Directory traversal vulnerability in sandbox/win/src/named_pipe_dispatcher.cc in Google Chrome before 33.0.1750.117 on Windows allows attackers to bypass intended named-pipe policy restrictions in the sandbox via vectors related to (1) lack of checks for .. (dot dot) sequences or (2) lack of use of the \\?\ protection mechanism.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html - Vendor Advisory | |
References | () https://code.google.com/p/chromium/issues/detail?id=334897 - | |
References | () https://src.chromium.org/viewvc/chrome?revision=247511&view=revision - Patch |
Information
Published : 2014-02-24 04:48
Updated : 2024-11-21 01:59
NVD link : CVE-2013-6652
Mitre link : CVE-2013-6652
CVE.ORG link : CVE-2013-6652
JSON object : View
Products Affected
- chrome
microsoft
- windows
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')