The Pickle::Pickle function in base/pickle.cc in Google Chrome before 8.0.552.224 and Chrome OS before 8.0.552.343 on 64-bit Linux platforms does not properly perform pointer arithmetic, which allows remote attackers to bypass message deserialization validation, and cause a denial of service or possibly have unspecified other impact, via invalid pickle data.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://code.google.com/p/chromium/issues/detail?id=56449 - Patch, Vendor Advisory | |
References | () http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates_13.html - Vendor Advisory | |
References | () http://secunia.com/advisories/42648 - Third Party Advisory | |
References | () http://src.chromium.org/viewvc/chrome?view=rev&revision=68033 - Patch, Vendor Advisory | |
References | () http://www.gentoo.org/security/en/glsa/glsa-201012-01.xml - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/45390 - Third Party Advisory, VDB Entry | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14141 - Third Party Advisory |
Information
Published : 2010-12-22 01:00
Updated : 2024-11-21 01:21
NVD link : CVE-2010-4574
Mitre link : CVE-2010-4574
CVE.ORG link : CVE-2010-4574
JSON object : View
Products Affected
- chrome_os
- chrome
linux
- linux_kernel
CWE
CWE-502
Deserialization of Untrusted Data