Vulnerability Details : CVE-2011-3961
Potential exploit
Race condition in Google Chrome before 17.0.963.46 allows remote attackers to execute arbitrary code via vectors that trigger a crash of a utility process.
Vulnerability category: Execute code
Products affected by CVE-2011-3961
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-3961
0.73%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 81 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-3961
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2011-3961
-
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-3961
-
http://googlechromereleases.blogspot.com/2012/02/stable-channel-update.html
Chrome Releases: Stable Channel UpdateVendor Advisory
-
http://code.google.com/p/chromium/issues/detail?id=108871
108871 - IndexedDB with autoincrement fails on object put and crashes chrome - chromium - MonorailExploit;Issue Tracking;Patch;Vendor Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14864
Repository / Oval RepositoryThird Party Advisory
Jump to