Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-5052

Опубликовано: 27 окт. 2017
Источник: debian
EPSS Низкий

Описание

An incorrect assumption about block structure in Blink in Google Chrome prior to 57.0.2987.133 for Mac, Windows, and Linux, and 57.0.2987.132 for Android, allowed a remote attacker to potentially exploit memory corruption via a crafted HTML page that triggers improper casting.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
chromium-browserfixed57.0.2987.133-1package
chromium-browserend-of-lifejessiepackage
chromium-browserend-of-lifewheezypackage

EPSS

Процентиль: 66%
0.00512
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 8 лет назад

An incorrect assumption about block structure in Blink in Google Chrome prior to 57.0.2987.133 for Mac, Windows, and Linux, and 57.0.2987.132 for Android, allowed a remote attacker to potentially exploit memory corruption via a crafted HTML page that triggers improper casting.

CVSS3: 8.8
redhat
почти 9 лет назад

An incorrect assumption about block structure in Blink in Google Chrome prior to 57.0.2987.133 for Mac, Windows, and Linux, and 57.0.2987.132 for Android, allowed a remote attacker to potentially exploit memory corruption via a crafted HTML page that triggers improper casting.

CVSS3: 8.8
nvd
больше 8 лет назад

An incorrect assumption about block structure in Blink in Google Chrome prior to 57.0.2987.133 for Mac, Windows, and Linux, and 57.0.2987.132 for Android, allowed a remote attacker to potentially exploit memory corruption via a crafted HTML page that triggers improper casting.

CVSS3: 8.8
github
больше 3 лет назад

An incorrect assumption about block structure in Blink in Google Chrome prior to 57.0.2987.133 for Mac, Windows, and Linux, and 57.0.2987.132 for Android, allowed a remote attacker to potentially exploit memory corruption via a crafted HTML page that triggers improper casting.

CVSS3: 8.8
fstec
больше 9 лет назад

Уязвимость модуля отображения Blink браузера Google Chrome, позволяющая нарушителю выполнить произвольный код с повышенными привилегиями или вызвать отказ в обслуживании

EPSS

Процентиль: 66%
0.00512
Низкий