TROYANOSYVIRUS
Retour aux CVEs

CVE-2018-6126

N/A

Description

A precision error in Skia in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.

Details CVE

Score CVSS v3.1N/A
Publie1/9/2019
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0

Produits affectes

debian:debian_linuxgoogle:chromeredhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_workstation

Faiblesses (CWE)

CWE-787

References

http://www.securityfocus.com/bid/104309(chrome-cve-admin@google.com)
http://www.securityfocus.com/bid/104411(chrome-cve-admin@google.com)
http://www.securitytracker.com/id/1041014(chrome-cve-admin@google.com)
http://www.securitytracker.com/id/1041046(chrome-cve-admin@google.com)
https://crbug.com/844457(chrome-cve-admin@google.com)
https://security.gentoo.org/glsa/201810-01(chrome-cve-admin@google.com)
https://www.exploit-db.com/exploits/45098/(chrome-cve-admin@google.com)
http://www.securityfocus.com/bid/104309(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/104411(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1041014(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1041046(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1815(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2112(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2113(af854a3a-2127-422b-91ae-364da2661108)
https://crbug.com/844457(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201810-01(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2018/dsa-4220(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2018/dsa-4237(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/45098/(af854a3a-2127-422b-91ae-364da2661108)

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.