ID

VAR-201209-0323


CVE

CVE-2012-2889


TITLE

Used in multiple products WebKit Vulnerable to cross-site scripting

Trust: 0.8

sources: JVNDB: JVNDB-2012-004628

DESCRIPTION

Cross-site scripting (XSS) vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to inject arbitrary web script or HTML via vectors involving frames, aka "Universal XSS (UXSS).". Google Chrome Contains a cross-site scripting vulnerability. Attackers can exploit these issues to execute arbitrary code in the context of the browser, cause denial-of-service conditions, execute arbitrary script code in the browser of an unsuspecting user, or steal cookie-based authentication credentials; other attacks are also possible. Versions prior to Chrome 22.0.1229.79 are vulnerable. NOTE: The CVE-2012-2897 issue has been moved to BID 56457 (Microsoft Windows Kernel 'Win32k.sys' TrueType Font Parsing Remote Code Execution Vulnerability) to better document it. Google Chrome is a web browser developed by Google (Google). CVE-ID CVE-2013-0962 : Mario Heiderich of Cure53 For OS X Lion systems Safari 6.0.3 is available via the Apple Software Update application. For OS X Mountain Lion systems Safari 6.0.3 is included with OS X v10.8.3. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2013-01-28-1 iOS 6.1 Software Update iOS 6.1 Software Update is now available and addresses the following: Identity Services Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: Authentication relying on certificate-based Apple ID authentication may be bypassed Description: An error handling issue existed in Identity Services. If the user's AppleID certificate failed to validate, the user's AppleID was assumed to be the empty string. If multiple systems belonging to different users enter this state, applications relying on this identity determination may erroneously extend trust. This issue was addressed by ensuring that NULL is returned instead of an empty string. CVE-ID CVE-2013-0963 International Components for Unicode Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: Visiting a maliciously crafted website may lead to a cross- site scripting attack Description: A canonicalization issue existed in the handling of the EUC-JP encoding, which could lead to a cross-site scripting attack on EUC-JP encoded websites. This issue was addressed by updating the EUC-JP mapping table. CVE-ID CVE-2011-3058 : Masato Kinugawa Kernel Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: A user-mode process may be able to access the first page of kernel memory Description: The iOS kernel has checks to validate that the user- mode pointer and length passed to the copyin and copyout functions would not result in a user-mode process being able to directly access kernel memory. The checks were not being used if the length was smaller than one page. This issue was addressed through additional validation of the arguments to copyin and copyout. CVE-ID CVE-2013-0964 : Mark Dowd of Azimuth Security Security Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: An attacker with a privileged network position may intercept user credentials or other sensitive information Description: Several intermediate CA certificates were mistakenly issued by TURKTRUST. This may allow a man-in-the-middle attacker to redirect connections and intercept user credentials or other sensitive information. This issue was addressed by not allowing the incorrect SSL certificates. StoreKit Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: JavaScript may be enabled in Mobile Safari without user interaction Description: If a user disabled JavaScript in Safari Preferences, visiting a site which displayed a Smart App Banner would re-enable JavaScript without warning the user. This issue was addressed by not enabling JavaScript when visiting a site with a Smart App Banner. CVE-ID CVE-2013-0974 : Andrew Plotkin of Zarfhome Software Consulting, Ben Madison of BitCloud, Marek Durcek WebKit Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling. CVE-ID CVE-2012-2824 : miaubiz CVE-2012-2857 : Arthur Gerkis CVE-2012-3606 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3607 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3621 : Skylined of the Google Chrome Security Team CVE-2012-3632 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3687 : kuzzcc CVE-2012-3701 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2013-0948 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2013-0949 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2013-0950 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2013-0951 : Apple CVE-2013-0952 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2013-0953 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2013-0954 : Dominic Cooney of Google and Martin Barbella of the Google Chrome Security Team