Security bypass vulnerability in the Inter-process Communication (IPC) implementation in Google Chrome (rpm)ID: oval:org.secpod.oval:def:7363 | Date: (C)2012-10-17 (M)2022-10-10 |
Class: VULNERABILITY | Family: unix |
The host is installed with Google Chrome before 22.0.1229.94 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle the Inter-process Communication (IPC) implementation. Successful exploitation allows remote attackers to bypass intended sandbox restrictions and write to arbitrary files by leveraging access to a renderer process.