Vulnerability Name: | CVE-2014-1710 (CCN-91804) | ||||||||
Assigned: | 2014-03-14 | ||||||||
Published: | 2014-03-14 | ||||||||
Updated: | 2014-03-26 | ||||||||
Summary: | The AsyncPixelTransfersCompletedQuery::End function in gpu/command_buffer/service/query_manager.cc in Google Chrome, as used in Google Chrome OS before 33.0.1750.152, does not check whether a certain position is within the bounds of a shared-memory segment, which allows remote attackers to cause a denial of service (GPU command-buffer memory corruption) or possibly have unspecified other impact via unknown vectors. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-119 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2014-1710 Source: CCN Type: Google Chrome Releases Web site Stable Channel Update Source: CONFIRM Type: Vendor Advisory http://googlechromereleases.blogspot.com/2014/03/stable-channel-update-for-chrome-os_14.html Source: CCN Type: SA57440 Google Chrome for Android Multiple Vulnerabilities Source: CCN Type: BID-66253 Google Chrome OS Prior to 33.0.1750.152 Multiple Security Vulnerabilities Source: CCN Type: BID-66263 Google Chrome for Android CVE-2014-1710 Memory Corruption Vulnerability Source: CONFIRM Type: UNKNOWN https://code.google.com/p/chromium/issues/detail?id=351852 Source: XF Type: UNKNOWN google-chrome-cve20141710-code-exec(91804) Source: CONFIRM Type: UNKNOWN https://src.chromium.org/viewvc/chrome?revision=256723&view=revision Source: CONFIRM Type: UNKNOWN https://src.chromium.org/viewvc/chrome?revision=256918&view=revision | ||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
BACK |