PatchSiren

PatchSiren cyber security CVE debrief

CVE-2017-5024 Google CVE debrief

CVE-2017-5024 is a Google Chrome vulnerability in FFmpeg’s handling of video content. According to the NVD record, the issue was a bounds-checking failure that could let a remote attacker trigger heap corruption through a crafted video file. The published CVSS 3.0 score is 5.5 (Medium), with user interaction required. Google’s Chrome release and downstream advisories in the reference set indicate affected Chrome builds were fixed in the 2017 update cycle.

Vendor
Google
Product
CVE-2017-5024
CVSS
MEDIUM 5.5
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-17
Original CVE updated
2026-05-13
Advisory published
2017-02-17
Advisory updated
2026-05-13

Who should care

Organizations running Google Chrome on desktops, especially teams that regularly open untrusted media or browse externally supplied video content. Endpoint admins and vulnerability-management teams should prioritize patch verification for managed browser fleets and any systems that ingest user-provided video.

Technical summary

The NVD entry classifies the weakness as CWE-119 and gives the CVSS vector AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H. The core issue is improper bounds checking in FFmpeg as used by Chrome, which could lead to heap corruption when parsing a crafted video file. The source references include Google’s Chrome release blog, a Chromium issue tracker entry, and downstream vendor advisories, all consistent with a browser media-parsing memory-safety defect affecting Chrome versions prior to the fixed release listed in the record.

Defensive priority

Medium. The impact is primarily denial-of-service or broader memory-corruption risk, but exploitation requires user interaction and the attack surface is limited to media parsing in the browser. Patch confirmation is still important because browsers are high-value targets and video content is commonly exposed to untrusted input.

Recommended defensive actions

  • Update Google Chrome to a version newer than the fixed release identified in the advisory trail.
  • Verify managed browser fleets for compliance with the patched Chrome version across Linux, Windows, and macOS.
  • Treat untrusted or externally supplied video files as higher risk until all endpoints are confirmed updated.
  • Monitor browser crash telemetry and endpoint alerts for media-parsing instability that may indicate exposure before patching.
  • Use centralized software inventory to confirm no stale Chrome installations remain on long-lived systems.

Evidence notes

This debrief is based on the supplied NVD record and its reference set. The NVD description states that FFmpeg in Google Chrome failed to perform proper bounds checking, enabling heap corruption via a crafted video file. The record classifies the weakness as CWE-119 and provides a Medium CVSS 3.0 score. The supplied reference list includes Google’s Chrome stable-channel update, a Chromium issue link, and downstream advisories from Red Hat, Debian, and Gentoo. Note: the description text and CPE criteria in the source corpus do not present identical version cutoffs, so remediation should follow the vendor/browser release advisory rather than rely on a single version boundary from one field alone.

Official resources

Publicly disclosed in the official CVE/NVD record on 2017-02-17, with supporting browser and downstream vendor references in the same advisory chain.