ID

VAR-201204-0089


CVE

CVE-2011-3076


TITLE

Used in multiple products Webkit Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2012-002018

DESCRIPTION

Use-after-free vulnerability in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to focus handling. Google Chrome Is inadequate in focus processing, so it interferes with service operation. (DoS) There are vulnerabilities that can be in a state or are otherwise unaffected. This vulnerability Webkit Vulnerability in Google Chrome Other than Webkit Products that use may also be affected.Service disruption by a third party (DoS) You may be put into a state or affected by other details. Google Chrome is prone to multiple vulnerabilities. Attackers can exploit these issues to execute arbitrary code in the context of the browser, bypass security restrictions, and perform cross-origin attacks; other attacks may also be possible. NOTE: The issue (described by CVE-2011-3071) has been moved to BID 57027 (Webkit CVE-2011-3071 Remote Code Execution Vulnerability) to better document it. Versions prior to Chrome 18.0.1025.151 are vulnerable. Google Chrome is a web browser developed by Google (Google). ============================================================================ Ubuntu Security Notice USN-1617-1 October 25, 2012 webkit vulnerabilities ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 LTS Summary: Multiple security vulnerabilities were fixed in WebKit. Software Description: - webkit: Web content engine library for GTK+ Details: A large number of security issues were discovered in the WebKit browser and JavaScript engines. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 LTS: libjavascriptcoregtk-1.0-0 1.8.3-0ubuntu0.12.04.1 libjavascriptcoregtk-3.0-0 1.8.3-0ubuntu0.12.04.1 libwebkitgtk-1.0-0 1.8.3-0ubuntu0.12.04.1 libwebkitgtk-3.0-0 1.8.3-0ubuntu0.12.04.1 After a standard system update you need to restart your session to make all the necessary changes. References: http://www.ubuntu.com/usn/usn-1617-1 CVE-2011-3031, CVE-2011-3038, CVE-2011-3042, CVE-2011-3043, CVE-2011-3044, CVE-2011-3051, CVE-2011-3053, CVE-2011-3059, CVE-2011-3060, CVE-2011-3064, CVE-2011-3067, CVE-2011-3076, CVE-2011-3081, CVE-2011-3086, CVE-2011-3090, CVE-2012-1521, CVE-2012-3598, CVE-2012-3601, CVE-2012-3604, CVE-2012-3611, CVE-2012-3612, CVE-2012-3617, CVE-2012-3625, CVE-2012-3626, CVE-2012-3627, CVE-2012-3628, CVE-2012-3645, CVE-2012-3652, CVE-2012-3657, CVE-2012-3669, CVE-2012-3670, CVE-2012-3671, CVE-2012-3672, CVE-2012-3674, CVE-2012-3674, https://launchpad.net/bugs/1058339 Package Information: https://launchpad.net/ubuntu/+source/webkit/1.8.3-0ubuntu0.12.04.1 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2012-09-12-1 iTunes 10.7 iTunes 10.7 is now available and addresses the following: WebKit Available for: Windows 7, Vista, XP SP2 or later Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in WebKit. These issues are addressed through improved memory handling. CVE-ID CVE-2011-3016 : miaubiz CVE-2011-3021 : Arthur Gerkis CVE-2011-3027 : miaubiz CVE-2011-3032 : Arthur Gerkis CVE-2011-3034 : Arthur Gerkis CVE-2011-3035 : wushi of team509 working with iDefense VCP, Arthur Gerkis CVE-2011-3036 : miaubiz CVE-2011-3037 : miaubiz CVE-2011-3038 : miaubiz CVE-2011-3039 : miaubiz CVE-2011-3040 : miaubiz CVE-2011-3041 : miaubiz CVE-2011-3042 : miaubiz CVE-2011-3043 : miaubiz CVE-2011-3044 : Arthur Gerkis CVE-2011-3050 : miaubiz CVE-2011-3053 : miaubiz CVE-2011-3059 : Arthur Gerkis CVE-2011-3060 : miaubiz CVE-2011-3064 : Atte Kettunen of OUSPG CVE-2011-3068 : miaubiz CVE-2011-3069 : miaubiz CVE-2011-3071 : pa_kt working with HP's Zero Day Initiative CVE-2011-3073 : Arthur Gerkis CVE-2011-3074 : Slawomir Blazek CVE-2011-3075 : miaubiz CVE-2011-3076 : miaubiz CVE-2011-3078 : Martin Barbella of the Google Chrome Security Team CVE-2011-3081 : miaubiz CVE-2011-3086 : Arthur Gerkis CVE-2011-3089 : Skylined of the Google Chrome Security Team, miaubiz CVE-2011-3090 : Arthur Gerkis CVE-2011-3105 : miaubiz CVE-2011-3913 : Arthur Gerkis CVE-2011-3924 : Arthur Gerkis CVE-2011-3926 : Arthur Gerkis CVE-2011-3958 : miaubiz CVE-2011-3966 : Aki Helin of OUSPG CVE-2011-3968 : Arthur Gerkis CVE-2011-3969 : Arthur Gerkis CVE-2011-3971 : Arthur Gerkis CVE-2012-0682 : Apple Product Security CVE-2012-0683 : Dave Mandelin of Mozilla CVE-2012-1520 : Martin Barbella of the Google Chrome Security Team using AddressSanitizer, Jose A. Vazquez of spa-s3c.blogspot.com working with iDefense VCP CVE-2012-1521 : Skylined of the Google Chrome Security Team, Jose A. Vazquez of spa-s3c.blogspot.com working with iDefense VCP CVE-2012-2817 : miaubiz CVE-2012-2818 : miaubiz CVE-2012-2829 : miaubiz CVE-2012-2831 : miaubiz CVE-2012-2842 : miaubiz CVE-2012-2843 : miaubiz CVE-2012-3589 : Dave Mandelin of Mozilla CVE-2012-3590 : Apple Product Security CVE-2012-3591 : Apple Product Security CVE-2012-3592 : Apple Product Security CVE-2012-3593 : Apple Product Security CVE-2012-3594 : miaubiz CVE-2012-3595 : Martin Barbella of Google Chrome Security CVE-2012-3596 : Skylined of the Google Chrome Security Team CVE-2012-3597 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer CVE-2012-3598 : Apple Product Security CVE-2012-3599 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer CVE-2012-3600 : David Levin of the Chromium development community CVE-2012-3601 : Martin Barbella of the Google Chrome Security Team using AddressSanitizer CVE-2012-3602 : miaubiz CVE-2012-3603 : Apple Product Security CVE-2012-3604 : Skylined of the Google Chrome Security Team