Vulnerability Details : CVE-2010-2901
The rendering implementation in Google Chrome before 5.0.375.125 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
Vulnerability category: OverflowMemory CorruptionDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2010-2901
Probability of exploitation activity in the next 30 days: 2.64%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 89 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-2901
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2010-2901
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-2901
-
http://www.debian.org/security/2011/dsa-2188
Debian -- Security Information -- DSA-2188-1 webkitThird Party Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11997
Repository / Oval RepositoryThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2011:009Mailing List;Third Party Advisory
-
http://code.google.com/p/chromium/issues/detail?id=47866
47866 - Memory corruption with crash in RenderObject::containingBlock() - chromium - MonorailExploit;Issue Tracking;Patch;Vendor Advisory
-
http://googlechromereleases.blogspot.com/2010/07/stable-channel-update_26.html
Chrome Releases: Stable Channel UpdateVendor Advisory
Products affected by CVE-2010-2901
- cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*