Vulnerabilities > CVE-2010-4574 - Deserialization of Untrusted Data vulnerability in Google Chrome
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
The Pickle::Pickle function in base/pickle.cc in Google Chrome before 8.0.552.224 and Chrome OS before 8.0.552.343 on 64-bit Linux platforms does not properly perform pointer arithmetic, which allows remote attackers to bypass message deserialization validation, and cause a denial of service or possibly have unspecified other impact, via invalid pickle data.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family | Windows |
NASL id | GOOGLE_CHROME_8_0_552_224.NASL |
description | The version of Google Chrome installed on the remote host is earlier than 8.0.552.224. Such versions are reportedly affected by multiple vulnerabilities : - A bad extension can cause the browser to crash in tab handling. (Issue #60761) - A NULL pointer can lead to a browser crash in web worker handling. (Issue #63592) - An out-of-bounds read can occur in CSS parsing. (Issue #63866) - Stale pointers could occur in cursor handling. (Issue #64959) |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 51161 |
published | 2010-12-14 |
reporter | This script is Copyright (C) 2010-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/51161 |
title | Google Chrome < 8.0.552.224 Multiple Vulnerabilities |
code |
|
Oval
accepted | 2012-10-22T04:02:05.294-04:00 | ||||||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||||||
description | The Pickle::Pickle function in base/pickle.cc in Google Chrome before 8.0.552.224 and Chrome OS before 8.0.552.343 on 64-bit Linux platforms does not properly perform pointer arithmetic, which allows remote attackers to bypass message deserialization validation, and cause a denial of service or possibly have unspecified other impact, via invalid pickle data. | ||||||||||||||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:14141 | ||||||||||||||||||||||||||||||||||||
status | deprecated | ||||||||||||||||||||||||||||||||||||
submitted | 2011-11-25T18:06:56.000-05:00 | ||||||||||||||||||||||||||||||||||||
title | DEPRECATED: The Pickle::Pickle function in base/pickle.cc in Google Chrome before 8.0.552.224 and Chrome OS before 8.0.552.343 on 64-bit Linux platforms does not properly perform pointer arithmetic, which allows remote attackers to bypass message deserialization validation, and cause a denial of service or possibly have unspecified other impact, via invalid pickle data. | ||||||||||||||||||||||||||||||||||||
version | 50 |
References
- http://code.google.com/p/chromium/issues/detail?id=56449
- http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates_13.html
- http://secunia.com/advisories/42648
- http://src.chromium.org/viewvc/chrome?view=rev&revision=68033
- http://www.gentoo.org/security/en/glsa/glsa-201012-01.xml
- http://www.securityfocus.com/bid/45390
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14141