CVE-2009-2060
15.06.2009, 19:30
src/net/http/http_transaction_winhttp.cc in Google Chrome before 1.0.154.53 uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.Enginsight
Vendor | Product | Version |
---|---|---|
chrome | 𝑥 ≤ 1.0.154.52 | |
chrome | 0.2.149.29 | |
chrome | 0.2.149.30 | |
chrome | 0.2.152.1 | |
chrome | 0.2.153.1 | |
chrome | 0.3.154.0 | |
chrome | 0.3.154.3 | |
chrome | 0.4.154.18 | |
chrome | 0.4.154.22 | |
chrome | 0.4.154.31 | |
chrome | 0.4.154.33 | |
chrome | 1.0.154.36 | |
chrome | 1.0.154.39 | |
chrome | 1.0.154.42 | |
chrome | 1.0.154.43 | |
chrome | 1.0.154.46 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References