ID

VAR-201209-0320


CVE

CVE-2012-2896


TITLE

Mac OS X Run on Google Chrome of WebGL Implementation of integer overflow vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2012-004635

DESCRIPTION

Integer overflow in the WebGL implementation in Google Chrome before 22.0.1229.79 on Mac OS X allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. Google Chrome is prone to multiple security vulnerabilities. Attackers can exploit these issues to execute arbitrary code in the context of the browser, cause denial-of-service conditions, execute arbitrary script code in the browser of an unsuspecting user, or steal cookie-based authentication credentials; other attacks are also possible. Versions prior to Chrome 22.0.1229.79 are vulnerable. NOTE: The CVE-2012-2897 issue has been moved to BID 56457 (Microsoft Windows Kernel 'Win32k.sys' TrueType Font Parsing Remote Code Execution Vulnerability) to better document it. Google Chrome is a web browser developed by Google (Google). ---------------------------------------------------------------------- The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/ ---------------------------------------------------------------------- TITLE: Google Chrome Multiple Vulnerabilities SECUNIA ADVISORY ID: SA50759 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/50759/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=50759 RELEASE DATE: 2012-09-26 DISCUSS ADVISORY: http://secunia.com/advisories/50759/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/50759/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=50759 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system. 1) Certain unspecified input related to frame handling is not properly sanitised before being returned to the user. 2) Certain unspecified input within v8 bindings is not properly sanitised before being returned to the user. 3) An error exists within plugin handling and can be exploited to cause DOM tree corruption. 4) An error due to SSE2 optimizations can be exploited to cause a buffer overflow. 5) An error exists within Skia and can be exploited to cause an out-of-bounds write. 6) A use-after-free error exists within onclick handling. 7) A use-after-free error exists related to SVG text references. 8) An integer overflow error exists related to WebGL handling. 9) An unspecified error can be exploited to cause DOM topology corruption. 10) An error exists within Skia and can be exploited to cause an out-of-bounds write. 11) Some weaknesses exist in the PDF viewer. 12) A use-after-free error exists within the plug-in handling. 13) A race condition exists when handling plug-in paint buffers. 14) An error when handling OGG containers can be exploited to reference an invalid pointer. 15) A double-free error exists on exit. 16) A use-after-free error exists within the PDF viewer. 17) An unspecified error exists and can be exploited to bypass the pop-up block. 18) A double-free error exists within XSL transforms. 19) Some errors within the PDF viewer can be exploited to cause an out-of-bounds write. SOLUTION: Upgrade to version 22.0.1229.79. PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1, 2) Sergey Glazunov 3) Chamal de Silva 4, 5, 6) Atte Kettunen, OUSPG 7, 8) miaubiz 9) pawlkt 10, 14) Inferno, Google Chrome Security Team 11, 16, 19) Mateusz Jurczyk, Google Security Team and Gynvael Coldwind, Google Security Team 12) Fermin Serna, Google Security Team 13, 17, 18) Cris Neckar, Google Chrome Security Team 15) Chromium development community ORIGINAL ADVISORY: Google: http://googlechromereleases.blogspot.dk/2012/09/stable-channel-update_25.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201210-07 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Chromium: Multiple vulnerabilities Date: October 21, 2012 Bugs: #433551, #436234, #437664, #437984 ID: 201210-07 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been reported in Chromium, some of which may allow execution of arbitrary code. Background ========== Chromium is an open source web browser project. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 www-client/chromium < 22.0.1229.94 >= 22.0.1229.94 Description =========== Multiple vulnerabilities have been discovered in Chromium. Please review the CVE identifiers and release notes referenced below for details. Impact ====== A remote attacker could entice a user to open a specially crafted web site using Chromium, possibly resulting in the execution of arbitrary code with the privileges of the process, arbitrary file write, a Denial of Service condition, Cross-Site Scripting in SSL interstitial and various Universal Cross-Site Scripting attacks. Workaround ========== There is no known workaround at this time. Resolution ========== All Chromium users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=www-client/chromium-22.0.1229.94" References ========== [ 1 ] CVE-2012-2859 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2859 [ 2 ] CVE-2012-2860 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2860 [ 3 ] CVE-2012-2865 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2865 [ 4 ] CVE-2012-2866 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2866 [ 5 ] CVE-2012-2867 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2867 [ 6 ] CVE-2012-2868 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2868 [ 7 ] CVE-2012-2869 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2869 [ 8 ] CVE-2012-2872 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2872 [ 9 ] CVE-2012-2874 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2874 [ 10 ] CVE-2012-2876 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2876 [ 11 ] CVE-2012-2877 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2877 [ 12 ] CVE-2012-2878 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2878 [ 13 ] CVE-2012-2879 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2879 [ 14 ] CVE-2012-2880 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2880 [ 15 ] CVE-2012-2881 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2881 [ 16 ] CVE-2012-2882 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2882 [ 17 ] CVE-2012-2883 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2883 [ 18 ] CVE-2012-2884 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2884 [ 19 ] CVE-2012-2885 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2885 [ 20 ] CVE-2012-2886 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2886 [ 21 ] CVE-2012-2887 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2887 [ 22 ] CVE-2012-2888 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2888 [ 23 ] CVE-2012-2889 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2889 [ 24 ] CVE-2012-2891 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2891 [ 25 ] CVE-2012-2892 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2892 [ 26 ] CVE-2012-2894 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2894 [ 27 ] CVE-2012-2896 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2896 [ 28 ] CVE-2012-2900 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2900 [ 29 ] CVE-2012-5108 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5108 [ 30 ] CVE-2012-5110 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5110 [ 31 ] CVE-2012-5111 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5111 [ 32 ] CVE-2012-5112 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5112 [ 33 ] CVE-2012-5376 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5376 [ 34 ] Release Notes 21.0.1180.89 http://googlechromereleases.blogspot.com/2012/08/stable-channel-update_30= .html [ 35 ] Release Notes 22.0.1229.79 http://googlechromereleases.blogspot.com/2012/09/stable-channel-update_25= .html [ 36 ] Release Notes 22.0.1229.92 http://googlechromereleases.blogspot.com/2012/10/stable-channel-update.ht= ml [ 37 ] Release Notes 22.0.1229.94 http://googlechromereleases.blogspot.com/2012/10/stable-channel-update_61= 05.html Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201210-07.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2012 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 2.16

