Vulnerability Details : CVE-2012-5376
The Inter-process Communication (IPC) implementation in Google Chrome before 22.0.1229.94 allows remote attackers to bypass intended sandbox restrictions and write to arbitrary files by leveraging access to a renderer process, a different vulnerability than CVE-2012-5112.
Products affected by CVE-2012-5376
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-5376
1.17%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 83 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-5376
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST | |
9.6
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
2.8
|
6.0
|
NIST |
CWE ids for CVE-2012-5376
-
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-5376
-
http://code.google.com/p/chromium/issues/detail?id=154987
154987 - Pwnium SVG use after free - chromium - MonorailVendor Advisory
-
http://code.google.com/p/chromium/issues/detail?id=154983
154983 - Security: Pwnium 2 TCMalloc profile bug - chromium - MonorailVendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/79186
Google Chrome IPC security bypass CVE-2012-5376 Vulnerability ReportThird Party Advisory;VDB Entry
-
http://blog.chromium.org/2012/10/pwnium-2-results-and-wrap-up_10.html
Chromium Blog: Pwnium 2: results and wrap-upVendor Advisory
-
http://googlechromereleases.blogspot.com/2012/10/stable-channel-update_6105.html
Chrome Releases: Stable Channel UpdateVendor Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15156
Repository / Oval RepositoryTool Signature
Jump to