Integer overflow in the CrossCallParamsEx::CreateFromBuffer function in sandbox/src/crosscall_server.cc in Google Chrome before 4.0.249.89 allows attackers to leverage renderer access to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a malformed message, related to deserializing of sandbox messages.
code.google.com/p/chromium/issues/detail?id=32915
googlechromereleases.blogspot.com/2010/02/stable-channel-update.html
secunia.com/advisories/38545
securitytracker.com/id?1023583
sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs
www.osvdb.org/62320
www.securityfocus.com/bid/38177
www.vupen.com/english/advisories/2010/0361
exchange.xforce.ibmcloud.com/vulnerabilities/56217
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14256