Vulnerability identifier: #VU42017
Vulnerability risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Google Chrome
Client/Desktop applications /
Web browsers
Vendor: Google
Description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Multiple unspecified vulnerabilities in Google Chrome before 33.0.1750.117 allow attackers to bypass the sandbox protection mechanism after obtaining renderer access, or have other impact, via unknown vectors.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Google Chrome: 33.0.1750.0 - 33.0.1750.115
External links
https://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html
https://lists.opensuse.org/opensuse-updates/2014-03/msg00006.html
https://www.debian.org/security/2014/dsa-2883
https://code.google.com/p/chromium/issues/detail?id=294687
https://code.google.com/p/chromium/issues/detail?id=312016
https://code.google.com/p/chromium/issues/detail?id=313005
https://code.google.com/p/chromium/issues/detail?id=314088
https://code.google.com/p/chromium/issues/detail?id=324812
https://code.google.com/p/chromium/issues/detail?id=326860
https://code.google.com/p/chromium/issues/detail?id=328620
https://code.google.com/p/chromium/issues/detail?id=329651
https://code.google.com/p/chromium/issues/detail?id=330222
https://code.google.com/p/chromium/issues/detail?id=330750
https://code.google.com/p/chromium/issues/detail?id=332957
https://code.google.com/p/chromium/issues/detail?id=333885
https://code.google.com/p/chromium/issues/detail?id=334274
https://code.google.com/p/chromium/issues/detail?id=338464
https://code.google.com/p/chromium/issues/detail?id=338532
https://code.google.com/p/chromium/issues/detail?id=338561
https://code.google.com/p/chromium/issues/detail?id=339337
https://code.google.com/p/chromium/issues/detail?id=341220
https://code.google.com/p/chromium/issues/detail?id=344876
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.