Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:STC:CHROME:RESPONSE-MC

Severity

High

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

Google Chrome HTTP Response Handling Memory Corruption

Release Date

2011/12/21

Update Number

2051

Supported Platforms

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Google Chrome HTTP Response Handling Memory Corruption


This signature detects attempts to exploit a known vulnerability against Google Chrome. A successful attack can lead to memory corruption and arbitrary code execution.

Extended Description

Google Chrome is prone to a remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the browser. Successful exploits will compromise the browser and possibly the computer. Failed attacks may cause denial-of-service conditions. This issue affects versions prior to Chrome 2.0.172.33.

Affected Products

  • Google Chrome 0.2.149.27
  • Google Chrome 0.2.149.29
  • Google Chrome 0.2.149.30
  • Google Chrome 0.3.154 9
  • Google Chrome 1.0.154.36
  • Google Chrome 1.0.154.46
  • Google Chrome 1.0.154.48
  • Google Chrome 1.0.154.53
  • Google Chrome 1.0.154.55
  • Google Chrome 1.0.154.59
  • Google Chrome 1.0.154.61
  • Google Chrome 1.0.154.64
  • Google Chrome 1.0.154.65
  • Google Chrome 2.0.172.30
  • Google Chrome 2.0.172.31

References

  • BugTraq: 35462
  • CVE: CVE-2009-2121

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out