Buffer overflow in Skia, as used in Google Chrome before 17.0.963.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
References
Link | Resource |
---|---|
http://googlechromereleases.blogspot.com/2012/03/chrome-stable-update.html | Release Notes Vendor Advisory |
http://code.google.com/p/chromium/issues/detail?id=115471 | Vendor Advisory |
http://code.google.com/p/chromium/issues/detail?id=108406 | Vendor Advisory |
http://security.gentoo.org/glsa/glsa-201203-19.xml | Third Party Advisory |
http://secunia.com/advisories/48527 | Not Applicable |
http://secunia.com/advisories/48419 | Not Applicable |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15094 | Third Party Advisory |
http://www.securitytracker.com/id?1026759 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/52271 | Third Party Advisory VDB Entry |
http://secunia.com/advisories/48265 | Not Applicable |
http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00012.html | Mailing List Third Party Advisory |
Information
Published : 2012-03-05 11:55
Updated : 2020-04-16 09:16
NVD link : CVE-2011-3033
Mitre link : CVE-2011-3033
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
- chrome
opensuse
- opensuse