Buffer overflow in Google Chrome - CVE-2014-1746
Published: May 21, 2014 / Updated: August 10, 2020
Google Chrome
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The InMemoryUrlProtocol::Read function in media/filters/in_memory_url_protocol.cc in Google Chrome before 35.0.1916.114 relies on an insufficiently large integer data type, which allows remote attackers to cause a denial of service (out-of-bounds read) via vectors that trigger use of a large buffer.
How to mitigate CVE-2014-1746
Sources
- http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html
- http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html
- http://secunia.com/advisories/58920
- http://secunia.com/advisories/59155
- http://secunia.com/advisories/60372
- http://security.gentoo.org/glsa/glsa-201408-16.xml
- http://www.debian.org/security/2014/dsa-2939
- http://www.securitytracker.com/id/1030270
- https://code.google.com/p/chromium/issues/detail?id=364065
- https://src.chromium.org/viewvc/chrome?revision=267280&view=revision