Code Injection in Google Chrome - CVE-2014-3177
Published: August 27, 2014 / Updated: August 10, 2020
Google Chrome
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Google Chrome before 37.0.2062.94 does not properly handle the interaction of extensions, IPC, the sync API, and Google V8, which allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-3176.
How to mitigate CVE-2014-3177
Sources
- http://googlechromereleases.blogspot.com/2014/08/stable-channel-update_26.html
- http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00027.html
- http://secunia.com/advisories/60268
- http://secunia.com/advisories/61482
- http://security.gentoo.org/glsa/glsa-201408-16.xml
- http://www.debian.org/security/2014/dsa-3039
- http://www.securityfocus.com/bid/69404
- http://www.securitytracker.com/id/1030767
- https://crbug.com/386988
- https://exchange.xforce.ibmcloud.com/vulnerabilities/95477