A timing attack in SVG rendering in Google Chrome prior to 60.0.3112.78 for Linux, Windows, and Mac allowed a remote attacker to extract pixel values from a cross-origin page being iframe'd via a crafted HTML page.
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Link | Tags |
---|---|
https://security.gentoo.org/glsa/201709-15 | vendor advisory |
http://www.debian.org/security/2017/dsa-3926 | vendor advisory |
https://crbug.com/686253 | |
https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html | |
http://www.securityfocus.com/bid/99950 | vdb entry |
https://access.redhat.com/errata/RHSA-2017:1833 | vendor advisory |