CVE-2012-2764 (CNNVD-201206-498)

HIGH 有利用代码
中文标题:
Google Chrome 不可信搜索路径漏洞
英文标题:
Untrusted search path vulnerability in Google Chrome before 20.0.1132.43 on Windows might allow loca...
CVSS分数: 7.2
发布时间: 2012-06-27 10:00:00
漏洞类型: 其他
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v4
漏洞描述
中文描述:

Google Chrome是美国谷歌(Google)公司开发的一款Web浏览器。 基于Windows平台的Google Chrome 20.0.1132.43之前版本中存在不可信搜索路径漏洞。本地攻击者可利用该漏洞通过在当前工作目录中的Trojan木马Metro DLL获取特权。

英文描述:

Untrusted search path vulnerability in Google Chrome before 20.0.1132.43 on Windows might allow local users to gain privileges via a Trojan horse Metro DLL in the current working directory.

CWE类型:
(暂无数据)
标签:
remote windows Moshe Zioni OSVDB-83251
受影响产品
厂商 产品 版本 版本范围 平台 CPE
google chrome * - - cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
google chrome 20.0.1132.0 - - cpe:2.3:a:google:chrome:20.0.1132.0:*:*:*:*:*:*:*
google chrome 20.0.1132.1 - - cpe:2.3:a:google:chrome:20.0.1132.1:*:*:*:*:*:*:*
google chrome 20.0.1132.2 - - cpe:2.3:a:google:chrome:20.0.1132.2:*:*:*:*:*:*:*
google chrome 20.0.1132.3 - - cpe:2.3:a:google:chrome:20.0.1132.3:*:*:*:*:*:*:*
google chrome 20.0.1132.4 - - cpe:2.3:a:google:chrome:20.0.1132.4:*:*:*:*:*:*:*
google chrome 20.0.1132.5 - - cpe:2.3:a:google:chrome:20.0.1132.5:*:*:*:*:*:*:*
google chrome 20.0.1132.6 - - cpe:2.3:a:google:chrome:20.0.1132.6:*:*:*:*:*:*:*
google chrome 20.0.1132.7 - - cpe:2.3:a:google:chrome:20.0.1132.7:*:*:*:*:*:*:*
google chrome 20.0.1132.8 - - cpe:2.3:a:google:chrome:20.0.1132.8:*:*:*:*:*:*:*
google chrome 20.0.1132.9 - - cpe:2.3:a:google:chrome:20.0.1132.9:*:*:*:*:*:*:*
google chrome 20.0.1132.10 - - cpe:2.3:a:google:chrome:20.0.1132.10:*:*:*:*:*:*:*
google chrome 20.0.1132.11 - - cpe:2.3:a:google:chrome:20.0.1132.11:*:*:*:*:*:*:*
google chrome 20.0.1132.12 - - cpe:2.3:a:google:chrome:20.0.1132.12:*:*:*:*:*:*:*
google chrome 20.0.1132.13 - - cpe:2.3:a:google:chrome:20.0.1132.13:*:*:*:*:*:*:*
google chrome 20.0.1132.14 - - cpe:2.3:a:google:chrome:20.0.1132.14:*:*:*:*:*:*:*
google chrome 20.0.1132.15 - - cpe:2.3:a:google:chrome:20.0.1132.15:*:*:*:*:*:*:*
google chrome 20.0.1132.16 - - cpe:2.3:a:google:chrome:20.0.1132.16:*:*:*:*:*:*:*
google chrome 20.0.1132.17 - - cpe:2.3:a:google:chrome:20.0.1132.17:*:*:*:*:*:*:*
google chrome 20.0.1132.18 - - cpe:2.3:a:google:chrome:20.0.1132.18:*:*:*:*:*:*:*
google chrome 20.0.1132.19 - - cpe:2.3:a:google:chrome:20.0.1132.19:*:*:*:*:*:*:*
google chrome 20.0.1132.20 - - cpe:2.3:a:google:chrome:20.0.1132.20:*:*:*:*:*:*:*
google chrome 20.0.1132.21 - - cpe:2.3:a:google:chrome:20.0.1132.21:*:*:*:*:*:*:*
google chrome 20.0.1132.22 - - cpe:2.3:a:google:chrome:20.0.1132.22:*:*:*:*:*:*:*
google chrome 20.0.1132.23 - - cpe:2.3:a:google:chrome:20.0.1132.23:*:*:*:*:*:*:*
google chrome 20.0.1132.24 - - cpe:2.3:a:google:chrome:20.0.1132.24:*:*:*:*:*:*:*
google chrome 20.0.1132.25 - - cpe:2.3:a:google:chrome:20.0.1132.25:*:*:*:*:*:*:*
google chrome 20.0.1132.26 - - cpe:2.3:a:google:chrome:20.0.1132.26:*:*:*:*:*:*:*