CVE-2012-3605 : Cris Neckar of the Google Chrome Security team CVE-2012-3606 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer CVE-2012-3607 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer CVE-2012-3608 : Skylined of the Google Chrome Security Team CVE-2012-3609 : Skylined of the Google Chrome Security Team CVE-2012-3610 : Skylined of the Google Chrome Security Team CVE-2012-3611 : Apple Product Security CVE-2012-3612 : Skylined of the Google Chrome Security Team CVE-2012-3613 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer CVE-2012-3614 : Yong Li of Research In Motion, Inc. CVE-2012-3615 : Stephen Chenney of the Chromium development community CVE-2012-3616 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer CVE-2012-3617 : Apple Product Security CVE-2012-3618 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer CVE-2012-3620 : Abhishek Arya of Google Chrome Security Team CVE-2012-3621 : Skylined of the Google Chrome Security Team CVE-2012-3622 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer CVE-2012-3623 : Skylined of the Google Chrome Security Team CVE-2012-3624 : Skylined of the Google Chrome Security Team CVE-2012-3625 : Skylined of Google Chrome Security Team CVE-2012-3626 : Apple Product Security CVE-2012-3627 : Skylined and Abhishek Arya of Google Chrome Security team CVE-2012-3628 : Apple Product Security CVE-2012-3629 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer CVE-2012-3630 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer CVE-2012-3631 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer CVE-2012-3632 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer CVE-2012-3633 : Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3634 : Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3635 : Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3636 : Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3637 : Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3638 : Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3639 : Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3640 : miaubiz CVE-2012-3641 : Slawomir Blazek CVE-2012-3642 : miaubiz CVE-2012-3643 : Skylined of the Google Chrome Security Team CVE-2012-3644 : miaubiz CVE-2012-3645 : Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3646 : Julien Chaffraix of the Chromium development community, Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3647 : Skylined of the Google Chrome Security Team CVE-2012-3648 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer CVE-2012-3649 : Dominic Cooney of Google and Martin Barbella of the Google Chrome Security Team CVE-2012-3651 : Abhishek Arya and Martin Barbella of the Google Chrome Security Team CVE-2012-3652 : Martin Barbella of Google Chrome Security Team CVE-2012-3653 : Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3654 : Skylined of the Google Chrome Security Team CVE-2012-3655 : Skylined of the Google Chrome Security Team CVE-2012-3656 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer CVE-2012-3657 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer CVE-2012-3658 : Apple CVE-2012-3659 : Mario Gomes of netfuzzer.blogspot.com, Abhishek Arya of the Google Chrome Security Team using AddressSanitizer CVE-2012-3660 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer CVE-2012-3661 : Apple Product Security CVE-2012-3663 : Skylined of Google Chrome Security Team CVE-2012-3664 : Thomas Sepez of the Chromium development community CVE-2012-3665 : Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3666 : Apple CVE-2012-3667 : Trevor Squires of propaneapp.com CVE-2012-3668 : Apple Product Security CVE-2012-3669 : Apple Product Security CVE-2012-3670 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer, Arthur Gerkis CVE-2012-3671 : Skylined and Martin Barbella of the Google Chrome Security Team CVE-2012-3672 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer CVE-2012-3673 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer CVE-2012-3674 : Skylined of Google Chrome Security Team CVE-2012-3675 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer CVE-2012-3676 : Julien Chaffraix of the Chromium development community CVE-2012-3677 : Apple CVE-2012-3678 : Apple Product Security CVE-2012-3679 : Chris Leary of Mozilla CVE-2012-3680 : Skylined of Google Chrome Security Team CVE-2012-3681 : Apple CVE-2012-3682 : Adam Barth of the Google Chrome Security Team CVE-2012-3683 : wushi of team509 working with iDefense VCP CVE-2012-3684 : kuzzcc CVE-2012-3685 : Apple Product Security CVE-2012-3686 : Robin Cao of Torch Mobile (Beijing) CVE-2012-3687 : kuzzcc CVE-2012-3688 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer CVE-2012-3692 : Skylined of the Google Chrome Security Team, Apple Product Security CVE-2012-3699 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer CVE-2012-3700 : Apple Product Security CVE-2012-3701 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer CVE-2012-3702 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer CVE-2012-3703 : Apple Product Security CVE-2012-3704 : Skylined of the Google Chrome Security Team CVE-2012-3705 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer CVE-2012-3706 : Apple Product Security CVE-2012-3707 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer CVE-2012-3708 : Apple CVE-2012-3709 : Apple Product Security CVE-2012-3710 : James Robinson of Google CVE-2012-3711 : Skylined of the Google Chrome Security Team CVE-2012-3712 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer iTunes 10.7 may be