Google Chrome before 38.0.2125.101 and Chrome OS before 38.0.2125.101 do not properly handle the interaction of IPC and Google V8, which allows remote attackers to execute arbitrary code via vectors involving JSON data, related to improper parsing of an escaped index by ParseJsonObject in json-parser.h.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
07 Nov 2023, 02:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html - | |
References | () https://code.google.com/p/v8/source/detail?r=24125 - | |
References | () https://crbug.com/416449 - | |
References | () http://googlechromereleases.blogspot.com/2014/10/stable-channel-update-for-chrome-os.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2014-1626.html - |
Information
Published : 2014-10-08 10:55
Updated : 2024-02-28 12:20
NVD link : CVE-2014-3188
Mitre link : CVE-2014-3188
CVE.ORG link : CVE-2014-3188
JSON object : View
Products Affected
- chrome_os
- chrome
redhat
- enterprise_linux_desktop_supplementary
- enterprise_linux_server_supplementary_eus
- enterprise_linux_server_supplementary
- enterprise_linux_workstation_supplementary
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')