Описание
Stack-based buffer overflow in the SaveAs feature (SaveFileAsWithFilter function) in win_util.cc in Google Chrome 0.2.149.27 allows user-assisted remote attackers to execute arbitrary code via a web page with a long TITLE element, which triggers the overflow when the user saves the page and a long filename is generated. NOTE: it might be possible to exploit this issue via an HTTP response that includes a long filename in a Content-Disposition header.
Stack-based buffer overflow in the SaveAs feature (SaveFileAsWithFilter function) in win_util.cc in Google Chrome 0.2.149.27 allows user-assisted remote attackers to execute arbitrary code via a web page with a long TITLE element, which triggers the overflow when the user saves the page and a long filename is generated. NOTE: it might be possible to exploit this issue via an HTTP response that includes a long filename in a Content-Disposition header.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2008-6994
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44935
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44939
- https://www.exploit-db.com/exploits/6365
- https://www.exploit-db.com/exploits/6367
- http://code.google.com/p/chromium/issues/detail?id=1414
- http://osvdb.org/48259
- http://security.bkis.vn/?p=119
- http://securitytracker.com/id?1020823
- http://src.chromium.org/viewvc/chrome/branches/chrome_official_branch/src/chrome/common/win_util.cc?r1=1757&r2=1766&pathrev=1766
- http://www.infoworld.com/d/security-central/critical-vulnerability-patched-in-googles-chrome-599
- http://www.securityfocus.com/archive/1/496042/100/0/threaded
- http://www.securityfocus.com/bid/31029
- http://www.securityfocus.com/bid/31031
Связанные уязвимости
Stack-based buffer overflow in the SaveAs feature (SaveFileAsWithFilter function) in win_util.cc in Google Chrome 0.2.149.27 allows user-assisted remote attackers to execute arbitrary code via a web page with a long TITLE element, which triggers the overflow when the user saves the page and a long filename is generated. NOTE: it might be possible to exploit this issue via an HTTP response that includes a long filename in a Content-Disposition header.
Stack-based buffer overflow in the SaveAs feature (SaveFileAsWithFilte ...