obtained from: http://www.apple.com/itunes/download/ For Windows XP / Vista / Windows 7: The download file is named: "iTunesSetup.exe" Its SHA-1 digest is: 499c39aad4a05c76286e3159f4e1e081dab8fe86 For 64-bit Windows XP / Vista / Windows 7: The download file is named: "iTunes64Setup.exe" Its SHA-1 digest is: c632854371097edbf3d831f7f2d449297d9f988e Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.17 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJQUMRFAAoJEPefwLHPlZEwmlsP/2mlVZEsRtFPk3k/mkYyj8gs 4j8VH6D5PNk7cR5S65L0BRM6ijmvGJ1J5WyKxdK55BtZ2gd1vGjmpruSMVptDIzF JkRQKV8koK/kqUIGI679borf8qv9hK0eFsoO8cVfGfA3LoRB94DlKl9UGhZpQjIt bKS2hsNvDO1EWaoVFZeJw6wxx37zp8XdIuneoNsEPgECJywfMtncQT1MDE0deP5D 79vb3ds44CpCV2ltdwni5n43sUmGalCyMLkuR8GkUUQ7hd631cSOXK1mw39w6CY+ kM8lpczoW8s116E44GeGSu5rrYgOfthJPO0yUolB/kdjoccEri802YLq84Y2FV9u c0T2BWMjmcoCEfuhT1JW6dL8FXTQGrQz/DvQlIzkzUf3KHVuu0pfc0V4bG202c2h zGnHNsZOY38wAFwHbISBs0BM78/G2fJeOaXil2eUu1F8ChZOw4+KqQYee9lUgM1u FBamxVVi5bzc4qj+EraLQS0X1gehKX3Riq6SwF6L7uOw0oSHTUwrqoiJq9s6CtGd 7YdxNQAugTScCWW0dCLajg5M4lW1pudOgIU1VfTnGYvqGTMsLCRL5WtJ69anQzWv 7pi898e8Wn7Iw1y3CTkoZZZNg9yD5ZvYf7FkIqEVj8ksmGliDC/O988KVg/dWQ7F HUcSouao5FGpzuLJSdhc =l7aG -----END PGP SIGNATURE----- . This fixes multiple vulnerabilities, where some have unknown impacts while others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Google Chrome Multiple Vulnerabilities SECUNIA ADVISORY ID: SA48732 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48732/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48732 RELEASE DATE: 2012-04-06 DISCUSS ADVISORY: http://secunia.com/advisories/48732/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48732/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48732 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Google Chrome where some have unknown impacts while others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. 1) Two unspecified errors in Flash Player can be exploited to corrupt memory in the Chrome interface. 2) An out-of-bounds read error exists when handling Skia clipping. 3) An error exists within the cross-origin policy when handling iframe replacement. 4) A use-after-free error exists when handling run-ins. 5) A use-after-free error exists when handling line boxes. 6) A use-after-free error exits when handling v8 bindings. 7) A use-after-free error exits when handling HTMLMediaElement. 8) An error exists within the cross-origin policy when parenting pop-up windows. 9) A use-after-free error exists when handling SVG resources. 10) A use-after-free error exists when handling media content. 11) A use-after-free error exists when applying style commands. 12) A use-after-free error exists when handling focus events. 13) A read-after-free error exists within script bindings. SOLUTION: Update to version 18.0.1025.151. PROVIDED AND/OR DISCOVERED BY: The vendor credits: 2, 4, 5, 11, 12) miaubiz 3, 8) Sergey Glazunov 6) SkyLined, Google Chrome Security Team 7) pa_kt via ZDI 9) Arthur Gerkis 10) Slawomir Blazek 13) Inferno, Google Chrome Security Team ORIGINAL ADVISORY: http://googlechromereleases.blogspot.com/2012/04/stable-and-beta-channel-updates.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201204-03 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Chromium: Multiple vulnerabilities Date: April 10, 2012 Bugs: #410963 ID: 201204-03 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been reported in Chromium, some of which may allow execution of arbitrary code. Background ========== Chromium is an open source web browser project. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 www-client/chromium < 18.0.1025.151 >= 18.0.1025.151 Description =========== Multiple vulnerabilities have been discovered in Chromium. Please review the CVE identifiers and release notes referenced below for details. Impact ====== A remote attacker could entice a user to open a specially crafted web site using Chromium, possibly resulting in the execution of arbitrary code with the privileges of the process, a Denial of Service condition, or bypass of the same origin policy. Workaround ========== There is no known workaround at this time. Resolution ========== All Chromium users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=www-client/chromium-18.0.1025.151" References ========== [ 1 ] CVE-2011-3066 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3066 [ 2 ] CVE-2011-3067 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3067 [ 3 ] CVE-2011-3068 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3068 [ 4 ] CVE-2011-3069 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3069 [ 5 ] CVE-2011-3070 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3070 [ 6 ] CVE-2011-3071 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3071 [ 7 ] CVE-2011-3072 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3072 [ 8 ] CVE-2011-3073 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3073 [ 9 ] CVE-2011-3074 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3074 [ 10 ] CVE-2011-3075 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3075 [ 11 ] CVE-2011-3076 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3076 [ 12 ] CVE-2011-3077 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3077 [ 13 ] Release Notes 18.0.1025.151 http://googlechromereleases.blogspot.com/2012/04/stable-and-beta-channel-= updates.html Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201204-03.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2012 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 2.43