CVE-2013-0955 : Apple CVE-2013-0956 : Apple Product Security CVE-2013-0958 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2013-0959 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2013-0968 : Aaron Nelson WebKit Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: Copying and pasting content on a malicious website may lead to a cross-site scripting attack Description: A cross-site scripting issue existed in the handling of content pasted from a different origin. This issue was addressed through additional validation of pasted content. CVE-ID CVE-2013-0962 : Mario Heiderich of Cure53 WebKit Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: Visiting a maliciously crafted website may lead to a cross- site scripting attack Description: A cross-site scripting issue existed in the handling of frame elements. This issue was addressed through improved origin tracking. CVE-ID CVE-2012-2889 : Sergey Glazunov WiFi Available for: iPhone 3GS, iPhone 4, iPod touch (4th generation), iPad 2 Impact: A remote attacker on the same WiFi network may be able to temporarily disable WiFi Description: An out of bounds read issue exists in Broadcom's BCM4325 and BCM4329 firmware's handling of 802.11i information elements. This issue was addressed through additional validation of 802.11i information elements. CVE-ID CVE-2012-2619 : Andres Blanco and Matias Eissler of Core Security Installation note: This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from www.apple.com/itunes/ iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device. The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device. To check that the iPhone, iPod touch, or iPad has been updated: * Navigate to Settings * Select General * Select About. The version after applying this update will be "6.1". Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.17 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJRBffvAAoJEPefwLHPlZEwzYgP/0qhsTft9TUGuphoY9tth5WB D0+8pAKs+1HU+nMOaEKPbK+zdMxblhRNPQyhMuTAQaY5Z/iGn1EXVCTlQBO8esRW epxNZuhFoaW4wzK9kvw5d/HZ9tfq059ozlFOp1TI2D6J5RwNgxDfigt2PUKCTV4X u/BONQHIfINYMofgf5897LHYYFSU2+NJj5ouM5dY4Y/kfJkwAnG5AWCAGlEt3QOo MZdaVv3/itPj4te838FYCVAepel3xBWX0Hhuu87+waHslRrIfQl+EvNk3YZXxWiF O5Hw9Ng/H8n0sbeA39w0U8tw+q/wPhVexdULgRjBH65+6g7Cu5u+rMuYuRjl8fO/ glLhKZNSrQDa5ZNOraOrF62AFVByHaSxv4cZwo262/6uH93FIBtklMt947GMVQLC 1FT0CIGNJb1/0156bvsABfRScBtK9ZdIUjXhOHMinhQJX3qiBqyKc4/juYPmC9VC KXk2/K8b0sGWQRc5RuQsSpzkZF9WcrwmgGOBIghp2DLmbAAj0uh2Ttf1GdrOaajR XpZ2TTJ5qE+IHNU0/etroTYnzjKVjQ0pODrPZj7ALLXULTraXJRJy7fqraUzsHbi AZiRca+3x/S9nqV0NpTNPZgTwxenox10t0w5vhcBK+SPGga1oVRbtOjGtVIkgoG4 KI3sdgb6PtpZWuIJ6iZA =J2jv -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/ ---------------------------------------------------------------------- TITLE: Google Chrome Multiple Vulnerabilities SECUNIA ADVISORY ID: SA50759 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/50759/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=50759 RELEASE DATE: 2012-09-26 DISCUSS ADVISORY: http://secunia.com/advisories/50759/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/50759/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=50759 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system. 1) Certain unspecified input related to frame handling is not properly sanitised before being returned to the user. 2) Certain unspecified input within v8 bindings is not properly sanitised before being returned to the user. 3) An error exists within plugin handling and can be exploited to cause DOM tree corruption. 4) An error due to SSE2 optimizations can be exploited to cause a buffer overflow. 5) An error exists within Skia and can be exploited to cause an out-of-bounds write. 6) A use-after-free error exists within onclick handling. 7) A use-after-free error exists related to SVG text references. 8) An integer overflow error exists related to WebGL handling. 9) An unspecified error can be exploited to cause DOM topology corruption. 10) An error exists within Skia and can be exploited to cause an out-of-bounds write. 11) Some weaknesses exist in the PDF viewer. 12) A use-after-free error exists within the plug-in handling. 13) A race condition exists when handling plug-in paint buffers. 14) An error when handling OGG containers can be exploited to reference an invalid pointer. 15) A double-free error exists on exit. 16) A use-after-free error exists within the PDF viewer. 17) An unspecified error exists and can be exploited to bypass the pop-up block. 18) A double-free error exists within XSL transforms. 