First published: Thu Nov 12 2009(Updated: )
Incomplete blacklist vulnerability in browser/download/download_exe.cc in Google Chrome before 3.0.195.32 allows remote attackers to force the download of certain dangerous files via a "Content-Disposition: attachment" designation, as demonstrated by (1) .mht and (2) .mhtml files, which are automatically executed by Internet Explorer 6; (3) .svg files, which are automatically executed by Safari; (4) .xml files; (5) .htt files; (6) .xsl files; (7) .xslt files; and (8) image files that are forbidden by the victim's site policy.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome | <=3.0.195.21 | |
Google Chrome | =0.2.149.27 | |
Google Chrome | =0.2.149.29 | |
Google Chrome | =0.2.149.30 | |
Google Chrome | =0.2.152.1 | |
Google Chrome | =0.2.153.1 | |
Google Chrome | =0.3.154.0 | |
Google Chrome | =0.3.154.3 | |
Google Chrome | =0.4.154.18 | |
Google Chrome | =0.4.154.22 | |
Google Chrome | =0.4.154.31 | |
Google Chrome | =0.4.154.33 | |
Google Chrome | =1.0.154.36 | |
Google Chrome | =1.0.154.39 | |
Google Chrome | =1.0.154.42 | |
Google Chrome | =1.0.154.43 | |
Google Chrome | =1.0.154.46 | |
Google Chrome | =1.0.154.48 | |
Google Chrome | =1.0.154.52 | |
Google Chrome | =1.0.154.53 | |
Google Chrome | =1.0.154.59 | |
Google Chrome | =1.0.154.65 | |
Google Chrome | =2.0.156.1 | |
Google Chrome | =2.0.157.0 | |
Google Chrome | =2.0.157.2 | |
Google Chrome | =2.0.158.0 | |
Google Chrome | =2.0.159.0 | |
Google Chrome | =2.0.169.0 | |
Google Chrome | =2.0.169.1 | |
Google Chrome | =2.0.170.0 | |
Google Chrome | =2.0.172 | |
Google Chrome | =2.0.172.2 | |
Google Chrome | =2.0.172.8 | |
Google Chrome | =2.0.172.27 | |
Google Chrome | =2.0.172.28 | |
Google Chrome | =2.0.172.30 | |
Google Chrome | =2.0.172.31 | |
Google Chrome | =2.0.172.33 | |
Google Chrome | =2.0.172.37 | |
Google Chrome | =2.0.172.38 | |
Google Chrome | =3.0.182.2 | |
Google Chrome | =3.0.190.2 | |
Google Chrome | =3.0.193.2-beta |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.