First published: Thu Jan 16 2014(Updated: )
The OneClickSigninBubbleView::WindowClosing function in browser/ui/views/sync/one_click_signin_bubble_view.cc in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux allows attackers to trigger a sync with an arbitrary Google account by leveraging improper handling of the closing of an untrusted signin confirm dialog.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome | <32.0.1700.77 | |
macOS Yosemite | ||
Linux Kernel | ||
openSUSE | =12.3 | |
openSUSE | =13.1 | |
Google Chrome | <32.0.1700.76 | |
Microsoft Windows | ||
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6643 has a moderate severity level as it can allow attackers to compromise user data through arbitrary account syncs.
To fix CVE-2013-6643, update Google Chrome to version 32.0.1700.76 or later.
CVE-2013-6643 affects Google Chrome versions prior to 32.0.1700.76 on Windows and prior to 32.0.1700.77 on Mac OS X and Linux.
CVE-2013-6643 is specifically vulnerable on Windows, Mac OS X, and Linux platforms running affected versions of Google Chrome.
CVE-2013-6643 could lead to unauthorized access and synchronization of data with an attacker-controlled Google account.