19) Some errors within the PDF viewer can be exploited to cause an out-of-bounds write. PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1, 2) Sergey Glazunov 3) Chamal de Silva 4, 5, 6) Atte Kettunen, OUSPG 7, 8) miaubiz 9) pawlkt 10, 14) Inferno, Google Chrome Security Team 11, 16, 19) Mateusz Jurczyk, Google Security Team and Gynvael Coldwind, Google Security Team 12) Fermin Serna, Google Security Team 13, 17, 18) Cris Neckar, Google Chrome Security Team 15) Chromium development community ORIGINAL ADVISORY: Google: http://googlechromereleases.blogspot.dk/2012/09/stable-channel-update_25.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201210-07 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Chromium: Multiple vulnerabilities Date: October 21, 2012 Bugs: #433551, #436234, #437664, #437984 ID: 201210-07 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been reported in Chromium, some of which may allow execution of arbitrary code. Background ========== Chromium is an open source web browser project. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 www-client/chromium < 22.0.1229.94 >= 22.0.1229.94 Description =========== Multiple vulnerabilities have been discovered in Chromium. Please review the CVE identifiers and release notes referenced below for details. Impact ====== A remote attacker could entice a user to open a specially crafted web site using Chromium, possibly resulting in the execution of arbitrary code with the privileges of the process, arbitrary file write, a Denial of Service condition, Cross-Site Scripting in SSL interstitial and various Universal Cross-Site Scripting attacks. Workaround ========== There is no known workaround at this time. Resolution ========== All Chromium users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=www-client/chromium-22.0.1229.94" References ========== [ 1 ] CVE-2012-2859 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2859 [ 2 ] CVE-2012-2860 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2860 [ 3 ] CVE-2012-2865 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2865 [ 4 ] CVE-2012-2866 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2866 [ 5 ] CVE-2012-2867 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2867 [ 6 ] CVE-2012-2868 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2868 [ 7 ] CVE-2012-2869 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2869 [ 8 ] CVE-2012-2872 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2872 [ 9 ] CVE-2012-2874 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2874 [ 10 ] CVE-2012-2876 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2876 [ 11 ] CVE-2012-2877 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2877 [ 12 ] CVE-2012-2878 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2878 [ 13 ] CVE-2012-2879 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2879 [ 14 ] CVE-2012-2880 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2880 [ 15 ] CVE-2012-2881 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2881 [ 16 ] CVE-2012-2882 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2882 [ 17 ] CVE-2012-2883 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2883 [ 18 ] CVE-2012-2884 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2884 [ 19 ] CVE-2012-2885 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2885 [ 20 ] CVE-2012-2886 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2886 [ 21 ] CVE-2012-2887 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2887 [ 22 ] CVE-2012-2888 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2888 [ 23 ] CVE-2012-2889 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2889 [ 24 ] CVE-2012-2891 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2891 [ 25 ] CVE-2012-2892 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2892 [ 26 ] CVE-2012-2894 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2894 [ 27 ] CVE-2012-2896 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2896 [ 28 ] CVE-2012-2900 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2900 [ 29 ] CVE-2012-5108 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5108 [ 30 ] CVE-2012-5110 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5110 [ 31 ] CVE-2012-5111 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5111 [ 32 ] CVE-2012-5112 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5112 [ 33 ] CVE-2012-5376 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5376 [ 34 ] Release Notes 21.0.1180.89 http://googlechromereleases.blogspot.com/2012/08/stable-channel-update_30= .html [ 35 ] Release Notes 22.0.1229.79 http://googlechromereleases.blogspot.com/2012/09/stable-channel-update_25= .html [ 36 ] Release Notes 22.0.1229.92 http://googlechromereleases.blogspot.com/2012/10/stable-channel-update.ht= ml [ 37 ] Release Notes 22.0.1229.94 http://googlechromereleases.blogspot.com/2012/10/stable-channel-update_61= 05.html Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201210-07.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2012 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 2.34

