CERTA-2012-AVI-385
Vulnerability from certfr_avis - Published: - Updated:
Trois vulnérabilités, considérées comme importantes par l'éditeur, ont été corrigées dans Google Chrome. Deux (CVE-2012-2842, CVE-2012-2843) concernent une mauvaise gestion de la mémoire dynamique (use-after-free). La dernière rend possible un accès frauduleux à un objet au moyen d'un script JavaScript inclus dans un fichier PDF.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Google Chrome versions antérieures à 20.0.1132.57.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eGoogle Chrome versions ant\u00e9rieures \u00e0 20.0.1132.57.\u003c/p\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-2843",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2843"
},
{
"name": "CVE-2012-2844",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2844"
},
{
"name": "CVE-2012-2842",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2842"
}
],
"links": [
{
"title": "Bulletin de mise \u00e0 jour Google Chrome du 11 Juillet 2012:",
"url": "http://googlechromereleases.blogspot.fr"
}
],
"reference": "CERTA-2012-AVI-385",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-07-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "Trois vuln\u00e9rabilit\u00e9s, consid\u00e9r\u00e9es comme importantes par l\u0027\u00e9diteur, ont\n\u00e9t\u00e9 corrig\u00e9es dans \u003cspan class=\"textit\"\u003eGoogle Chrome\u003c/span\u003e. Deux\n(CVE-2012-2842, CVE-2012-2843) concernent une mauvaise gestion de la\nm\u00e9moire dynamique (\u003cspan class=\"textit\"\u003euse-after-free\u003c/span\u003e). La\nderni\u00e8re rend possible un acc\u00e8s frauduleux \u00e0 un objet au moyen d\u0027un\nscript \u003cspan class=\"textit\"\u003eJavaScript\u003c/span\u003e inclus dans un fichier\n\u003cspan class=\"textit\"\u003ePDF\u003c/span\u003e.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans Google Chrome",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de mise \u00e0 jour Google Chrome du 11 juillet 2012",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…