SB2011031102 - Multiple vulnerabilities in Techland Chrome
Published: March 11, 2011 Updated: August 11, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 20 secuirty vulnerabilities.
1) Type conversion (CVE-ID: CVE-2011-1200)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 10.0.648.127 does not properly perform a cast of an unspecified variable during text rendering, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document.
2) Input validation error (CVE-ID: CVE-2011-1201)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The context implementation in WebKit, as used in Google Chrome before 10.0.648.127, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."
3) Input validation error (CVE-ID: CVE-2011-1203)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 10.0.648.127 does not properly handle SVG cursors, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."
4) Input validation error (CVE-ID: CVE-2011-1204)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 10.0.648.127 does not properly handle attributes, which allows remote attackers to cause a denial of service (DOM tree corruption) or possibly have unspecified other impact via a crafted document.
5) Buffer overflow (CVE-ID: CVE-2011-1285)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The regular-expression functionality in Google Chrome before 10.0.648.127 does not properly implement reentrancy, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
6) Input validation error (CVE-ID: CVE-2011-1286)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google V8, as used in Google Chrome before 10.0.648.127, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger incorrect access to memory.
7) Input validation error (CVE-ID: CVE-2011-1413)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Google Chrome before 10.0.648.127 on Linux does not properly mitigate an unspecified flaw in an X server, which allows remote attackers to cause a denial of service (application crash) via vectors involving long messages.
8) Information disclosure (CVE-ID: CVE-2011-1190)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The Web Workers implementation in Google Chrome before 10.0.648.127 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, related to an "error message leak."
9) Use-after-free (CVE-ID: CVE-2011-1191)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to the handling of DOM URLs. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
10) Input validation error (CVE-ID: CVE-2011-1193)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google V8, as used in Google Chrome before 10.0.648.127, allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
11) Input validation error (CVE-ID: CVE-2011-1194)
The vulnerability allows a remote non-authenticated attacker to manipulate data.
Multiple unspecified vulnerabilities in Google Chrome before 10.0.648.127 allow remote attackers to bypass the pop-up blocker via unknown vectors.
12) Use-after-free (CVE-ID: CVE-2011-1195)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to "document script lifetime handling. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
13) Input validation error (CVE-ID: CVE-2011-1196)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The OGG container implementation in Google Chrome before 10.0.648.127 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an out-of-bounds write.
14) Input validation error (CVE-ID: CVE-2011-1197)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 10.0.648.127 does not properly perform table painting, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."
15) Buffer overflow (CVE-ID: CVE-2011-1198)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The video functionality in Google Chrome before 10.0.648.127 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger use of a malformed "out-of-bounds structure."
16) Input validation error (CVE-ID: CVE-2011-1199)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 10.0.648.127 does not properly handle DataView objects, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via unknown vectors.
17) Input validation error (CVE-ID: CVE-2011-1185)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 10.0.648.127 does not prevent (1) navigation and (2) close operations on the top location of a sandboxed frame, which has unspecified impact and remote attack vectors.
18) Information disclosure (CVE-ID: CVE-2011-1187)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
Google Chrome before 10.0.648.127 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, related to an "error message leak."
19) Input validation error (CVE-ID: CVE-2011-1188)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 10.0.648.127 does not properly handle counter nodes, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
20) Input validation error (CVE-ID: CVE-2011-1189)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 10.0.648.127 does not properly perform box layout, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale node."
Remediation
Install update from vendor's website.
References
- http://code.google.com/p/chromium/issues/detail?id=73134
- http://googlechromereleases.blogspot.com/2011/03/chrome-stable-release.html
- http://www.securityfocus.com/bid/46785
- http://www.vupen.com/english/advisories/2011/0628
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65964
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14419
- http://code.google.com/p/chromium/issues/detail?id=73196
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65965
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14089
- http://code.google.com/p/chromium/issues/detail?id=73746
- http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html
- http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html
- http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
- http://support.apple.com/kb/HT4808
- http://support.apple.com/kb/HT4981
- http://support.apple.com/kb/HT4999
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65967
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14355
- http://code.google.com/p/chromium/issues/detail?id=74030
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65968
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13585
- http://code.google.com/p/chromium/issues/detail?id=74662
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65969
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14571
- http://code.google.com/p/chromium/issues/detail?id=74675
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65970
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14455
- http://code.google.com/p/chromium/issues/detail?id=49747
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65949
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13922
- http://code.google.com/p/chromium/issues/detail?id=70336
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65954
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14398
- http://code.google.com/p/chromium/issues/detail?id=70442
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65955
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14765
- http://code.google.com/p/chromium/issues/detail?id=70877
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65957
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14035
- http://code.google.com/p/chromium/issues/detail?id=70885
- http://code.google.com/p/chromium/issues/detail?id=71167
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65958
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14461
- http://code.google.com/p/chromium/issues/detail?id=71763
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65959
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14575
- http://code.google.com/p/chromium/issues/detail?id=71788
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65960
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14033
- http://code.google.com/p/chromium/issues/detail?id=72028
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65961
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14703
- http://code.google.com/p/chromium/issues/detail?id=73026
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65962
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14555
- http://code.google.com/p/chromium/issues/detail?id=73066
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65963
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14584
- http://code.google.com/p/chromium/issues/detail?id=42574
- http://code.google.com/p/chromium/issues/detail?id=42765
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65948
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14349
- http://code.google.com/p/chromium/issues/detail?id=69187
- http://secunia.com/advisories/48972
- http://secunia.com/advisories/49047
- http://secunia.com/advisories/49055
- http://www.mozilla.org/security/announce/2012/mfsa2012-32.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=624621
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65951
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14369
- http://code.google.com/p/chromium/issues/detail?id=69628
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65952
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14493
- http://code.google.com/p/chromium/issues/detail?id=70027
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65953
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14370