sources: NVD: CVE-2012-2889 // JVNDB: JVNDB-2012-004628 // BID: 55676 // VULHUB: VHN-56170 // PACKETSTORM: 120821 // PACKETSTORM: 119897 // PACKETSTORM: 116921 // PACKETSTORM: 117570

AFFECTED PRODUCTS

vendor:applemodel:iphone osscope:eqversion:6.0.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:6.0

Trust: 1.6

vendor:googlemodel:chromescope:eqversion:22.0.1229.0

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.58

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.14

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.6

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.48

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.52

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.53

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.21

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.3

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.49

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.29

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.50

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.51

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.28

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.32

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.57

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.11

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.18

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.54

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.4

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.65

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.2

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.12

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.1

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.26

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.31

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.22

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.33

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.64

Trust: 1.0

vendor:googlemodel:chromescope:lteversion:22.0.1229.78

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.76

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.55

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.56

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.7

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.20

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.16

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.8

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.36

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.59

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.67

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.60

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.9

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.25

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.17

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.10

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.24

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.62

Trust: 1.0

vendor:applemodel:iphone osscope:lteversion:6.0.2

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.23

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.39

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.63

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.35

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.37

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:22.0.1229.27

Trust: 1.0

vendor:googlemodel:chromescope:ltversion:22.0.1229.79

Trust: 0.8

vendor:applemodel:iosscope:ltversion:6.1 (ipad 2 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:6.1 (iphone 3gs or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:6.1 (ipod touch first 4 after generation )

Trust: 0.8

vendor:applemodel:safariscope:ltversion:6.0.3

Trust: 0.8

vendor:applemodel:iphone osscope:eqversion:6.0.2

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:17.0.963.83

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:11.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.57

Trust: 0.3

vendor:avayamodel:aura session manager sp2scope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.100

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.3.2

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.168

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:voice portal sp1scope:eqversion:5.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.3.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.43

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.1

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:3.2.2

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.75

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.60

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.3

Trust: 0.3

vendor:mandrakesoftmodel:enterprise serverscope:eqversion:5

Trust: 0.3

vendor:avayamodel:voice portal sp2scope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.2

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:19.0.1084.52

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:11.10

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.2.1

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.1.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.3.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.2.5

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.1

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:8.04

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2011

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.204

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.128

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:8.04

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.0

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.04

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.0.1

Trust: 0.3

vendor:avayamodel:communication server 1000mscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.2.8

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.1.2

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:1.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.1.1

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.2

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:11.04

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:3.2.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.127

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.2

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.65

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.04

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.3

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:8.04

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.142

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.1

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:8.04

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.1.3

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:3.2

Trust: 0.3

vendor:avayamodel:communication server 1000escope:eqversion:6.0

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:11.04

Trust: 0.3

vendor:avayamodel:aura system platform sp3scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.91275

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.96379

Trust: 0.3

vendor:avayamodel:aura system platform sp2scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.112

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.71

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.1

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.2

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.1

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:10.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.91

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.78

Trust: 0.3

vendor:avayamodel:voice portal sp1scope:eqversion:5.1

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.1.2

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.3.3

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.56

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:1.1

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.107

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874.120

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.77

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2011

Trust: 0.3

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:7.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16

Trust: 0.3

vendor:ubuntumodel:linux lts lpiascope:eqversion:8.04

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:11.04

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.0

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.96365

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:1.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:19

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:11.04

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.68

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.672.2

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.2

Trust: 0.3

vendor:avayamodel:aura system manager sp1scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874.121

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.163

Trust: 0.3

vendor:susemodel:opensusescope:eqversion:12.1

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura system manager sp1scope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.77

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0.2

Trust: 0.3

vendor:avayamodel:communication server 1000mscope:eqversion:7.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.151

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:7.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.162

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.112

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11

Trust: 0.3

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:7.0

Trust: 0.3

vendor:avayamodel:aura experience portalscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.2

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:communication server 1000escope:eqversion:7.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874102

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.1

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.1

Trust: 0.3

vendor:avayamodel:aura system manager sp2scope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.133

Trust: 0.3

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:7.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.215

