← Voltar para CVEs
CVE-2008-6998
N/ADescricao
Stack-based buffer overflow in chrome/common/gfx/url_elider.cc in Google Chrome 0.2.149.27 and other versions before 0.2.149.29 might allow user-assisted remote attackers to execute arbitrary code via a link target (href attribute) with a large number of path elements, which triggers the overflow when the status bar is updated after the user hovers over the link.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado8/19/2009
Ultima modificacao4/23/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
google:chrome
Fraquezas (CWE)
CWE-119
Referencias
http://osvdb.org/48264(cve@mitre.org)
http://shinnok.evonet.ro/vulns_html/chrome.html(cve@mitre.org)
http://src.chromium.org/viewvc/chrome/branches/chrome_official_branch/src/chrome/common/gfx/url_elider.cc?r1=1774&r2=1797&pathrev=1797(cve@mitre.org)
http://www.securityfocus.com/bid/31034(cve@mitre.org)
http://www.securityfocus.com/bid/31071(cve@mitre.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/44934(cve@mitre.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45032(cve@mitre.org)
https://www.exploit-db.com/exploits/6372(cve@mitre.org)
http://googlechromereleases.blogspot.com/2008/09/beta-release-0214929.html(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/48264(af854a3a-2127-422b-91ae-364da2661108)
http://shinnok.evonet.ro/vulns_html/chrome.html(af854a3a-2127-422b-91ae-364da2661108)
http://src.chromium.org/viewvc/chrome/branches/chrome_official_branch/src/chrome/common/gfx/url_elider.cc?r1=1774&r2=1797&pathrev=1797(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/31034(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/31071(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/44934(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45032(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/6372(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.