Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wrm5-w67c-xm7j

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The ParamTraits::Read function in common/common_param_traits.cc in Google Chrome before 4.0.249.78 does not use the correct variables in calculations designed to prevent integer overflows, which allows attackers to leverage renderer access to cause a denial of service or possibly have unspecified other impact via bitmap data, related to deserialization.

The ParamTraits::Read function in common/common_param_traits.cc in Google Chrome before 4.0.249.78 does not use the correct variables in calculations designed to prevent integer overflows, which allows attackers to leverage renderer access to cause a denial of service or possibly have unspecified other impact via bitmap data, related to deserialization.

EPSS

Процентиль: 65%
0.00487
Низкий

Связанные уязвимости

ubuntu
почти 16 лет назад

The ParamTraits<SkBitmap>::Read function in common/common_param_traits.cc in Google Chrome before 4.0.249.78 does not use the correct variables in calculations designed to prevent integer overflows, which allows attackers to leverage renderer access to cause a denial of service or possibly have unspecified other impact via bitmap data, related to deserialization.

nvd
почти 16 лет назад

The ParamTraits<SkBitmap>::Read function in common/common_param_traits.cc in Google Chrome before 4.0.249.78 does not use the correct variables in calculations designed to prevent integer overflows, which allows attackers to leverage renderer access to cause a denial of service or possibly have unspecified other impact via bitmap data, related to deserialization.

debian
почти 16 лет назад

The ParamTraits<SkBitmap>::Read function in common/common_param_traits ...

EPSS

Процентиль: 65%
0.00487
Низкий