ID

VAR-201211-0355


CVE

CVE-2012-5131


TITLE

Mac OS X Run on Google Chrome Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2012-005572

DESCRIPTION

Google Chrome before 23.0.1271.91 on Mac OS X does not properly mitigate improper rendering behavior in the Intel GPU driver, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. Apple Mac OS X is prone to an unspecified security vulnerability. The impact of this issue is currently unknown. We will update this BID when more information emerges. Note: This issue was previously discussed in BID 56684 (Google Chrome Prior to 23.0.1271.91 Multiple Security Vulnerabilities) but has been given its own record to better document it. Google Chrome is a web browser developed by Google (Google). An attacker could exploit these vulnerabilities to execute arbitrary code in the browser context, cause a denial of service, bypass the same-origin policy, and more. ---------------------------------------------------------------------- The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/ ---------------------------------------------------------------------- TITLE: Google Chrome Multiple Vulnerabilities SECUNIA ADVISORY ID: SA51437 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/51437/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=51437 RELEASE DATE: 2012-11-27 DISCUSS ADVISORY: http://secunia.com/advisories/51437/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/51437/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=51437 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Google Chrome, where one has an unknown impact and others can be exploited by malicious people to compromise a user's system. 1) A use-after-free error exists in SVG filters. 2) An out-of-bounds read error exists in Skia. 3) An error exists within the libxml2 library. For more information see vulnerability #2: SA48000 4) A use-after-free error exists within printing. 5) A bad cast error exists within input element handling. The vulnerabilities are reported in versions prior to 23.0.1271.91. SOLUTION: Update to version 23.0.1271.91. PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1) miaubiz 2) Atte Kettunen, OUSPG 3) Juri Aedla, Google Chrome Security Team 4) Fermin Serna, Google Security Team 5) Inferno, Google Chrome Security Team. ORIGINAL ADVISORY: http://googlechromereleases.blogspot.dk/2012/11/stable-channel-update.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2012-5131 // JVNDB: JVNDB-2012-005572 // BID: 56752 // VULHUB: VHN-58412 // PACKETSTORM: 118407

AFFECTED PRODUCTS

vendor:googlemodel:chromescope:eqversion:23.0.1271.84

Trust: 1.6

vendor:googlemodel:chromescope:eqversion:23.0.1271.7

Trust: 1.6

vendor:googlemodel:chromescope:eqversion:23.0.1271.87

Trust: 1.6

vendor:googlemodel:chromescope:eqversion:23.0.1271.86

Trust: 1.6

vendor:googlemodel:chromescope:eqversion:23.0.1271.0

Trust: 1.6

vendor:googlemodel:chromescope:eqversion:23.0.1271.85

Trust: 1.6

vendor:googlemodel:chromescope:eqversion:23.0.1271.83

Trust: 1.6

vendor:googlemodel:chromescope:eqversion:23.0.1271.88

Trust: 1.6

vendor:googlemodel:chromescope:eqversion:23.0.1271.8

Trust: 1.6

vendor:googlemodel:chromescope:eqversion:23.0.1271.64

Trust: 1.3

vendor:googlemodel:chromescope:eqversion:23.0.1271.18

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.26

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.33

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.19

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.15

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.16

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.36

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.49

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.38

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.11

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.56

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.59

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.54

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.22

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.51

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.17

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.52

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.10

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.55

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.3

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.20

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.53

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.39

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.13

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.57

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.12

Trust: 1.0

vendor:googlemodel:chromescope:lteversion:23.0.1271.89

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.58

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.62

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.31

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.14

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.21

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.35

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.23

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.37

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.40

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.46

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.30

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.24

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.1

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.32

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.50

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.41

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.60

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.61

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.9

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.2

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.6

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.45

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.5

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.44

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.4

Trust: 1.0

vendor:googlemodel:chromescope:ltversion:23.0.1271.91

Trust: 0.8

vendor:googlemodel:chromescope:eqversion:23.0.1271.89

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:8.0.552.220

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.101

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.83

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.94

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375127

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.100

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.57

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1042

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:19.0.1084.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.223

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:21.0.1180.81

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.303

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.168

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.70

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.20

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.300

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:21.0.1180.49

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.32

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.75

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.60

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.203

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.105

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.211

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.18

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.47255

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:20.0.1132.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.221

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:19.0.1084.52

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.104

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.213

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.306

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.102

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.204

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.38

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.307

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375125

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.551.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.208

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.128

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.19

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.301

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:21.0.1180.89

Trust: 0.3

vendor:googlemodel:chromescope:neversion:23.0.1271.91

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.15

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.205

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.2491064

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.17

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.204

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.222

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.215

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.33

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.127

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.65

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.225

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.24

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.142

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:22.0.1229.79

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.107

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.302

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.219

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.310

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.91275

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.55

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.96379

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.33

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.218

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.217

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.224

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.103

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.112

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.71

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.100

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.548.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.59

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.62

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.37599

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.91

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.78

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.308

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.84

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.210

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.550.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:21.0.1180.82

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.56

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:21.0.1180.50

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.249.89

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874.120

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:22.0.1229.94

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.107

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.77

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.309

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.214

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:20.0.1132.57

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:12.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.209

