![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.800567 |
Categoría: | Buffer overflow |
Título: | Google Chrome Buffer Overflow Vulnerability |
Resumen: | Google Chrome is prone to a buffer overflow vulnerability. |
Descripción: | Summary: Google Chrome is prone to a buffer overflow vulnerability. Vulnerability Insight: These flaws are due to: - a boundary error in nitSkBitmapFromData() function while processing vectors related to large bitmap that arrives over the IPC channel. - a failure while validating the result of integer multiplication when computing image sizes. Vulnerability Impact: Successful exploitation will let the attacker run arbitrary codes with the privilege of logged on user or can craft a special images or canvas to execute arbitrary code inside the sandboxed renderer (tab) process and cause a tab to crash. Affected Software/OS: Google Chrome versions prior to 1.0.154.64, version 2.0.159.0 and prior. Solution: Upgrade to version 1.0.154.64. CVSS Score: 9.3 CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-1441 BugTraq ID: 34859 http://www.securityfocus.com/bid/34859 http://osvdb.org/54288 http://www.securitytracker.com/id?1022174 http://secunia.com/advisories/35014 http://www.vupen.com/english/advisories/2009/1266 XForce ISS Database: chrome-paramtraitsskbitmapread-bo(50362) https://exchange.xforce.ibmcloud.com/vulnerabilities/50362 Common Vulnerability Exposure (CVE) ID: CVE-2009-1442 http://osvdb.org/54248 http://www.securitytracker.com/id?1022175 |
Copyright | Copyright (C) 2009 Greenbone AG |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |