Vulnerability ID 5459

Google Chrome 19.0.1084.52 buffer overflow

CVSSv3 Temp ScoreCurrent Exploit Price (≈)

A vulnerability was found in Google Chrome 19.0.1084.52 and classified as critical. This issue affects an unknown function. The manipulation with an unknown input leads to a buffer overflow vulnerability. Impacted is confidentiality, integrity, and availability. The summary by CVE is:

The WebSockets implementation in Google Chrome before 19.0.1084.52 does not properly handle use of SSL, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.

The weakness was shared 05/24/2012 by Dharani Govindan (efbiaiinzinz) with Chromium development community as 122654 as confirmed knowledge base article (Website). The advisory is shared for download at The vendor cooperated in the coordination of the public release. The identification of this vulnerability is CVE-2011-3106 since 08/09/2011. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. Technical details are unknown but a private exploit is available.

The vulnerability scanner Nessus provides a plugin with the ID 59281 (FreeBSD : chromium -- multiple vulnerabilities (219d0bfd-a915-11e1-b519-00262d5ed8ee)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family FreeBSD Local Security Checks.

Upgrading to version 19.0.1084.52 eliminates this vulnerability. The upgrade is hosted for download at A possible mitigation has been published before and not just after the disclosure of the vulnerability.

The vulnerability is also documented in the databases at SecurityFocus (BID 53679), X-Force (75844), Secunia (SA49277), SecurityTracker (ID 1027098) and Vulnerability Center (SBV-35164). See 5448, 5449, 5450 and 5451 for similar entries.


Base Score: 10.0 [?]
Temp Score: 9.5 [?]
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:X/RL:O/RC:C [?]
Reliability: High


Base Score: 9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C) [?]
Temp Score: 8.1 (CVSS2#E:ND/RL:OF/RC:C) [?]
Reliability: High




Class: Buffer overflow (CWE-119)
Local: No
Remote: Yes

Availability: Yes
Access: Private

Current Price Estimation: $100k-$500k (0-day) / $25k-$50k (Today)


Nessus ID: 59281
Nessus Name: FreeBSD : chromium -- multiple vulnerabilities (219d0bfd-a915-11e1-b519-00262d5ed8ee)
Nessus File: freebsd_pkg_219d0bfda91511e1b51900262d5ed8ee.nasl
Nessus Family: FreeBSD Local Security Checks
OpenVAS ID: 71365
OpenVAS Name: FreeBSD Ports: chromium
OpenVAS File: freebsd_chromium11.nasl
OpenVAS Family: FreeBSD Local Security Checks


Recommended: Upgrade
Status: Official fix
0-Day Time: 0 days since found

Upgrade: Chrome 19.0.1084.52


08/09/2011 CVE assigned
05/23/2012 +288 days Countermeasure disclosed
05/23/2012 +0 days VulnerabilityCenter entry assigned
05/24/2012 +1 days Advisory disclosed
05/24/2012 +0 days NVD disclosed
05/25/2012 +1 days OSVDB entry created
05/28/2012 +3 days VulnerabilityCenter entry created
05/30/2012 +2 days VulDB entry created
05/18/2014 +718 days VulnerabilityCenter entry updated
07/08/2015 +417 days VulDB entry updated


Advisory: 122654
Researcher: Dharani Govindan (efbiaiinzinz)
Organization: Chromium development community
Status: Confirmed
Coordinated: Yes

CVE: CVE-2011-3106 ( ( (

SecurityFocus: 53679 - Google Chrome Prior to 19.0.1084.52 Multiple Security Vulnerabilities
Secunia: 49277 - Google Chrome Multiple Vulnerabilities, Highly Critical
X-Force: 75844
SecurityTracker: 1027098 - Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code
Vulnerability Center: 35164 - Google Chrome \x3C19.0.1084.52 WebSockets Implementation Remote Code Execution or DoS, Medium
OSVDB: 82251 - Google Chrome SSL Connection Handling Memory Corruption

See also: 5448, 5449, 5450, 5451, 5452, 5453, 5454, 5455, 5456, 5457, 5458, 5460, 6158, 6403


Created: 05/30/2012
Updated: 07/08/2015
Entry: 94.4% complete