CVE-2014-3196
Published: 8 October 2014
base/memory/shared_memory_win.cc in Google Chrome before 38.0.2125.101 on Windows does not properly implement read-only restrictions on shared memory, which allows attackers to bypass a sandbox protection mechanism via unspecified vectors.
Notes
Author | Note |
---|---|
seth-arnold | Windows sandbox bypass |
Priority
Status
Package | Release | Status |
---|---|---|
chromium-browser Launchpad, Ubuntu, Debian |
lucid |
Ignored
(end of life)
|
precise |
Not vulnerable
|
|
trusty |
Does not exist
(trusty was not-affected)
|
|
upstream |
Released
(38.0.2125.101)
|
|
oxide-qt Launchpad, Ubuntu, Debian |
lucid |
Does not exist
|
precise |
Does not exist
|
|
trusty |
Does not exist
(trusty was not-affected)
|
|
upstream |
Not vulnerable
|
References
- https://src.chromium.org/viewvc/chrome?revision=288152&view=revision
- https://src.chromium.org/viewvc/chrome?revision=285195&view=revision
- https://crbug.com/338538
- http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html
- https://www.cve.org/CVERecord?id=CVE-2014-3196
- NVD
- Launchpad
- Debian