Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4472-77jr-3q62

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Integer overflow in the CrossCallParamsEx::CreateFromBuffer function in sandbox/src/crosscall_server.cc in Google Chrome before 4.0.249.89 allows attackers to leverage renderer access to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a malformed message, related to deserializing of sandbox messages.

Integer overflow in the CrossCallParamsEx::CreateFromBuffer function in sandbox/src/crosscall_server.cc in Google Chrome before 4.0.249.89 allows attackers to leverage renderer access to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a malformed message, related to deserializing of sandbox messages.

EPSS

Процентиль: 64%
0.00482
Низкий

Связанные уязвимости

ubuntu
почти 16 лет назад

Integer overflow in the CrossCallParamsEx::CreateFromBuffer function in sandbox/src/crosscall_server.cc in Google Chrome before 4.0.249.89 allows attackers to leverage renderer access to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a malformed message, related to deserializing of sandbox messages.

nvd
почти 16 лет назад

Integer overflow in the CrossCallParamsEx::CreateFromBuffer function in sandbox/src/crosscall_server.cc in Google Chrome before 4.0.249.89 allows attackers to leverage renderer access to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a malformed message, related to deserializing of sandbox messages.

debian
почти 16 лет назад

Integer overflow in the CrossCallParamsEx::CreateFromBuffer function i ...

EPSS

Процентиль: 64%
0.00482
Низкий