sources: NVD: CVE-2012-2896 // JVNDB: JVNDB-2012-004635 // BID: 55676 // VULHUB: VHN-56177 // PACKETSTORM: 116921 // PACKETSTORM: 117570

AFFECTED PRODUCTS

vendor:googlemodel:chromescope:eqversion:22.0.1229.50

Trust: 1.6

vendor:googlemodel:chromescope:eqversion:22.0.1229.3

Trust: 1.6

vendor:googlemodel:chromescope:eqversion:22.0.1229.51

Trust: 1.6

vendor:googlemodel:chromescope:eqversion:22.0.1229.6

Trust: 1.6

vendor:googlemodel:chromescope:eqversion:22.0.1229.52

Trust: 1.6

vendor:googlemodel:chromescope:eqversion:22.0.1229.7

Trust: 1.6

vendor:googlemodel:chromescope:eqversion:22.0.1229.8

Trust: 1.6

vendor:googlemodel:chromescope:eqversion:22.0.1229.4

Trust: 1.6

vendor:googlemodel:chromescope:eqversion:22.0.1229.9

Trust: 1.6

vendor:googlemodel:chromescope:eqversion:22.0.1229.2

Trust: 1.6

vendor:googlemodel:chromescope:eqversion:22.0.1229.0

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.58

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.14

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.48

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.53

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.21

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.49

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.29

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.28

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.32

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.57

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.11

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.18

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.54

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.65

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.12

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.1

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.26

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.31

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.22

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.33

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.64

Trust: 1.0

vendor:googlemodel:chromescope:lteversion:22.0.1229.78

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.76

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.55

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.56

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.20

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.16

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.36

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.59

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.67

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.60

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.25

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.17

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.10

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.24

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.62

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.23

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.39

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.63

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.35

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.37

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.27

Trust: 1.0

vendor:googlemodel:chromescope:ltversion:22.0.1229.79

Trust: 0.8

vendor:googlemodel:chromescope:eqversion:17.0.963.83

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:11.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.57

Trust: 0.3

vendor:avayamodel:aura session manager sp2scope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.100

