Weekly Vulnerabilities Reports > October 18 to 24, 2010
Overview
5 new vulnerabilities reported during this period, including 3 critical vulnerabilities and 2 high severity vulnerabilities. This weekly summary report vulnerabilities in 3 products from 3 vendors including Google, Opensuse, and Debian. Vulnerabilities are notably categorized as "Improper Input Validation", and "Improper Resource Shutdown or Release".
- 4 reported vulnerabilities are remotely exploitables.
- 4 reported vulnerabilities are exploitable by an anonymous user.
- Google has the most reported vulnerabilities, with 5 reported vulnerabilities.
- Google has the most reported critical vulnerabilities, with 3 reported vulnerabilities.
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
EXPLOITABLE
EXPLOITABLE
AVAILABLE
ANONYMOUSLY
WEB APPLICATION
Vulnerability Details
The following table list reported vulnerabilities for the period covered by this report:
3 Critical Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2010-10-21 | CVE-2010-4042 | Google Opensuse | Improper Input Validation vulnerability in multiple products Google Chrome before 7.0.517.41 does not properly handle element maps, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to "stale elements." | 9.8 |
2010-10-21 | CVE-2010-4041 | Unspecified vulnerability in Google Chrome The sandbox implementation in Google Chrome before 7.0.517.41 on Linux does not properly constrain worker processes, which might allow remote attackers to bypass intended access restrictions via unspecified vectors. | 9.8 | |
2010-10-21 | CVE-2010-4039 | Unspecified vulnerability in Google Chrome Google Chrome before 7.0.517.41 on Linux does not properly set the PATH environment variable, which has unspecified impact and attack vectors. | 9.8 |
2 High Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2010-10-21 | CVE-2010-4040 | Google Debian Opensuse | Improper Input Validation vulnerability in multiple products Google Chrome before 7.0.517.41 does not properly handle animated GIF images, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted image. | 7.8 |
2010-10-21 | CVE-2010-4038 | Improper Resource Shutdown or Release vulnerability in Google Chrome The Web Sockets implementation in Google Chrome before 7.0.517.41 does not properly handle a shutdown action, which allows remote attackers to cause a denial of service (application crash) via unspecified vectors. | 7.5 |
0 Medium Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|
0 Low Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|