sources: NVD: CVE-2011-3076 // JVNDB: JVNDB-2012-002018 // BID: 52913 // VULHUB: VHN-51021 // PACKETSTORM: 117673 // PACKETSTORM: 116534 // PACKETSTORM: 111773 // PACKETSTORM: 111642 // PACKETSTORM: 111738

AFFECTED PRODUCTS

vendor:googlemodel:chromescope:ltversion:18.0.1025.151

Trust: 1.8

vendor:applemodel:itunesscope:ltversion:10.7

Trust: 1.8

vendor:applemodel:iphone osscope:ltversion:6.0

Trust: 1.0

vendor:applemodel:safariscope:ltversion:6.0

Trust: 1.0

vendor:applemodel:iosscope:ltversion:6 (ipad 2 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:6 (iphone 3gs or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:6 (ipod touch first 4 after generation )

Trust: 0.8

vendor:applemodel:safariscope:ltversion:6.0 (mac os)

Trust: 0.8

vendor:googlemodel:chromescope:eqversion:3.0.190.2

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:6.0.408.7

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:2.0.172.38

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:5.0.375.64

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:2.0.172.33

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:3.0.182.2

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:5.0.375.70

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:5.0.375.69

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:2.0.172.37

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:5.0.356.2

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:17.0.963.83

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.57

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.100

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.6

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.43

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.75

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.60

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.204

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.128

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1.5

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.2.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.6

