Vulnerability identifier: #VU44733
Vulnerability risk: Medium
CVSSv4.0: 5.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: Yes
Vulnerable software:
Google Chrome
Client/Desktop applications /
Web browsers
Vendor: Google
Description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 14.0.835.163 does not properly perform garbage collection during the processing of PDF documents, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Google Chrome: 14.0.835.0 - 14.0.835.162
External links
https://code.google.com/p/chromium/issues/detail?id=78639
https://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html
https://osvdb.org/75541
https://securityreason.com/securityalert/8411
https://exchange.xforce.ibmcloud.com/vulnerabilities/69868
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14019
https://www.exploit-db.com/exploits/17929/
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.