Google Chrome 17.0.963.66 and earlier allows remote attackers to bypass the sandbox protection mechanism by leveraging access to a sandboxed process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012. NOTE: the primary affected product may be clarified later; it was not identified by the researcher, who reportedly stated "it really doesn't matter if it's third-party code."
References
Configurations
History
21 Nov 2024, 01:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://pwn2own.zerodayinitiative.com/status.html - Not Applicable | |
References | () http://twitter.com/vupen/statuses/177576000761237505 - Broken Link | |
References | () http://www.forbes.com/sites/andygreenberg/2012/03/21/meet-the-hackers-who-sell-spies-the-tools-to-crack-your-pc-and-get-paid-six-figure-fees/ - Press/Media Coverage | |
References | () http://www.zdnet.com/blog/security/pwn2own-2012-google-chrome-browser-sandbox-first-to-fall/10588 - Press/Media Coverage | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/74324 - Third Party Advisory, VDB Entry | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14940 - Third Party Advisory |
Information
Published : 2012-03-22 16:55
Updated : 2024-11-21 01:37
NVD link : CVE-2012-1846
Mitre link : CVE-2012-1846
CVE.ORG link : CVE-2012-1846
JSON object : View
Products Affected
- chrome
CWE
CWE-668
Exposure of Resource to Wrong Sphere