Vulnerabilities > CVE-2011-3115 - Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Google Chrome

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
google
CWE-119
nessus

Summary

Google V8, as used in Google Chrome before 19.0.1084.52, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger "type corruption."

Vulnerable Configurations

Part Description Count
Application
Google
2293

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Buffer Overflow via Environment Variables
    This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
  • Overflow Buffers
    Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an attacker. As a consequence, an attacker is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the attackers' choice.
  • Client-side Injection-induced Buffer Overflow
    This type of attack exploits a buffer overflow vulnerability in targeted client software through injection of malicious content from a custom-built hostile service.
  • Filter Failure through Buffer Overflow
    In this attack, the idea is to cause an active filter to fail by causing an oversized transaction. An attacker may try to feed overly long input strings to the program in an attempt to overwhelm the filter (by causing a buffer overflow) and hoping that the filter does not fail securely (i.e. the user input is let into the system unfiltered).
  • MIME Conversion
    An attacker exploits a weakness in the MIME conversion routine to cause a buffer overflow and gain control over the mail server machine. The MIME system is designed to allow various different information formats to be interpreted and sent via e-mail. Attack points exist when data are converted to MIME compatible format and back.

Nessus

  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_219D0BFDA91511E1B51900262D5ED8EE.NASL
    descriptionGoogle Chrome Releases reports : [117409] High CVE-2011-3103: Crashes in v8 garbage collection. Credit to the Chromium development community (Brett Wilson). [118018] Medium CVE-2011-3104: Out-of-bounds read in Skia. Credit to Google Chrome Security Team (Inferno). [120912] High CVE-2011-3105: Use-after-free in first-letter handling. Credit to miaubiz. [122654] Critical CVE-2011-3106: Browser memory corruption with websockets over SSL. Credit to the Chromium development community (Dharani Govindan). [124625] High CVE-2011-3107: Crashes in the plug-in JavaScript bindings. Credit to the Chromium development community (Dharani Govindan). [125159] Critical CVE-2011-3108: Use-after-free in browser cache. Credit to
    last seen2020-06-01
    modified2020-06-02
    plugin id59281
    published2012-05-29
    reporterThis script is Copyright (C) 2012-2013 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/59281
    titleFreeBSD : chromium -- multiple vulnerabilities (219d0bfd-a915-11e1-b519-00262d5ed8ee)
  • NASL familyWindows
    NASL idGOOGLE_CHROME_19_0_1084_52.NASL
    descriptionThe version of Google Chrome installed on the remote host is earlier than 19.0.1084.52 and is, therefore, affected by the following vulnerabilities : - An error exists in the v8 JavaScript engine that can cause application crashes during garbage collection. (CVE-2011-3103) - An out-of-bounds read error exists related to
    last seen2020-06-01
    modified2020-06-02
    plugin id59255
    published2012-05-24
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/59255
    titleGoogle Chrome < 19.0.1084.52 Multiple Vulnerabilities
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201205-04.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201205-04 (Chromium, V8: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Chromium and V8. Please review the CVE identifiers and release notes referenced below for details. Impact : A context-dependent attacker could entice a user to open a specially crafted website or JavaScript program using Chromium or V8, possibly resulting in the execution of arbitrary code with the privileges of the process, or a Denial of Service condition. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id59628
    published2012-06-21
    reporterThis script is Copyright (C) 2012-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/59628
    titleGLSA-201205-04 : Chromium, V8: Multiple vulnerabilities

Oval

accepted2013-08-12T04:07:31.357-04:00
classvulnerability
contributors
  • nameShane Shaffer
    organizationG2, Inc.
  • nameShane Shaffer
    organizationG2, Inc.
  • nameMaria Kedovskaya
    organizationALTX-SOFT
definition_extensions
commentGoogle Chrome is installed
ovaloval:org.mitre.oval:def:11914
descriptionGoogle V8, as used in Google Chrome before 19.0.1084.52, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger "type corruption."
familywindows
idoval:org.mitre.oval:def:15433
statusaccepted
submitted2012-05-24T16:15:52.000-04:00
titleVulnerability in Google V8, as used in Google Chrome before 19.0.1084.52 via vectors that trigger "type corruption"
version44

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 53679 CVE ID: CVE-2011-3103,CVE-2011-3104,CVE-2011-3105,CVE-2011-3106,CVE-2011-3107,CVE-2011-3108,CVE-2011-3109,CVE-2011-3110,CVE-2011-3111,CVE-2011-3112,CVE-2011-3113,CVE-2011-3114,CVE-2011-3115 Google Chrome是由Google开发的一款设计简单、高效的Web浏览工具。 Google Chrome 19.0.1084.52之前版本在实现上存在多个安全漏洞,攻击者可利用这些漏洞在浏览器中执行任意代码,绕过安全限制或造成拒绝服务。 1) V8无用单元回收中的不明细节错误可造成崩溃; 2)Skia中存在越界读取错误; 3)首个字母处理中存在释放后重用错误; 4)SSL中的Websocket中存在错误可被利用破坏内存; 5)插件JavaScript绑定中存在不明细节错误,可造成崩溃; 6)浏览器缓存中存在释放后重用错误; 7)GTK UI中存在故障转换错误; 8) PDF处理中存在某些错误可被利用造成越界写入; 9)V8中存在无效读取错误; 10)加密PDF中存在释放后重用错误; 11)PDF中的色彩空间中存在无效转换错误; 12)PDF函数中的错误可被利用造成缓冲区溢出; 13)V8中存在类型破坏错误; 0 Google Chrome 19.x 厂商补丁: Google ------ 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: http://www.google.com
idSSV:60156
last seen2017-11-19
modified2012-05-25
published2012-05-25
reporterRoot
titleGoogle Chrome 19.0.1084.52之前版本多个安全漏洞