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.205

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:6.0

Trust: 0.3

vendor:mandrakesoftmodel:enterprise server x86 64scope:eqversion:5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.186

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.2.1

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.3

Trust: 0.3

vendor:avayamodel:aura session manager sp2scope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:communication server 1000escope:eqversion:7.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.63

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.202

Trust: 0.3

vendor:avayamodel:communication server 1000mscope:eqversion:7.0

Trust: 0.3

sources: BID: 55676 // JVNDB: JVNDB-2012-004628 // CNNVD: CNNVD-201209-599 // NVD: CVE-2012-2889

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-2889
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-2889
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201209-599
value: MEDIUM

Trust: 0.6

VULHUB: VHN-56170
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-2889
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-56170
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-56170 // JVNDB: JVNDB-2012-004628 // CNNVD: CNNVD-201209-599 // NVD: CVE-2012-2889

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-56170 // JVNDB: JVNDB-2012-004628 // NVD: CVE-2012-2889

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201209-599

TYPE

xss

Trust: 0.8

sources: PACKETSTORM: 120821 // PACKETSTORM: 116921 // CNNVD: CNNVD-201209-599

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-004628

PATCH

title:APPLE-SA-2013-03-14-2url:http://lists.apple.com/archives/security-announce/2013/Mar/msg00003.html

Trust: 0.8

title:HT5642url:http://support.apple.com/kb/HT5642

Trust: 0.8

title:HT5671url:http://support.apple.com/kb/HT5671

Trust: 0.8

title:HT5642url:http://support.apple.com/kb/HT5642?viewlocale=ja_JP

Trust: 0.8

title:HT5671url:http://support.apple.com/kb/HT5671?viewlocale=ja_JP

Trust: 0.8

title:Stable Channel Updateurl:http://googlechromereleases.blogspot.jp/2012/09/stable-channel-update_25.html

Trust: 0.8

title:Google Chromeurl:http://www.google.co.jp/chrome/intl/ja/landing_ff_yt.html?hl=ja&hl=ja

Trust: 0.8

title:openSUSE-SU-2012:1376url:http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00012.html

Trust: 0.8

title:GoogleChrome23.0.1271.95url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=44980

Trust: 0.6

sources: JVNDB: JVNDB-2012-004628 // CNNVD: CNNVD-201209-599

EXTERNAL IDS

db:NVDid:CVE-2012-2889

Trust: 3.1

db:JVNid:JVNVU95668478

Trust: 0.8

db:JVNDBid:JVNDB-2012-004628

Trust: 0.8

db:CNNVDid:CNNVD-201209-599

Trust: 0.7

db:SECUNIAid:50759

Trust: 0.7

db:BIDid:55676

Trust: 0.3

db:VULHUBid:VHN-56170

Trust: 0.1

db:PACKETSTORMid:120821

Trust: 0.1

db:PACKETSTORMid:119897

Trust: 0.1

db:PACKETSTORMid:116921

Trust: 0.1

db:PACKETSTORMid:117570

Trust: 0.1

sources: VULHUB: VHN-56170 // BID: 55676 // JVNDB: JVNDB-2012-004628 // PACKETSTORM: 120821 // PACKETSTORM: 119897 // PACKETSTORM: 116921 // PACKETSTORM: 117570 // CNNVD: CNNVD-201209-599 // NVD: CVE-2012-2889

REFERENCES

url:http://googlechromereleases.blogspot.com/2012/09/stable-channel-update_25.html

Trust: 1.7

url:https://code.google.com/p/chromium/issues/detail?id=143439

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2013/jan/msg00000.html

Trust: 1.1

url:http://lists.apple.com/archives/security-announce/2013/mar/msg00003.html

Trust: 1.1

url:http://support.apple.com/kb/ht5642

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a15829

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00012.html

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/78823

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2889

Trust: 0.8

url:http://jvn.jp/cert/jvnvu95668478/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-2889

Trust: 0.8

url:http://secunia.com/advisories/50759

Trust: 0.6

url:http://www.google.com/chrome

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2012-2889

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2013-0956

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-0954

Trust: 0.2

url:http://support.apple.com/kb/ht1222

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-0955

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-0948

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-0959

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-0952

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-0958

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-0949

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-0962

Trust: 0.2

url:https://www.apple.com/support/security/pgp/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-2857

