Google Chrome before 42.0.2311.90 does not always ask the user before proceeding with CONTENT_SETTINGS_TYPE_FULLSCREEN and CONTENT_SETTINGS_TYPE_MOUSELOCK changes, which allows user-assisted remote attackers to cause a denial of service (UI disruption) by constructing a crafted HTML document containing JavaScript code with requestFullScreen and requestPointerLock calls, and arranging for the user to access this document with a file: URL.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.debian.org/security/2015/dsa-3238 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/74227 | vdb entry third party advisory |
http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html | third party advisory vendor advisory |
http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html | release notes vendor advisory |
https://code.google.com/p/chromium/issues/detail?id=455953 | exploit vendor advisory |