TITLE: Google Chrome Floating Point Parsing Buffer Overflow SECUNIA ADVISORY ID: SA36913 VERIFY ADVISORY: http://secunia.com/advisories/36913/ DESCRIPTION: A vulnerability has been reported in Google Chrome, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused due to a boundary error when parsing floating point numbers. This can be exploited to cause a buffer overflow by tricking a user into visiting a malicious website. Successful exploitation may allow execution of arbitrary code in the Google Chrome sandbox. The vulnerability is reported in versions prior to 3.0.195.24. SOLUTION: Update to version 3.0.195.24. ORIGINAL ADVISORY: Google: http://googlechromereleases.blogspot.com/2009/09/stable-channel-update_30.html OTHER REFERENCES: SecurityReason: http://securityreason.com/achievement_securityalert/63 ========================= The list's FAQ's can be seen by sending an email to PCWorks-request@xxxxxxxxxxxxx with FAQ in the subject line. To unsubscribe, subscribe, set Digest or Vacation to on or off, go to //www.freelists.org/list/pcworks . You can also send an email to PCWorks-request@xxxxxxxxxxxxx with Unsubscribe in the subject line. Your member list settings can be found at //www.freelists.org/cgi-bin/lsg2.cgi/l=pcworks . Once logged in, you have access to numerous other email options. The list archives are located at //www.freelists.org/archives/pcworks/ . All email posted to the list will be placed there in the event anyone needs to look for previous posts. -zxdjhu-