Google Chrome 17.0.963.66 and earlier allows remote attackers to bypass the sandbox protection mechanism by leveraging access to a sandboxed process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012. NOTE: the primary affected product may be clarified later; it was not identified by the researcher, who reportedly stated "it really doesn't matter if it's third-party code."
References
Link | Resource |
---|---|
http://pwn2own.zerodayinitiative.com/status.html | Not Applicable |
http://www.zdnet.com/blog/security/pwn2own-2012-google-chrome-browser-sandbox-first-to-fall/10588 | Press/Media Coverage |
http://www.forbes.com/sites/andygreenberg/2012/03/21/meet-the-hackers-who-sell-spies-the-tools-to-crack-your-pc-and-get-paid-six-figure-fees/ | Press/Media Coverage |
http://twitter.com/vupen/statuses/177576000761237505 | Broken Link |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14940 | Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/74324 | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2012-03-22 09:55
Updated : 2020-04-16 08:27
NVD link : CVE-2012-1846
Mitre link : CVE-2012-1846
JSON object : View
CWE
CWE-668
Exposure of Resource to Wrong Sphere
Products Affected
- chrome