[PCWorks] Google Chrome Vulnerability Floating Point Parsing Buffer Overflow

  • From: "Clint Hamilton-PCWorks Admin" <PCWorks@xxxxxxxxxxxxxxxxxxxxxxxx>
  • To: "PCWorks@xxxxxxxxxxxxx" <pcworks@xxxxxxxxxxxxx>
  • Date: Fri, 2 Oct 2009 03:25:53 -0500

TITLE:
Google Chrome Floating Point Parsing Buffer Overflow

SECUNIA ADVISORY ID:
SA36913

VERIFY ADVISORY:
http://secunia.com/advisories/36913/

DESCRIPTION:
A vulnerability has been reported in Google Chrome, which can 
be
exploited by malicious people to potentially compromise a 
user's
system.

The vulnerability is caused due to a boundary error when 
parsing
floating point numbers. This can be exploited to cause a buffer
overflow by tricking a user into visiting a malicious website.

Successful exploitation may allow execution of arbitrary code 
in the
Google Chrome sandbox.

The vulnerability is reported in versions prior to 3.0.195.24.

SOLUTION:
Update to version 3.0.195.24.

ORIGINAL ADVISORY:
Google:
http://googlechromereleases.blogspot.com/2009/09/stable-channel-update_30.html

OTHER REFERENCES:
SecurityReason:
http://securityreason.com/achievement_securityalert/63


=========================
The list's FAQ's can be seen by sending an email to 
PCWorks-request@xxxxxxxxxxxxx with FAQ in the subject line.

To unsubscribe, subscribe, set Digest or Vacation to on or off, go to 
//www.freelists.org/list/pcworks .  You can also send an email to 
PCWorks-request@xxxxxxxxxxxxx with Unsubscribe in the subject line.  Your 
member list settings can be found at 
//www.freelists.org/cgi-bin/lsg2.cgi/l=pcworks .  Once logged in, you have 
access to numerous other email options.  

The list archives are located at //www.freelists.org/archives/pcworks/ .  
All email posted to the list will be placed there in the event anyone needs to 
look for previous posts.
-zxdjhu-

Other related posts:

  • » [PCWorks] Google Chrome Vulnerability Floating Point Parsing Buffer Overflow - Clint Hamilton-PCWorks Admin