Multiple use-after-free vulnerabilities in Blink in Google Chrome via extraneous change eventsID: oval:org.secpod.oval:def:23726 | Date: (C)2015-03-11 (M)2023-11-16 |
Class: VULNERABILITY | Family: windows |
The host is installed with Google Chrome before 41.0.2272.76 and is prone to multiple use-after-free vulnerabilities. The flaws are present in core/html/HTMLInputElement.cpp in the DOM implementation in Blink, as used in Google Chrome, which fails to properly handle vectors that trigger extraneous change events, as demonstrated by events for invalid input or input to read-only fields, related to the initializeTypeInParsing and updateType functions. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.
Platform: |
Microsoft Windows Server 2022 |
Microsoft Windows 11 |
Microsoft Windows Server 2019 |
Microsoft Windows Server 2016 |
Microsoft Windows XP |
Microsoft Windows Server 2003 |
Microsoft Windows Server 2008 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows 8 |
Microsoft Windows Server 2012 |
Microsoft Windows Vista |
Microsoft Windows 10 |
Microsoft Windows 7 |
Microsoft Windows 8.1 |
Microsoft Windows Server 2012 R2 |