The Pickle::Pickle function in base/pickle.cc in Google Chrome before 8.0.552.224 and Chrome OS before 8.0.552.343 on 64-bit Linux platforms does not properly perform pointer arithmetic, which allows remote attackers to bypass message deserialization validation, and cause a denial of service or possibly have unspecified other impact, via invalid pickle data.
References
Link | Resource |
---|---|
http://code.google.com/p/chromium/issues/detail?id=56449 | Patch Vendor Advisory |
http://src.chromium.org/viewvc/chrome?view=rev&revision=68033 | Patch Vendor Advisory |
http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates_13.html | Vendor Advisory |
http://www.gentoo.org/security/en/glsa/glsa-201012-01.xml | Third Party Advisory |
http://secunia.com/advisories/42648 | Third Party Advisory |
http://www.securityfocus.com/bid/45390 | Third Party Advisory VDB Entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14141 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2010-12-21 17:00
Updated : 2020-07-31 04:18
NVD link : CVE-2010-4574
Mitre link : CVE-2010-4574
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
- chrome_os
- chrome
linux
- linux_kernel