First published: Wed Oct 08 2014(Updated: )
The NavigationScheduler::schedulePageBlock function in core/loader/NavigationScheduler.cpp in Blink, as used in Google Chrome before 38.0.2125.101, does not properly provide substitute data for pages blocked by the XSS auditor, which allows remote attackers to obtain sensitive information via a crafted web site.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome (Trace Event) | <=38.0.2125.7 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server Supplementary | =6.0 | |
Red Hat Enterprise Linux Server Supplementary EUS | =6.6.z | |
Red Hat Enterprise Linux Workstation Supplementary | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-3197 is classified as high due to the potential for sensitive information disclosure.
To fix CVE-2014-3197, users should upgrade to Google Chrome version 38.0.2125.101 or later.
CVE-2014-3197 affects Google Chrome versions prior to 38.0.2125.101.
Yes, CVE-2014-3197 can be exploited remotely, allowing attackers to obtain sensitive information.
CVE-2014-3197 impacts specific versions of Google Chrome and various Red Hat Enterprise Linux products.