Heap-based buffer overflow in the ParamTraits<SkBitmap>::Read function in Google Chrome before 1.0.154.64 allows attackers to leverage renderer access to cause a denial of service (application crash) or possibly execute arbitrary code via vectors related to a large bitmap that arrives over the IPC channel.
CPE | Name | Operator | Version |
---|---|---|---|
chrome | eq | 0.3.154.3 | |
chrome | eq | 0.2.149.30 | |
chrome | eq | 0.4.154.31 | |
chrome | eq | 1.0.154.39 | |
chrome | eq | 1.0.154.59 | |
chrome | eq | 0.4.154.33 | |
chrome | eq | 1.0.154.43 | |
chrome | eq | 1.0.154.42 | |
chrome | eq | 0.4.154.18 | |
chrome | eq | 0.2.149.29 |
osvdb.org/54288
secunia.com/advisories/35014
www.securityfocus.com/bid/34859
www.securitytracker.com/id?1022174
www.vupen.com/english/advisories/2009/1266
code.google.com/p/chromium/issues/detail?id=10869
exchange.xforce.ibmcloud.com/vulnerabilities/50362
googlechromereleases.blogspot.com/2009/05/stable-update-security-fix.html