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.127

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.65

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.142

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.91275

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.96379

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.112

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.71

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.91

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.78

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.0

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.5

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:googlemodel:chromescope:neversion:18.0.1025.151

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.56

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.107

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874.120

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.77

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1.7

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.96365

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.68

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.672.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874.121

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.163

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.77

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.112

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.4

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874102

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.133

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.0.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.215

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.205

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.186

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.63

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.202

Trust: 0.3

sources: BID: 52913 // JVNDB: JVNDB-2012-002018 // CNNVD: CNNVD-201204-085 // NVD: CVE-2011-3076

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-3076
value: MEDIUM

Trust: 1.0

NVD: CVE-2011-3076
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201204-085
value: HIGH

Trust: 0.6

VULHUB: VHN-51021
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2011-3076
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: CVE-2011-3076
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-51021
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-51021 // JVNDB: JVNDB-2012-002018 // CNNVD: CNNVD-201204-085 // NVD: CVE-2011-3076

PROBLEMTYPE DATA

problemtype:CWE-416

Trust: 1.1

problemtype:CWE-399

Trust: 0.9

sources: VULHUB: VHN-51021 // JVNDB: JVNDB-2012-002018 // NVD: CVE-2011-3076

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 117673 // CNNVD: CNNVD-201204-085

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201204-085

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-002018

PATCH

title:HT5400url:http://support.apple.com/kb/HT5400

Trust: 0.8

title:HT5503url:http://support.apple.com/kb/HT5503

Trust: 0.8

title:HT5485url:http://support.apple.com/kb/HT5485

Trust: 0.8

title:HT5400url:http://support.apple.com/kb/HT5400?viewlocale=ja_JP

Trust: 0.8

title:HT5503url:http://support.apple.com/kb/HT5503?viewlocale=ja_JP

Trust: 0.8

title:HT5485url:http://support.apple.com/kb/HT5485?viewlocale=ja_JP

Trust: 0.8

title:Stable and Beta Channel Updatesurl:http://googlechromereleases.blogspot.jp/2012/04/stable-and-beta-channel-updates.html

Trust: 0.8

title:Google Chromeurl:http://www.google.co.jp/chrome/intl/ja/landing_ff_yt.html?hl=ja&hl=ja

Trust: 0.8

title:Google Chrome Remediation measures for releasing exploitsurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=114608

Trust: 0.6

sources: JVNDB: JVNDB-2012-002018 // CNNVD: CNNVD-201204-085

EXTERNAL IDS

db:NVDid:CVE-2011-3076

Trust: 3.1

db:BIDid:52913

Trust: 2.0

db:SECUNIAid:48732

Trust: 1.8

db:SECUNIAid:48749

Trust: 1.8

db:SECTRACKid:1026892

Trust: 1.7

db:JVNDBid:JVNDB-2012-002018

Trust: 0.8

db:CNNVDid:CNNVD-201204-085

Trust: 0.7

db:VULHUBid:VHN-51021

Trust: 0.1

db:PACKETSTORMid:117673

Trust: 0.1

db:PACKETSTORMid:116534

Trust: 0.1

db:PACKETSTORMid:111773

Trust: 0.1

db:PACKETSTORMid:111642

Trust: 0.1

db:PACKETSTORMid:111738

Trust: 0.1

sources: VULHUB: VHN-51021 // BID: 52913 // JVNDB: JVNDB-2012-002018 // PACKETSTORM: 117673 // PACKETSTORM: 116534 // PACKETSTORM: 111773 // PACKETSTORM: 111642 // PACKETSTORM: 111738 // CNNVD: CNNVD-201204-085 // NVD: CVE-2011-3076

REFERENCES

url:http://googlechromereleases.blogspot.com/2012/04/stable-and-beta-channel-updates.html

Trust: 2.1

url:http://security.gentoo.org/glsa/glsa-201204-03.xml

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2012/jul/msg00000.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2012/sep/msg00001.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2012/sep/msg00003.html