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.3.2

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.168

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:voice portal sp1scope:eqversion:5.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.3.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.43

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.1

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:3.2.2

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.75

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.60

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.3

Trust: 0.3

vendor:mandrakesoftmodel:enterprise serverscope:eqversion:5

Trust: 0.3

vendor:avayamodel:voice portal sp2scope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.2

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:19.0.1084.52

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:11.10

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.2.1

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.1.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.3.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.2.5

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.1

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:8.04

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2011

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.204

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.128

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:8.04

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.0

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.04

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.0.1

Trust: 0.3

vendor:avayamodel:communication server 1000mscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.2.8

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.1.2

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:1.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.1.1

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.2

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:11.04

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:3.2.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.127

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.2

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.65

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.04

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.3

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:8.04

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.142

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.1

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:8.04

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.1.3

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:3.2

Trust: 0.3

vendor:avayamodel:communication server 1000escope:eqversion:6.0

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:11.04

Trust: 0.3

vendor:avayamodel:aura system platform sp3scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.91275

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.96379

Trust: 0.3

vendor:avayamodel:aura system platform sp2scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.112

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.71

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.1

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.2

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.1

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:10.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.91

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.78

Trust: 0.3

vendor:avayamodel:voice portal sp1scope:eqversion:5.1

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.1.2

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.3.3

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.56

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:1.1

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.107

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874.120

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.77

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2011

Trust: 0.3

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:7.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16

Trust: 0.3

vendor:ubuntumodel:linux lts lpiascope:eqversion:8.04

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:11.04

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.0

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.96365

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:1.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:19

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:11.04

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.68

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.672.2

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.2

Trust: 0.3

vendor:avayamodel:aura system manager sp1scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874.121

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.163

Trust: 0.3

vendor:susemodel:opensusescope:eqversion:12.1

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura system manager sp1scope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.77

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0.2

Trust: 0.3

vendor:avayamodel:communication server 1000mscope:eqversion:7.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.151

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:7.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.162

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.112

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11

Trust: 0.3

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:7.0

Trust: 0.3

vendor:avayamodel:aura experience portalscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.2

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:communication server 1000escope:eqversion:7.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874102

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.1

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.1

Trust: 0.3

vendor:avayamodel:aura system manager sp2scope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.133

Trust: 0.3

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:7.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.215

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.205

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:6.0

Trust: 0.3

vendor:mandrakesoftmodel:enterprise server x86 64scope:eqversion:5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.186

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.2.1

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.3

Trust: 0.3

vendor:avayamodel:aura session manager sp2scope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:communication server 1000escope:eqversion:7.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.63

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.202

Trust: 0.3

vendor:avayamodel:communication server 1000mscope:eqversion:7.0

Trust: 0.3

sources: BID: 55676 // JVNDB: JVNDB-2012-004635 // CNNVD: CNNVD-201209-606 // NVD: CVE-2012-2896

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-2896
value: HIGH

Trust: 1.0

NVD: CVE-2012-2896
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201209-606
value: HIGH

Trust: 0.6

VULHUB: VHN-56177
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-2896
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-56177
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-56177 // JVNDB: JVNDB-2012-004635 // CNNVD: CNNVD-201209-606 // NVD: CVE-2012-2896

PROBLEMTYPE DATA

problemtype:CWE-189

Trust: 1.9

sources: VULHUB: VHN-56177 // JVNDB: JVNDB-2012-004635 // NVD: CVE-2012-2896

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201209-606

TYPE

digital error

Trust: 0.6

sources: CNNVD: CNNVD-201209-606

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-004635

PATCH

title:Stable Channel Updateurl:http://googlechromereleases.blogspot.jp/2012/09/stable-channel-update_25.html

Trust: 0.8

title:Google Chromeurl:http://www.google.co.jp/chrome/intl/ja/landing_ff_yt.html?hl=ja&hl=ja

Trust: 0.8

title:openSUSE-SU-2012:1376url:http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00012.html

