CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
56.6%
Directory traversal vulnerability in sandbox/win/src/named_pipe_dispatcher.cc in Google Chrome before 33.0.1750.117 on Windows allows attackers to bypass intended named-pipe policy restrictions in the sandbox via vectors related to (1) lack of checks for … (dot dot) sequences or (2) lack of use of the \?\ protection mechanism.
Vendor | Product | Version | CPE |
---|---|---|---|
chrome | * | cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* | |
chrome | 33.0.1750.0 | cpe:2.3:a:google:chrome:33.0.1750.0:*:*:*:*:*:*:* | |
chrome | 33.0.1750.1 | cpe:2.3:a:google:chrome:33.0.1750.1:*:*:*:*:*:*:* | |
chrome | 33.0.1750.2 | cpe:2.3:a:google:chrome:33.0.1750.2:*:*:*:*:*:*:* | |
chrome | 33.0.1750.3 | cpe:2.3:a:google:chrome:33.0.1750.3:*:*:*:*:*:*:* | |
chrome | 33.0.1750.4 | cpe:2.3:a:google:chrome:33.0.1750.4:*:*:*:*:*:*:* | |
chrome | 33.0.1750.5 | cpe:2.3:a:google:chrome:33.0.1750.5:*:*:*:*:*:*:* | |
chrome | 33.0.1750.6 | cpe:2.3:a:google:chrome:33.0.1750.6:*:*:*:*:*:*:* | |
chrome | 33.0.1750.7 | cpe:2.3:a:google:chrome:33.0.1750.7:*:*:*:*:*:*:* | |
chrome | 33.0.1750.8 | cpe:2.3:a:google:chrome:33.0.1750.8:*:*:*:*:*:*:* |