Vulnerabilities > CVE-2010-0649 - Numeric Errors vulnerability in Google Chrome
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Integer overflow in the CrossCallParamsEx::CreateFromBuffer function in sandbox/src/crosscall_server.cc in Google Chrome before 4.0.249.89 allows attackers to leverage renderer access to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a malformed message, related to deserializing of sandbox messages.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family | Windows |
NASL id | GOOGLE_CHROME_4_0_249_89.NASL |
description | The version of Google Chrome installed on the remote host is earlier than 4.0.249.89. Such versions are reportedly affected by multiple vulnerabilities : - Two errors when resolving domain names and when interpreting configured proxy lists can be exploited to disclose sensitive data. (Issue #12303, #22914) - Multiple integer overflows in the V8 engine. (Issue #31009) - An unspecified error when processing the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 44587 |
published | 2010-02-11 |
reporter | This script is Copyright (C) 2010-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/44587 |
title | Google Chrome < 4.0.249.89 Multiple Vulnerabilities |
code |
|
Oval
accepted | 2014-04-07T04:01:00.599-04:00 | ||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||
description | Integer overflow in the CrossCallParamsEx::CreateFromBuffer function in sandbox/src/crosscall_server.cc in Google Chrome before 4.0.249.89 allows attackers to leverage renderer access to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a malformed message, related to deserializing of sandbox messages. | ||||||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:14256 | ||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||
submitted | 2011-11-25T18:05:33.000-05:00 | ||||||||||||||||||||||||||||
title | Integer overflow in the CrossCallParamsEx::CreateFromBuffer function in sandbox/src/crosscall_server.cc in Google Chrome before 4.0.249.89 allows attackers to leverage renderer access to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a malformed message, related to deserializing of sandbox messages. | ||||||||||||||||||||||||||||
version | 52 |
References
- http://code.google.com/p/chromium/issues/detail?id=32915
- http://code.google.com/p/chromium/issues/detail?id=32915
- http://googlechromereleases.blogspot.com/2010/02/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2010/02/stable-channel-update.html
- http://secunia.com/advisories/38545
- http://secunia.com/advisories/38545
- http://securitytracker.com/id?1023583
- http://securitytracker.com/id?1023583
- http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs
- http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs
- http://www.osvdb.org/62320
- http://www.osvdb.org/62320
- http://www.securityfocus.com/bid/38177
- http://www.securityfocus.com/bid/38177
- http://www.vupen.com/english/advisories/2010/0361
- http://www.vupen.com/english/advisories/2010/0361
- https://exchange.xforce.ibmcloud.com/vulnerabilities/56217
- https://exchange.xforce.ibmcloud.com/vulnerabilities/56217
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14256
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14256