SB2011100401 - Multiple vulnerabilities in Techland Chrome
Published: October 4, 2011 Updated: August 11, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Use-after-free (CVE-ID: CVE-2011-2876)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors involving a text line box. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
2) Input validation error (CVE-ID: CVE-2011-2877)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 14.0.835.202 does not properly handle SVG text, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to "stale font."
3) Input validation error (CVE-ID: CVE-2011-2878)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 14.0.835.202 does not properly restrict access to the window prototype, which allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
4) Input validation error (CVE-ID: CVE-2011-2879)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 14.0.835.202 does not properly consider object lifetimes and thread safety during the handling of audio nodes, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
5) Use-after-free (CVE-ID: CVE-2011-2880)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to the Google V8 bindings. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
6) Buffer overflow (CVE-ID: CVE-2011-2881)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 14.0.835.202 does not properly handle Google V8 hidden objects, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code.
7) Buffer overflow (CVE-ID: CVE-2011-3873)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 14.0.835.202 does not properly implement shader translation, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
Remediation
Install update from vendor's website.
References
- http://code.google.com/p/chromium/issues/detail?id=93788
- http://googlechromereleases.blogspot.com/2011/10/stable-channel-update.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14439
- http://code.google.com/p/chromium/issues/detail?id=95072
- http://lists.apple.com/archives/security-announce/2012/Mar/msg00000.html
- http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html
- http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html
- http://secunia.com/advisories/48274
- http://secunia.com/advisories/48288
- http://secunia.com/advisories/48377
- http://www.securitytracker.com/id?1026774
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14694
- http://code.google.com/p/chromium/issues/detail?id=95671
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14470
- http://code.google.com/p/chromium/issues/detail?id=96150
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14496
- http://code.google.com/p/chromium/issues/detail?id=97451
- http://code.google.com/p/chromium/issues/detail?id=97520
- http://code.google.com/p/chromium/issues/detail?id=97615
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14319
- http://code.google.com/p/chromium/issues/detail?id=97784
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14075
- http://code.google.com/p/chromium/issues/detail?id=98089
- http://osvdb.org/76067
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14537