Google V8, as used in Google Chrome before 2.0.172.43, allows remote attackers to bypass intended restrictions on reading memory, and possibly obtain sensitive information or execute arbitrary code in the Chrome sandbox, via crafted JavaScript.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2009/2420 | vdb entry vendor advisory |
http://osvdb.org/57421 | vdb entry |
http://secunia.com/advisories/36417 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/36149 | vdb entry |
http://googlechromereleases.blogspot.com/2009/08/stable-update-security-fixes.html | vendor advisory |
http://www.securitytracker.com/id?1022773 | vdb entry |
http://code.google.com/p/chromium/issues/detail?id=18639 | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/52902 | vdb entry |