Vulnerability Name: | CVE-2014-3197 (CCN-96966) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2014-10-07 | ||||||||||||||||||||||||||||||||||||
Published: | 2014-10-07 | ||||||||||||||||||||||||||||||||||||
Updated: | 2016-11-28 | ||||||||||||||||||||||||||||||||||||
Summary: | The NavigationScheduler::schedulePageBlock function in core/loader/NavigationScheduler.cpp in Blink, as used in Google Chrome before 38.0.2125.101, does not properly provide substitute data for pages blocked by the XSS auditor, which allows remote attackers to obtain sensitive information via a crafted web site. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N) 3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.2 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-264 | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2014-3197 Source: CCN Type: Google Chrome Releases Web site Stable Channel Update Source: CONFIRM Type: Vendor Advisory http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html Source: CCN Type: RHSA-2014-1626 Critical: chromium-browser security update Source: REDHAT Type: Third Party Advisory RHSA-2014:1626 Source: BID Type: UNKNOWN 70273 Source: CCN Type: BID-70273 Google Chrome Prior to 38.0.2125.101 Multiple Security Vulnerabilities Source: CONFIRM Type: UNKNOWN https://crbug.com/396544 Source: XF Type: UNKNOWN google-chrome-cve20143197-info-disc(96966) Source: CONFIRM Type: UNKNOWN https://src.chromium.org/viewvc/blink?revision=179240&view=revision | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration RedHat 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |