Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6877-256j-g6q4

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The SelectionOwner::ProcessTarget function in ui/base/x/selection_owner.cc in the UI implementation in Google Chrome before 40.0.2214.91 uses an incorrect data type for a certain length value, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted X11 data.

The SelectionOwner::ProcessTarget function in ui/base/x/selection_owner.cc in the UI implementation in Google Chrome before 40.0.2214.91 uses an incorrect data type for a certain length value, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted X11 data.

EPSS

Процентиль: 84%
0.02253
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
около 11 лет назад

The SelectionOwner::ProcessTarget function in ui/base/x/selection_owner.cc in the UI implementation in Google Chrome before 40.0.2214.91 uses an incorrect data type for a certain length value, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted X11 data.

redhat
около 11 лет назад

The SelectionOwner::ProcessTarget function in ui/base/x/selection_owner.cc in the UI implementation in Google Chrome before 40.0.2214.91 uses an incorrect data type for a certain length value, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted X11 data.

nvd
около 11 лет назад

The SelectionOwner::ProcessTarget function in ui/base/x/selection_owner.cc in the UI implementation in Google Chrome before 40.0.2214.91 uses an incorrect data type for a certain length value, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted X11 data.

debian
около 11 лет назад

The SelectionOwner::ProcessTarget function in ui/base/x/selection_owne ...

EPSS

Процентиль: 84%
0.02253
Низкий

Дефекты

CWE-119