Google Chrome before 25.0.1364.152 does not properly manage the interaction between the browser process and renderer processes during authorization of the loading of a plug-in, which makes it easier for remote attackers to bypass intended access restrictions via vectors involving a blocked plug-in.
References
Link | Resource |
---|---|
https://src.chromium.org/viewvc/chrome?view=rev&revision=180103 | Patch Issue Tracking |
https://codereview.chromium.org/12086077 | Patch Issue Tracking |
https://code.google.com/p/chromium/issues/detail?id=172573 | Patch Issue Tracking |
http://googlechromereleases.blogspot.com/2013/03/stable-channel-update_4.html | Vendor Advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16574 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2013-03-05 13:55
Updated : 2017-09-18 18:35
NVD link : CVE-2013-0910
Mitre link : CVE-2013-0910
JSON object : View
CWE
CWE-287
Improper Authentication
Products Affected
- chrome