CVE-2014-1731

core/html/HTMLSelectElement.cpp in the DOM implementation in Blink, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, does not properly check renderer state upon a focus event, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion" for SELECT elements.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

History

07 Nov 2023, 02:19

Type Values Removed Values Added
References (APPLE) http://archives.neohapsis.com/archives/bugtraq/2014-05/0128.html - Broken Link () http://archives.neohapsis.com/archives/bugtraq/2014-05/0128.html -
References (SECUNIA) http://secunia.com/advisories/60372 - Broken Link () http://secunia.com/advisories/60372 -
References (CONFIRM) https://support.apple.com/kb/HT6537 - Third Party Advisory () https://support.apple.com/kb/HT6537 -
References (SUSE) http://lists.opensuse.org/opensuse-updates/2014-05/msg00049.html - Broken Link () http://lists.opensuse.org/opensuse-updates/2014-05/msg00049.html -
References (SUSE) http://lists.opensuse.org/opensuse-updates/2014-05/msg00050.html - Broken Link () http://lists.opensuse.org/opensuse-updates/2014-05/msg00050.html -
References (APPLE) http://archives.neohapsis.com/archives/bugtraq/2014-06/0175.html - Broken Link () http://archives.neohapsis.com/archives/bugtraq/2014-06/0175.html -
References (CONFIRM) https://src.chromium.org/viewvc/blink?revision=171216&view=revision - Mailing List, Vendor Advisory () https://src.chromium.org/viewvc/blink?revision=171216&view=revision -
References (CONFIRM) http://support.apple.com/kb/HT6254 - Third Party Advisory () http://support.apple.com/kb/HT6254 -
References (SECUNIA) http://secunia.com/advisories/58301 - Broken Link, Vendor Advisory () http://secunia.com/advisories/58301 -
References (GENTOO) http://security.gentoo.org/glsa/glsa-201408-16.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-201408-16.xml -
References (BID) http://www.securityfocus.com/bid/67572 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/67572 -
References (CONFIRM) http://googlechromereleases.blogspot.com/2014/04/stable-channel-update_24.html - Release Notes, Vendor Advisory () http://googlechromereleases.blogspot.com/2014/04/stable-channel-update_24.html -
References (DEBIAN) http://www.debian.org/security/2014/dsa-2920 - Third Party Advisory () http://www.debian.org/security/2014/dsa-2920 -
References (CONFIRM) https://code.google.com/p/chromium/issues/detail?id=349903 - Exploit, Issue Tracking, Mailing List, Vendor Advisory () https://code.google.com/p/chromium/issues/detail?id=349903 -
References (APPLE) http://archives.neohapsis.com/archives/bugtraq/2014-06/0174.html - Broken Link () http://archives.neohapsis.com/archives/bugtraq/2014-06/0174.html -

Information

Published : 2014-04-26 10:55

Updated : 2024-02-28 12:20


NVD link : CVE-2014-1731

Mitre link : CVE-2014-1731

CVE.ORG link : CVE-2014-1731


JSON object : View

Products Affected

google

  • chrome

linux

  • linux_kernel

apple

  • mac_os_x

microsoft

  • windows
CWE
CWE-843

Access of Resource Using Incompatible Type ('Type Confusion')