Trust: 0.2

url:http://gpgtools.org

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-0950

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-0951

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-2824

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-0953

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-0961

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0960

Trust: 0.1

url:https://www.apple.com/itunes/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3687

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3632

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3621

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3701

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0968

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3058

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2619

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0964

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0974

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3606

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3607

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0963

Trust: 0.1

url:http://secunia.com/advisories/50759/

Trust: 0.1

url:http://secunia.com/advisories/50759/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://googlechromereleases.blogspot.dk/2012/09/stable-channel-update_25.html

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=50759

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/blog/325/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2878

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2884

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2879

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2865

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2876

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2878

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2879

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2867

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2888

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2881

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2884

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2894

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2881

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2889

Trust: 0.1

url:http://googlechromereleases.blogspot.com/2012/10/stable-channel-update.ht=

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201210-07.xml

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2880

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2868

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2887

Trust: 0.1

url:http://googlechromereleases.blogspot.com/2012/08/stable-channel-update_30=

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2860

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2880

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2872

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2883

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2882

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2886

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2866

Trust: 0.1

url:http://googlechromereleases.blogspot.com/2012/09/stable-channel-update_25=

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2869

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2887

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2865

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2866

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2868

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5111

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2891

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2876

Trust: 0.1

url:http://googlechromereleases.blogspot.com/2012/10/stable-channel-update_61=

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2900

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2885

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2900

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2867

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2892

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2885

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2896

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2886

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2896

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2891

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5108

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2892

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2888

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2877

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2874

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2860

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2883

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2877

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5110

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2874

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2894

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2872

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2869

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2859

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2859

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2882

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5112

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5376

Trust: 0.1

sources: VULHUB: VHN-56170 // BID: 55676 // JVNDB: JVNDB-2012-004628 // PACKETSTORM: 120821 // PACKETSTORM: 119897 // PACKETSTORM: 116921 // PACKETSTORM: 117570 // CNNVD: CNNVD-201209-599 // NVD: CVE-2012-2889

CREDITS

Sergey Glazunov, Chamal de Silva, Atte Kettunen of OUSPG, miaubiz, Slawomir Blazek, Nir Moshe, pawlkt, Google Chrome Security Team (Inferno), Mateusz Jurczyk of Google Security Team, Gynvael Coldwind of Google Security Team, Fermin Serna of Google Security

Trust: 0.3

sources: BID: 55676

SOURCES

db:VULHUBid:VHN-56170
db:BIDid:55676
db:JVNDBid:JVNDB-2012-004628
db:PACKETSTORMid:120821
db:PACKETSTORMid:119897
db:PACKETSTORMid:116921
db:PACKETSTORMid:117570
db:CNNVDid:CNNVD-201209-599
db:NVDid:CVE-2012-2889

LAST UPDATE DATE

2024-11-23T20:21:09.024000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-56170date:2017-09-19T00:00:00
db:BIDid:55676date:2015-03-19T09:22:00
db:JVNDBid:JVNDB-2012-004628date:2013-03-28T00:00:00
db:CNNVDid:CNNVD-201209-599date:2012-09-27T00:00:00
db:NVDid:CVE-2012-2889date:2024-11-21T01:39:50.517

SOURCES RELEASE DATE

db:VULHUBid:VHN-56170date:2012-09-26T00:00:00
db:BIDid:55676date:2012-09-25T00:00:00
db:JVNDBid:JVNDB-2012-004628date:2012-09-28T00:00:00
db:PACKETSTORMid:120821date:2013-03-15T22:28:44
db:PACKETSTORMid:119897date:2013-01-30T02:53:29
db:PACKETSTORMid:116921date:2012-09-26T11:13:37
db:PACKETSTORMid:117570date:2012-10-22T01:32:56
db:CNNVDid:CNNVD-201209-599date:2012-09-27T00:00:00
db:NVDid:CVE-2012-2889date:2012-09-26T10:56:04.903