Vulnerability Details : CVE-2011-3096
Use-after-free vulnerability in Google Chrome before 19.0.1084.46 on Linux allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging an error in the GTK implementation of the omnibox.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2011-3096
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-3096
1.38%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 79 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-3096
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2011-3096
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-3096
-
http://security.gentoo.org/glsa/glsa-201205-03.xml
Chromium, V8: Multiple vulnerabilities (GLSA 201205-03) — Gentoo security
-
http://www.securityfocus.com/bid/53540
Google Chrome Prior to 19 Multiple Security Vulnerabilities
-
http://googlechromereleases.blogspot.com/2012/05/stable-channel-update.html
Chrome Releases: Stable Channel UpdateVendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/75601
Google Chrome GTK omnibox code execution CVE-2011-3096 Vulnerability Report
-
http://www.securitytracker.com/id?1027067
Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code - SecurityTracker
-
http://code.google.com/p/chromium/issues/detail?id=123530
123530 - Heap-use-after-free in AutocompleteMatch::AutocompleteMatch - chromium - Monorail
-
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00017.html
[security-announce] openSUSE-SU-2012:0656-1: important: update for chrom
Jump to