CVE-2014-1733
 
Severity Score
7.5
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The PointerCompare function in codegen.cc in Seccomp-BPF, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, does not properly merge blocks, which might allow remote attackers to bypass intended sandbox restrictions by leveraging renderer access.
La función PointerCompare en codegen.cc en Seccomp-BPF, utilizado en Google Chrome anterior a 34.0.1847.131 en Windows y OS X y anterior a 34.0.1847.132 en Linux, no fusiona debidamente bloques, lo que podría permitir a atacantes remotos evadir restricciones sandbox mediante el aprovechamiento de acceso renderer.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2014-01-29 CVE Reserved
- 2014-04-26 CVE Published
- 2023-12-07 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://googlechromereleases.blogspot.com/2014/04/stable-channel-update_24.html | X_refsource_confirm | |
http://secunia.com/advisories/58301 | Third Party Advisory | |
https://code.google.com/p/chromium/issues/detail?id=351103 | X_refsource_confirm | |
https://src.chromium.org/viewvc/chrome?revision=260157&view=revision | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2014-05/msg00049.html | 2023-11-07 | |
http://lists.opensuse.org/opensuse-updates/2014-05/msg00050.html | 2023-11-07 | |
http://security.gentoo.org/glsa/glsa-201408-16.xml | 2023-11-07 | |
http://www.debian.org/security/2014/dsa-2920 | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Google Search vendor "Google" | Chrome Search vendor "Google" for product "Chrome" | < 34.0.1847.131 Search vendor "Google" for product "Chrome" and version " < 34.0.1847.131" | - |
Affected
| in | Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | - | - |
Safe
|
Google Search vendor "Google" | Chrome Search vendor "Google" for product "Chrome" | < 34.0.1847.131 Search vendor "Google" for product "Chrome" and version " < 34.0.1847.131" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | - | - |
Safe
|
Google Search vendor "Google" | Chrome Search vendor "Google" for product "Chrome" | < 34.0.1847.132 Search vendor "Google" for product "Chrome" and version " < 34.0.1847.132" | - |
Affected
| in | Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | - | - |
Safe
|