Directory traversal vulnerability in sandbox/win/src/named_pipe_dispatcher.cc in Google Chrome before 33.0.1750.117 on Windows allows attackers to bypass intended named-pipe policy restrictions in the sandbox via vectors related to (1) lack of checks for .. (dot dot) sequences or (2) lack of use of the \\?\ protection mechanism.
https://src.chromium.org/viewvc/chrome?revision=247511&view=revision
https://code.google.com/p/chromium/issues/detail?id=334897
http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html