First published: Sat Apr 26 2014(Updated: )
core/html/HTMLSelectElement.cpp in the DOM implementation in Blink, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, does not properly check renderer state upon a focus event, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion" for SELECT elements.
Credit: cve-coordination@google.com chrome-cve-admin@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome | <34.0.1847.131 | |
Apple iOS and macOS | ||
Microsoft Windows Operating System | ||
Google Chrome | <34.0.1847.132 | |
Linux Kernel | ||
All of | ||
Google Chrome | <34.0.1847.131 | |
Any of | ||
Apple iOS and macOS | ||
Microsoft Windows Operating System | ||
All of | ||
Google Chrome | <34.0.1847.132 | |
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1731 has a medium severity rating and can lead to denial of service.
To fix CVE-2014-1731, update Google Chrome to version 34.0.1847.132 or later.
Google Chrome versions prior to 34.0.1847.131 on Windows and OS X, and prior to 34.0.1847.132 on Linux are affected.
CVE-2014-1731 can be exploited by remote attackers to cause denial of service.
Yes, CVE-2014-1731 is relevant for Mac users using versions of Google Chrome before 34.0.1847.131.