Google Chrome 17.0.963.66 and earlier allows remote attackers to bypass the sandbox protection mechanism by leveraging access to a sandboxed process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012. NOTE: the primary affected product may be clarified later; it was not identified by the researcher, who reportedly stated “it really doesn’t matter if it’s third-party code.”
pwn2own.zerodayinitiative.com/status.html
twitter.com/vupen/statuses/177576000761237505
www.forbes.com/sites/andygreenberg/2012/03/21/meet-the-hackers-who-sell-spies-the-tools-to-crack-your-pc-and-get-paid-six-figure-fees/
www.zdnet.com/blog/security/pwn2own-2012-google-chrome-browser-sandbox-first-to-fall/10588
exchange.xforce.ibmcloud.com/vulnerabilities/74324
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14940