CVE-2017-5052

An incorrect assumption about block structure in Blink in Google Chrome prior to 57.0.2987.133 for Mac, Windows, and Linux, and 57.0.2987.132 for Android, allowed a remote attacker to potentially exploit memory corruption via a crafted HTML page that triggers improper casting.
References
Link Resource
https://crbug.com/662767 Exploit Issue Tracking Third Party Advisory
https://chromereleases.googleblog.com/2017/03/stable-channel-update-for-desktop_29.html Issue Tracking Vendor Advisory
https://security.gentoo.org/glsa/201704-02 Issue Tracking Third Party Advisory
http://www.securityfocus.com/bid/97220 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:0860
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
OR cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*

Information

Published : 2017-10-27 05:29

Updated : 2021-09-08 17:20


NVD link : CVE-2017-5052

Mitre link : CVE-2017-5052


JSON object : View

Products Affected

google

  • chrome
  • android

apple

  • macos

linux

  • linux_kernel

microsoft

  • windows
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer