Race condition in the Inter-process Communication (IPC) implementation in Google Chrome before 18.0.1025.168 allows attackers to bypass intended sandbox restrictions via unspecified vectors.
http://code.google.com/p/chromium/issues/detail?id=121726
http://googlechromereleases.blogspot.com/2012/04/stable-channel-update_30.html
http://secunia.com/advisories/48992
http://www.securityfocus.com/bid/53309
http://www.securitytracker.com/id?1027001
https://exchange.xforce.ibmcloud.com/vulnerabilities/75272
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15623
OR
ID | Name | Product | Family | Severity |
---|---|---|---|---|
74622 | openSUSE Security Update : chromium / v8 (openSUSE-SU-2012:0613-1) | Nessus | SuSE Local Security Checks | critical |
800935 | Google Chrome < 18.0.1025.168 Multiple Vulnerabilities | Log Correlation Engine | Web Clients | high |
6783 | Google Chrome < 18.0.1025.168 Multiple Vulnerabilities | Nessus Network Monitor | Web Clients | high |
58963 | FreeBSD : chromium -- multiple vulnerabilities (94c0ac4f-9388-11e1-b242-00262d5ed8ee) | Nessus | FreeBSD Local Security Checks | critical |
58954 | Google Chrome < 18.0.1025.168 Multiple Vulnerabilities | Nessus | Windows | high |