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.202

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.226

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.551.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:21.0.1180.60

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.96365

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1045

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:20.0.1132.23

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:19

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:22.0.1229.92

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.249.78

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.201

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.31

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.68

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.672.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874.121

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.163

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.549.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.44

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.77

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.304

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.151

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:21.0.1180.83

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.162

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.207

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.112

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.212

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.305

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.216

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.237

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.344

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.53

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.41

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874102

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.206

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.133

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:21.0.1180.79

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.215

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.205

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.200

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.186

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.211.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:21.0.1180.75

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.37586

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.63

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:12.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.2491059

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.2491036

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.202

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.30

Trust: 0.3

sources: BID: 56752 // JVNDB: JVNDB-2012-005572 // CNNVD: CNNVD-201211-515 // NVD: CVE-2012-5131

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-5131
value: HIGH

Trust: 1.0

NVD: CVE-2012-5131
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201211-515
value: HIGH

Trust: 0.6

VULHUB: VHN-58412
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-5131
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-58412
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-58412 // JVNDB: JVNDB-2012-005572 // CNNVD: CNNVD-201211-515 // NVD: CVE-2012-5131

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2012-5131

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201211-515

TYPE

Unknown

Trust: 0.3

sources: BID: 56752

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-005572

PATCH

title:Stable Channel Updateurl:http://googlechromereleases.blogspot.jp/2012/11/stable-channel-update.html

Trust: 0.8

title:Google Chromeurl:http://www.google.co.jp/chrome/intl/ja/landing_ff_yt.html?hl=ja&hl=ja

Trust: 0.8

sources: JVNDB: JVNDB-2012-005572

EXTERNAL IDS

db:NVDid:CVE-2012-5131

Trust: 2.8

db:OSVDBid:87883

Trust: 1.4

db:SECTRACKid:1027815

Trust: 1.1

db:JVNDBid:JVNDB-2012-005572

Trust: 0.8

db:CNNVDid:CNNVD-201211-515

Trust: 0.7

db:SECUNIAid:51437

Trust: 0.7

db:NSFOCUSid:21606

Trust: 0.6

db:BIDid:56684

Trust: 0.6

db:BIDid:56752

Trust: 0.4

db:VULHUBid:VHN-58412

Trust: 0.1

db:PACKETSTORMid:118407

Trust: 0.1

sources: VULHUB: VHN-58412 // BID: 56752 // JVNDB: JVNDB-2012-005572 // PACKETSTORM: 118407 // CNNVD: CNNVD-201211-515 // NVD: CVE-2012-5131

REFERENCES

url:http://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html

Trust: 1.7

url:https://code.google.com/p/chromium/issues/detail?id=152746

Trust: 1.7

url:http://osvdb.org/87883

Trust: 1.1

url:http://www.securitytracker.com/id?1027815

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-5131

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-5131

Trust: 0.8

url:http://secunia.com/advisories/51437

Trust: 0.6

url:http://www.securityfocus.com/bid/56684

Trust: 0.6

url:http://www.nsfocus.net/vulndb/21606

Trust: 0.6

url:http://www.osvdb.org/show/osvdb/87883

Trust: 0.3

url:http://www.google.com/chrome

Trust: 0.3

url:http://www.apple.com/macosx/

Trust: 0.3

url:http://googlechromereleases.blogspot.ie/2012/11/stable-channel-update.html

Trust: 0.3

url:http://googlechromereleases.blogspot.dk/2012/11/stable-channel-update.html

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/51437/#comments

Trust: 0.1

url:http://secunia.com/blog/325/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=51437

Trust: 0.1

url:http://secunia.com/advisories/51437/

Trust: 0.1

sources: VULHUB: VHN-58412 // BID: 56752 // JVNDB: JVNDB-2012-005572 // PACKETSTORM: 118407 // CNNVD: CNNVD-201211-515 // NVD: CVE-2012-5131

CREDITS

J??ri Aedla and Inferno of Google Chrome Security Team, miaubiz, Atte Kettunen of OUSPG, Attila Sz??sz, Justin Drake, and Fermin Serna of Google Security Team

Trust: 0.6

sources: CNNVD: CNNVD-201211-515

SOURCES

db:VULHUBid:VHN-58412
db:BIDid:56752
db:JVNDBid:JVNDB-2012-005572
db:PACKETSTORMid:118407
db:CNNVDid:CNNVD-201211-515
db:NVDid:CVE-2012-5131

LAST UPDATE DATE

2025-04-11T21:13:46.820000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-58412date:2013-08-17T00:00:00
db:BIDid:56752date:2015-03-19T08:32:00
db:JVNDBid:JVNDB-2012-005572date:2012-11-29T00:00:00
db:CNNVDid:CNNVD-201211-515date:2012-11-28T00:00:00
db:NVDid:CVE-2012-5131date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-58412date:2012-11-28T00:00:00
db:BIDid:56752date:2012-11-26T00:00:00
db:JVNDBid:JVNDB-2012-005572date:2012-11-29T00:00:00
db:PACKETSTORMid:118407date:2012-11-27T07:16:54
db:CNNVDid:CNNVD-201211-515date:2012-11-28T00:00:00
db:NVDid:CVE-2012-5131date:2012-11-28T01:55:01.027