CNVD-2017-35602

Vulnerability from cnvd - Published: 2017-11-30
VLAI Severity ?
Title
Google Chrome全屏警告漏洞
Description
Google Chrome for Linux、Windows、Mac和Android是美国谷歌(Google)公司开发的一款基于Linux、Windows、Mac和Android平台的Web浏览器。Blink是美国谷歌(Google)公司和挪威欧朋(Opera Software)公司共同开发的一套浏览器排版引擎(渲染引擎)。 基于Mac、Windows、Linux和Android平台的Google Chrome中的Blink的modal dialog处理过程存在安全漏洞。远程攻击者可借助特制的HTML页面使全屏警告无法显示。
Severity
Patch Name
Google Chrome全屏警告漏洞的补丁
Patch Description
Google Chrome for Linux、Windows、Mac和Android是美国谷歌(Google)公司开发的一款基于Linux、Windows、Mac和Android平台的Web浏览器。Blink是美国谷歌(Google)公司和挪威欧朋(Opera Software)公司共同开发的一套浏览器排版引擎(渲染引擎)。 基于Mac、Windows、Linux和Android平台的Google Chrome中的Blink的modal dialog处理过程存在安全漏洞。远程攻击者可借助特制的HTML页面使全屏警告无法显示。 目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

厂商已发布漏洞修复程序,请及时关注更新: https://security.gentoo.org/glsa/201709-15

Reference
https://nvd.nist.gov/vuln/detail/CVE-2017-5093 http://www.securityfocus.com/bid/99950
Impacted products
Name
['Google Chrome(for Mac) <60.0.3112.78', 'Google Chrome(for Android) <60.0.3112.78', 'Google Chrome(for Windows) <60.0.3112.78', 'Google Chrome(for Linux) <60.0.3112.78']
Show details on source website

{
  "bids": {
    "bid": {
      "bidNumber": "99950"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2017-5093"
    }
  },
  "description": "Google Chrome for Linux\u3001Windows\u3001Mac\u548cAndroid\u662f\u7f8e\u56fd\u8c37\u6b4c\uff08Google\uff09\u516c\u53f8\u5f00\u53d1\u7684\u4e00\u6b3e\u57fa\u4e8eLinux\u3001Windows\u3001Mac\u548cAndroid\u5e73\u53f0\u7684Web\u6d4f\u89c8\u5668\u3002Blink\u662f\u7f8e\u56fd\u8c37\u6b4c\uff08Google\uff09\u516c\u53f8\u548c\u632a\u5a01\u6b27\u670b\uff08Opera Software\uff09\u516c\u53f8\u5171\u540c\u5f00\u53d1\u7684\u4e00\u5957\u6d4f\u89c8\u5668\u6392\u7248\u5f15\u64ce\uff08\u6e32\u67d3\u5f15\u64ce\uff09\u3002\r\n\r\n\u57fa\u4e8eMac\u3001Windows\u3001Linux\u548cAndroid\u5e73\u53f0\u7684Google Chrome\u4e2d\u7684Blink\u7684modal dialog\u5904\u7406\u8fc7\u7a0b\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7279\u5236\u7684HTML\u9875\u9762\u4f7f\u5168\u5c4f\u8b66\u544a\u65e0\u6cd5\u663e\u793a\u3002",
  "discovererName": "Ned Williamson, Yu Zhou, Yuan Deng of Ant-financial Light-Year Security Lab, Luan Herrera, Anonymous, Takeshi Terada, Jihoon Kim, Khalil Zhani, Chaitin Security Research Lab, Rayyan Bijoora, Jack Zac, David Kohlbrenner of UC San Diego, Guang Gong of Alpha",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://security.gentoo.org/glsa/201709-15",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2017-35602",
  "openTime": "2017-11-30",
  "patchDescription": "Google Chrome for Linux\u3001Windows\u3001Mac\u548cAndroid\u662f\u7f8e\u56fd\u8c37\u6b4c\uff08Google\uff09\u516c\u53f8\u5f00\u53d1\u7684\u4e00\u6b3e\u57fa\u4e8eLinux\u3001Windows\u3001Mac\u548cAndroid\u5e73\u53f0\u7684Web\u6d4f\u89c8\u5668\u3002Blink\u662f\u7f8e\u56fd\u8c37\u6b4c\uff08Google\uff09\u516c\u53f8\u548c\u632a\u5a01\u6b27\u670b\uff08Opera Software\uff09\u516c\u53f8\u5171\u540c\u5f00\u53d1\u7684\u4e00\u5957\u6d4f\u89c8\u5668\u6392\u7248\u5f15\u64ce\uff08\u6e32\u67d3\u5f15\u64ce\uff09\u3002\r\n\r\n\u57fa\u4e8eMac\u3001Windows\u3001Linux\u548cAndroid\u5e73\u53f0\u7684Google Chrome\u4e2d\u7684Blink\u7684modal dialog\u5904\u7406\u8fc7\u7a0b\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7279\u5236\u7684HTML\u9875\u9762\u4f7f\u5168\u5c4f\u8b66\u544a\u65e0\u6cd5\u663e\u793a\u3002\r\n\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Google Chrome\u5168\u5c4f\u8b66\u544a\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Google Chrome(for Mac) \u003c60.0.3112.78",
      "Google Chrome(for Android)  \u003c60.0.3112.78",
      "Google Chrome(for Windows) \u003c60.0.3112.78",
      "Google Chrome(for Linux) \u003c60.0.3112.78"
    ]
  },
  "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2017-5093\r\nhttp://www.securityfocus.com/bid/99950",
  "serverity": "\u4e2d",
  "submitTime": "2017-10-30",
  "title": "Google Chrome\u5168\u5c4f\u8b66\u544a\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…