Trust: 0.8

sources: JVNDB: JVNDB-2012-004635

EXTERNAL IDS

db:NVDid:CVE-2012-2896

Trust: 2.9

db:JVNDBid:JVNDB-2012-004635

Trust: 0.8

db:CNNVDid:CNNVD-201209-606

Trust: 0.7

db:SECUNIAid:50759

Trust: 0.7

db:BIDid:55676

Trust: 0.3

db:VULHUBid:VHN-56177

Trust: 0.1

db:PACKETSTORMid:116921

Trust: 0.1

db:PACKETSTORMid:117570

Trust: 0.1

sources: VULHUB: VHN-56177 // BID: 55676 // JVNDB: JVNDB-2012-004635 // PACKETSTORM: 116921 // PACKETSTORM: 117570 // CNNVD: CNNVD-201209-606 // NVD: CVE-2012-2896

REFERENCES

url:http://googlechromereleases.blogspot.com/2012/09/stable-channel-update_25.html

Trust: 1.7

url:https://code.google.com/p/chromium/issues/detail?id=145544

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00012.html

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/78831

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2896

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-2896

Trust: 0.8

url:http://secunia.com/advisories/50759

Trust: 0.6

url:http://www.google.com/chrome

Trust: 0.3

url:http://secunia.com/advisories/50759/

Trust: 0.1

url:http://secunia.com/advisories/50759/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://googlechromereleases.blogspot.dk/2012/09/stable-channel-update_25.html

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=50759

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/blog/325/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2878

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2884

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2879

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2865

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2876

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2878

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2879

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2867

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2888

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2881

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2889

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2884

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2894

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2881

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2889

Trust: 0.1

url:http://googlechromereleases.blogspot.com/2012/10/stable-channel-update.ht=

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201210-07.xml

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2880

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2868

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2887

Trust: 0.1

url:http://googlechromereleases.blogspot.com/2012/08/stable-channel-update_30=

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2860

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2880

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2872

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2883

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2882

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2886

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2866

Trust: 0.1

url:http://googlechromereleases.blogspot.com/2012/09/stable-channel-update_25=

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2869

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2887

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2865

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2866

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2868

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5111

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2891

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2876

Trust: 0.1

url:http://googlechromereleases.blogspot.com/2012/10/stable-channel-update_61=

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2900

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2885

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2900

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2867

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2892

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2885

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2896

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2886

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2896

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2891

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5108

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2892

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2888

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2877

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2874

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2860

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2883

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2877

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5110

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2874

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2894

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2872

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2869

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2859

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2859

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2882

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5112

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5376

Trust: 0.1

sources: VULHUB: VHN-56177 // BID: 55676 // JVNDB: JVNDB-2012-004635 // PACKETSTORM: 116921 // PACKETSTORM: 117570 // CNNVD: CNNVD-201209-606 // NVD: CVE-2012-2896

CREDITS

Sergey Glazunov, Chamal de Silva, Atte Kettunen of OUSPG, miaubiz, Slawomir Blazek, Nir Moshe, pawlkt, Google Chrome Security Team (Inferno), Mateusz Jurczyk of Google Security Team, Gynvael Coldwind of Google Security Team, Fermin Serna of Google Security

Trust: 0.3

sources: BID: 55676

SOURCES

db:VULHUBid:VHN-56177
db:BIDid:55676
db:JVNDBid:JVNDB-2012-004635
db:PACKETSTORMid:116921
db:PACKETSTORMid:117570
db:CNNVDid:CNNVD-201209-606
db:NVDid:CVE-2012-2896

LAST UPDATE DATE

2024-11-23T19:55:27.814000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-56177date:2017-08-29T00:00:00
db:BIDid:55676date:2015-03-19T09:22:00
db:JVNDBid:JVNDB-2012-004635date:2012-12-26T00:00:00
db:CNNVDid:CNNVD-201209-606date:2012-09-27T00:00:00
db:NVDid:CVE-2012-2896date:2024-11-21T01:39:51.400

SOURCES RELEASE DATE

db:VULHUBid:VHN-56177date:2012-09-26T00:00:00
db:BIDid:55676date:2012-09-25T00:00:00
db:JVNDBid:JVNDB-2012-004635date:2012-09-28T00:00:00
db:PACKETSTORMid:116921date:2012-09-26T11:13:37
db:PACKETSTORMid:117570date:2012-10-22T01:32:56
db:CNNVDid:CNNVD-201209-606date:2012-09-27T00:00:00
db:NVDid:CVE-2012-2896date:2012-09-26T10:56:05.450