Buffer overflow in Skia, as used in Google Chrome before 17.0.963.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
http://code.google.com/p/chromium/issues/detail?id=108406 | vendor advisory |
http://www.securitytracker.com/id?1026759 | vdb entry third party advisory |
http://secunia.com/advisories/48527 | third party advisory not applicable |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15094 | vdb entry third party advisory signature |
http://secunia.com/advisories/48265 | third party advisory not applicable |
http://secunia.com/advisories/48419 | third party advisory not applicable |
http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00012.html | mailing list third party advisory vendor advisory |
http://code.google.com/p/chromium/issues/detail?id=115471 | vendor advisory |
http://www.securityfocus.com/bid/52271 | vdb entry third party advisory |
http://security.gentoo.org/glsa/glsa-201203-19.xml | third party advisory vendor advisory |
http://googlechromereleases.blogspot.com/2012/03/chrome-stable-update.html | release notes vendor advisory |