ID CVE-2011-3096
Summary Use-after-free vulnerability in Google Chrome before 19.0.1084.46 on Linux allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging an error in the GTK implementation of the omnibox.
References
Vulnerable Configurations
  • Google Chrome 19.0.1084.45
    cpe:2.3:a:google:chrome:19.0.1084.45
  • Linux Kernel
    cpe:2.3:o:linux:linux_kernel
CVSS
Base: 7.5 (as of 16-05-2012 - 20:23)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201205-03.NASL
    description The remote host is affected by the vulnerability described in GLSA-201205-03 (Chromium, V8: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Chromium and V8. Please review the CVE identifiers and release notes referenced below for details. Impact : A context-dependent attacker could entice a user to open a specially crafted website or JavaScript program using Chromium or V8, possibly resulting in the execution of arbitrary code with the privileges of the process, or a Denial of Service condition. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-11
    plugin id 59627
    published 2012-06-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=59627
    title GLSA-201205-03 : Chromium, V8: Multiple vulnerabilities
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2012-295.NASL
    description Chromium update to 21.0.1145 - Fixed several issues around audio not playing with videos - Crash Fixes - Improvements to trackpad on Cr-48 - Security Fixes (bnc#762481) - CVE-2011-3083: Browser crash with video + FTP - CVE-2011-3084: Load links from internal pages in their own process. - CVE-2011-3085: UI corruption with long autofilled values - CVE-2011-3086: Use-after-free with style element. - CVE-2011-3087: Incorrect window navigation - CVE-2011-3088: Out-of-bounds read in hairline drawing - CVE-2011-3089: Use-after-free in table handling. - CVE-2011-3090: Race condition with workers. - CVE-2011-3091: Use-after-free with indexed DB - CVE-2011-3092: Invalid write in v8 regex - CVE-2011-3093: Out-of-bounds read in glyph handling - CVE-2011-3094: Out-of-bounds read in Tibetan handling - CVE-2011-3095: Out-of-bounds write in OGG container. - CVE-2011-3096: Use-after-free in GTK omnibox handling. - CVE-2011-3098: Bad search path for Windows Media Player plug-in - CVE-2011-3100: Out-of-bounds read drawing dash paths. - CVE-2011-3101: Work around Linux Nvidia driver bug - CVE-2011-3102: Off-by-one out-of-bounds write in libxml.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 74634
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74634
    title openSUSE Security Update : chromium / v8 (openSUSE-SU-2012:0656-1)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_1449AF379EBA11E1B9C100262D5ED8EE.NASL
    description Google Chrome Releases reports : [112983] Low CVE-2011-3083: Browser crash with video + FTP. Credit to Aki Helin of OUSPG. [113496] Low CVE-2011-3084: Load links from internal pages in their own process. Credit to Brett Wilson of the Chromium development community. [118374] Medium CVE-2011-3085: UI corruption with long autofilled values. Credit to 'psaldorn'. [118642] High CVE-2011-3086: Use-after-free with style element. Credit to Arthur Gerkis. [118664] Low CVE-2011-3087: Incorrect window navigation. Credit to Charlie Reis of the Chromium development community. [120648] Medium CVE-2011-3088: Out-of-bounds read in hairline drawing. Credit to Aki Helin of OUSPG. [120711] High CVE-2011-3089: Use-after-free in table handling. Credit to miaubiz. [121223] Medium CVE-2011-3090: Race condition with workers. Credit to Arthur Gerkis. [121734] High CVE-2011-3091: Use-after-free with indexed DB. Credit to Google Chrome Security Team (Inferno). [122337] High CVE-2011-3092: Invalid write in v8 regex. Credit to Christian Holler. [122585] Medium CVE-2011-3093: Out-of-bounds read in glyph handling. Credit to miaubiz. [122586] Medium CVE-2011-3094: Out-of-bounds read in Tibetan handling. Credit to miaubiz. [123481] High CVE-2011-3095: Out-of-bounds write in OGG container. Credit to Hannu Heikkinen. [Linux only] [123530] Low CVE-2011-3096: Use-after-free in GTK omnibox handling. Credit to Arthur Gerkis. [123733] [124182] High CVE-2011-3097: Out-of-bounds write in sampled functions with PDF. Credit to Kostya Serebryany of Google and Evgeniy Stepanov of Google. [124479] High CVE-2011-3099: Use-after-free in PDF with corrupt font encoding name. Credit to Mateusz Jurczyk of Google Security Team and Gynvael Coldwind of Google Security Team. [124652] Medium CVE-2011-3100: Out-of-bounds read drawing dash paths. Credit to Google Chrome Security Team (Inferno).
    last seen 2019-02-21
    modified 2013-06-21
    plugin id 59103
    published 2012-05-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=59103
    title FreeBSD : chromium -- multiple vulnerabilities (1449af37-9eba-11e1-b9c1-00262d5ed8ee)
refmap via4
bid 53540
confirm
gentoo GLSA-201205-03
sectrack 1027067
suse openSUSE-SU-2012:0656
xf chrome-gtk-code-exec(75601)
Last major update 29-10-2012 - 23:55
Published 15-05-2012 - 20:55
Last modified 28-12-2017 - 21:29
Back to Top