Trust: 1.7

url:http://www.securityfocus.com/bid/52913

Trust: 1.7

url:http://code.google.com/p/chromium/issues/detail?id=120037

Trust: 1.7

url:http://support.apple.com/kb/ht5400

Trust: 1.7

url:http://support.apple.com/kb/ht5485

Trust: 1.7

url:http://support.apple.com/kb/ht5503

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a15172

Trust: 1.7

url:http://www.securitytracker.com/id?1026892

Trust: 1.7

url:http://secunia.com/advisories/48732

Trust: 1.7

url:http://secunia.com/advisories/48749

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/74636

Trust: 1.7

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3076

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3076

Trust: 0.8

url:http://jvn.jp/cert/jvnvu624491/

Trust: 0.8

url:http://jvn.jp/cert/jvnvu864819/

Trust: 0.8

url:http://www.google.com/chrome

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2011-3076

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2011-3059

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3067

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3060

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3038

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3064

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3043

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3044

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3053

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3042

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3074

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3075

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3071

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3068

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3069

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3073

Trust: 0.2

url:http://secunia.com/psi_30_beta_launch

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.2

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.2

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-3625

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3051

Trust: 0.1

url:http://www.ubuntu.com/usn/usn-1617-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3628

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3598

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3031

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3645

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3090

Trust: 0.1

url:https://launchpad.net/bugs/1058339

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3626

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-1521

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3086

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3611

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3604

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3601

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3081

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3652

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3617

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/webkit/1.8.3-0ubuntu0.12.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3627

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3612

Trust: 0.1

url:http://support.apple.com/kb/ht1222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3035

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3027

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3050

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3016

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3036

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3078

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3041

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3021

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3032

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3040

Trust: 0.1

url:http://gpgtools.org

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3037

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3034

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3039

Trust: 0.1

url:http://www.apple.com/itunes/download/

Trust: 0.1

url:http://secunia.com/advisories/48749/#comments

Trust: 0.1

url:http://secunia.com/advisories/48749/

Trust: 0.1

url:http://www.gentoo.org/security/en/glsa/glsa-201204-03.xml

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48749

Trust: 0.1

url:http://secunia.com/advisories/48732/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48732

Trust: 0.1

url:http://secunia.com/advisories/48732/

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3071

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3066

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3072

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3073

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3070

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3075

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3074

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3070

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3077

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3077

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3072

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3066

Trust: 0.1

url:http://googlechromereleases.blogspot.com/2012/04/stable-and-beta-channel-=

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3069

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3067

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3068

Trust: 0.1

sources: VULHUB: VHN-51021 // BID: 52913 // JVNDB: JVNDB-2012-002018 // PACKETSTORM: 117673 // PACKETSTORM: 116534 // PACKETSTORM: 111773 // PACKETSTORM: 111642 // PACKETSTORM: 111738 // CNNVD: CNNVD-201204-085 // NVD: CVE-2011-3076

CREDITS

miaubiz, Sergey Glazunov, Google Chrome Security Team (SkyLined), pa_kt, Arthur Gerkis, Slawomir Blazek, and Google Chrome Security Team (Inferno).

Trust: 0.3

sources: BID: 52913

SOURCES

db:VULHUBid:VHN-51021
db:BIDid:52913
db:JVNDBid:JVNDB-2012-002018
db:PACKETSTORMid:117673
db:PACKETSTORMid:116534
db:PACKETSTORMid:111773
db:PACKETSTORMid:111642
db:PACKETSTORMid:111738
db:CNNVDid:CNNVD-201204-085
db:NVDid:CVE-2011-3076

LAST UPDATE DATE

2024-11-23T20:22:49.046000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-51021date:2020-04-14T00:00:00
db:BIDid:52913date:2012-12-21T15:00:00
db:JVNDBid:JVNDB-2012-002018date:2013-04-03T00:00:00
db:CNNVDid:CNNVD-201204-085date:2020-04-15T00:00:00
db:NVDid:CVE-2011-3076date:2024-11-21T01:29:40.200

SOURCES RELEASE DATE

db:VULHUBid:VHN-51021date:2012-04-05T00:00:00
db:BIDid:52913date:2012-04-05T00:00:00
db:JVNDBid:JVNDB-2012-002018date:2012-04-09T00:00:00
db:PACKETSTORMid:117673date:2012-10-25T20:48:27
db:PACKETSTORMid:116534date:2012-09-14T02:13:11
db:PACKETSTORMid:111773date:2012-04-11T07:10:07
db:PACKETSTORMid:111642date:2012-04-06T04:58:48
db:PACKETSTORMid:111738date:2012-04-11T14:21:31
db:CNNVDid:CNNVD-201204-085date:2010-04-06T00:00:00
db:NVDid:CVE-2011-3076date:2012-04-05T22:02:08.043