Use-after-free vulnerability in the shared-timer implementation in Blink in Google Chrome (Mac OS X)ID: oval:org.secpod.oval:def:26495 | Date: (C)2015-09-07 (M)2023-11-13 |
Class: VULNERABILITY | Family: macos |
The host is installed with Google Chrome before 45.0.2454.85 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle erroneous timer firing. Successful exploitation could allow remote attackers to crash the service or possibly have unspecified other impact.
Platform: |
Apple Mac OS 14 |
Apple Mac OS 13 |
Apple Mac OS 12 |
Apple Mac OS 11 |
Apple Mac OS X 10.15 |
Apple Mac OS X 10.14 |
Apple Mac OS X 10.12 |
Apple Mac OS X 10.13 |
Apple Mac OS X 10.8 |
Apple Mac OS X 10.9 |
Apple Mac OS X 10.10 |
Apple Mac OS X 10.11 |
Apple Mac OS X Server 10.8 |
Apple Mac OS X Server 10.9 |
Apple Mac OS X Server 10.10 |
Apple Mac OS X Server 10.11 |