Multiple integer overflows in Google Chrome before 4.1.249.1036 allow remote attackers to have an unspecified impact via vectors involving WebKit JavaScript objects.
References
Link | Resource |
---|---|
http://code.google.com/p/chromium/issues/detail?id=35724 | Exploit Permissions Required |
http://googlechromereleases.blogspot.com/2010/03/stable-channel-update.html | Vendor Advisory |
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html | Broken Link |
http://secunia.com/advisories/43068 | Broken Link |
http://www.vupen.com/english/advisories/2011/0212 | Broken Link |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14023 | Broken Link |
http://code.google.com/p/chromium/issues/detail?id=35724 | Exploit Permissions Required |
http://googlechromereleases.blogspot.com/2010/03/stable-channel-update.html | Vendor Advisory |
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html | Broken Link |
http://secunia.com/advisories/43068 | Broken Link |
http://www.vupen.com/english/advisories/2011/0212 | Broken Link |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14023 | Broken Link |
Configurations
History
25 Jun 2025, 16:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:google:chrome:4.1.249.1001:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.1007:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.1024:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.1020:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:0.2.149.29:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:2.0.172.38:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.1019:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:2.0.172.33:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.0.249.78:beta:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.1027:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:2.0.169.0:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:2.0.170.0:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:3.0.182.2:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:3.0.195.24:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.1011:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.1018:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:0.3.154.3:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:2.0.172.37:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.1015:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:1.0.154.42:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:2.0.172.31:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.1033:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:0.4.154.33:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.0.249.78:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:1.0.154.43:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:0.3.154.0:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:2.0.157.2:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.1012:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:0.4.154.22:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:1.0.154.52:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:2.0.172.28:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:2.0.158.0:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.1029:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.1032:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:1.0.154.46:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.1031:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.1010:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:1.0.154.39:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:2.0.159.0:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.1022:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.1026:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:2.0.172.27:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.1009:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:3.0.195.32:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:2.0.169.1:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:2.0.172:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:2.0.172.2:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:3.0.195.21:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:1.0.154.53:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.1017:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:0.2.149.27:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.0.249.89:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.1004:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:1.0.154.48:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.0.244.0:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.1021:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:0.2.152.1:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.1028:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:1.0.154.36:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.1016:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:0.4.154.31:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.1023:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.1006:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.1008:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.1014:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.1030:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:3.0.190.2:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:1.0.154.59:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.1013:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:2.0.172.30:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:0.2.149.30:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:3.0.195.33:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.1034:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:3.0.193.2:beta:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.0:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1.249.1025:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:2.0.156.1:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:2.0.157.0:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:0.4.154.18:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:2.0.172.8:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:1.0.154.65:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:4.1:beta:*:*:*:*:*:* cpe:2.3:a:google:chrome:0.2.153.1:*:*:*:*:*:*:* |
|
CWE | CWE-190 | |
References | () http://code.google.com/p/chromium/issues/detail?id=35724 - Exploit, Permissions Required | |
References | () http://googlechromereleases.blogspot.com/2010/03/stable-channel-update.html - Vendor Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - Broken Link | |
References | () http://secunia.com/advisories/43068 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2011/0212 - Broken Link | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14023 - Broken Link |
21 Nov 2024, 01:13
Type | Values Removed | Values Added |
---|---|---|
References | () http://code.google.com/p/chromium/issues/detail?id=35724 - Exploit | |
References | () http://googlechromereleases.blogspot.com/2010/03/stable-channel-update.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - | |
References | () http://secunia.com/advisories/43068 - | |
References | () http://www.vupen.com/english/advisories/2011/0212 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14023 - |
Information
Published : 2010-04-01 22:30
Updated : 2025-06-25 16:55
NVD link : CVE-2010-1233
Mitre link : CVE-2010-1233
CVE.ORG link : CVE-2010-1233
JSON object : View
Products Affected
- chrome
CWE
CWE-190
Integer Overflow or Wraparound