google chrome 20.0.1132.27 - - cpe:2.3:a:google:chrome:20.0.1132.27:*:*:*:*:*:*:*
google chrome 20.0.1132.28 - - cpe:2.3:a:google:chrome:20.0.1132.28:*:*:*:*:*:*:*
google chrome 20.0.1132.29 - - cpe:2.3:a:google:chrome:20.0.1132.29:*:*:*:*:*:*:*
google chrome 20.0.1132.30 - - cpe:2.3:a:google:chrome:20.0.1132.30:*:*:*:*:*:*:*
google chrome 20.0.1132.31 - - cpe:2.3:a:google:chrome:20.0.1132.31:*:*:*:*:*:*:*
google chrome 20.0.1132.32 - - cpe:2.3:a:google:chrome:20.0.1132.32:*:*:*:*:*:*:*
google chrome 20.0.1132.33 - - cpe:2.3:a:google:chrome:20.0.1132.33:*:*:*:*:*:*:*
google chrome 20.0.1132.34 - - cpe:2.3:a:google:chrome:20.0.1132.34:*:*:*:*:*:*:*
google chrome 20.0.1132.35 - - cpe:2.3:a:google:chrome:20.0.1132.35:*:*:*:*:*:*:*
google chrome 20.0.1132.36 - - cpe:2.3:a:google:chrome:20.0.1132.36:*:*:*:*:*:*:*
google chrome 20.0.1132.37 - - cpe:2.3:a:google:chrome:20.0.1132.37:*:*:*:*:*:*:*
google chrome 20.0.1132.38 - - cpe:2.3:a:google:chrome:20.0.1132.38:*:*:*:*:*:*:*
google chrome 20.0.1132.39 - - cpe:2.3:a:google:chrome:20.0.1132.39:*:*:*:*:*:*:*
google chrome 20.0.1132.40 - - cpe:2.3:a:google:chrome:20.0.1132.40:*:*:*:*:*:*:*
google chrome 20.0.1132.41 - - cpe:2.3:a:google:chrome:20.0.1132.41:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
oval:org.mitre.oval:def:15375 vdb-entry
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
ExploitDB EDB-37510 EXPLOIT
exploitdb
访问
Download Exploit EDB-37510 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2012-2764 ADVISORY
cve.org
访问
CVSS评分详情
7.2
HIGH
CVSS向量: AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS版本: 2.0
机密性
COMPLETE
完整性
COMPLETE
可用性
COMPLETE
时间信息
发布时间:
2012-06-27 10:00:00
修改时间:
2024-08-06 19:42:32
创建时间:
2025-11-11 15:33:24
更新时间:
2025-11-11 16:35:00
利用信息
此漏洞有可利用代码!
利用代码数量: 1
利用来源:
未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2012-2764 2025-11-11 15:18:28 2025-11-11 07:33:24
NVD nvd_CVE-2012-2764 2025-11-11 14:53:57 2025-11-11 07:42:13
CNNVD cnnvd_CNNVD-201206-498 2025-11-11 15:09:16 2025-11-11 07:50:09
EXPLOITDB exploitdb_EDB-37510 2025-11-11 15:05:55 2025-11-11 08:35:00
版本与语言
当前版本: v4
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
安全公告
暂无安全公告信息
变更历史
v4 EXPLOITDB
2025-11-11 16:35:00
references_count: 3 → 6; tags_count: 0 → 4; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 3 -> 6
  • tags_count: 0 -> 4
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:50:09
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-201206-498; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 其他
  • cnnvd_id: 未提取 -> CNNVD-201206-498
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:42:13
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.2; cvss_vector: NOT_EXTRACTED → AV:L/AC:L/Au:N/C:C/I:C/A:C; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 43; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.2
  • cvss_vector: NOT_EXTRACTED -> AV:L/AC:L/Au:N/C:C/I:C/A:C
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 43
  • data_sources: ['cve'] -> ['cve', 'nvd']