used for browsing
Jump hosts
RDS environments
Running Chrome < 119.0.6045.199

Affected OS versions

Windows Server 2016Windows Server 2019Windows Server 2022
Fixed in119.0.6045.199
Real-world incidentsWhat we've seen

Skia vulnerabilities have historically been leveraged in targeted browser exploitation campaigns. The integer overflow class is particularly concerning as it can be reliably triggered and produces deterministic memory corruption.

How to patch

Manual remediation steps

10 minutes

Check Current Version

(Get-ItemProperty 'HKLM:\SOFTWARE\Google\Chrome\BLBeacon').version

Update Chrome

1
Open Chrome → three-dot menu → Help → About Google Chrome
2
Allow the update to complete
3
Relaunch Chrome

Verification

(Get-ItemProperty 'HKLM:\SOFTWARE\Google\Chrome\BLBeacon').version
# Must show 119.0.6045.199 or later
PowerShell automationComing soon

No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.