First published: Tue Jul 21 2009(Updated: )
Heap-based buffer overflow in src/jsregexp.cc in Google V8 before 1.1.10.14, as used in Google Chrome before 2.0.172.37, allows remote attackers to execute arbitrary code in the Chrome sandbox via a crafted JavaScript regular expression.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Google V8 | <=1.0 | |
Google Chrome | <=2.0.172.33 | |
Google Chrome | =0.2.149.29 | |
Google Chrome | =0.2.149.30 | |
Google Chrome | =0.2.152.1 | |
Google Chrome | =0.2.153.1 | |
Google Chrome | =0.3.154.0 | |
Google Chrome | =0.3.154.3 | |
Google Chrome | =0.4.154.18 | |
Google Chrome | =0.4.154.22 | |
Google Chrome | =0.4.154.31 | |
Google Chrome | =0.4.154.33 | |
Google Chrome | =1.0.154.36 | |
Google Chrome | =1.0.154.39 | |
Google Chrome | =1.0.154.42 | |
Google Chrome | =1.0.154.43 | |
Google Chrome | =1.0.154.46 | |
Google Chrome | =1.0.154.48 | |
Google Chrome | =1.0.154.52 | |
Google Chrome | =1.0.154.53 | |
Google Chrome | =1.0.154.59 | |
Google Chrome | =2.0.156.1 | |
Google Chrome | =2.0.157.0 | |
Google Chrome | =2.0.157.2 | |
Google Chrome | =2.0.158.0 | |
Google Chrome | =2.0.159.0 | |
Google Chrome | =2.0.172 | |
Google Chrome | =2.0.172.30 | |
Google Chrome | =2.0.172.31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.