SB2012030501 - Multiple vulnerabilities in Techland Chrome
Published: March 5, 2012 Updated: August 11, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 14 secuirty vulnerabilities.
1) Use-after-free (CVE-ID: CVE-2011-3031)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing unknown vectors. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
2) Use-after-free (CVE-ID: CVE-2011-3032)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to the handling of SVG values. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
3) Buffer overflow (CVE-ID: CVE-2011-3033)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Buffer overflow in Skia, as used in Google Chrome before 17.0.963.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
4) Use-after-free (CVE-ID: CVE-2011-3034)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors involving an SVG document. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
5) Use-after-free (CVE-ID: CVE-2011-3035)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors involving SVG use elements. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
6) Type conversion (CVE-ID: CVE-2011-3036)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 17.0.963.65 does not properly perform a cast of an unspecified variable during handling of line boxes, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document.
7) Type conversion (CVE-ID: CVE-2011-3037)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 17.0.963.65 does not properly perform casts of unspecified variables during the splitting of anonymous blocks, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document.
8) Use-after-free (CVE-ID: CVE-2011-3038)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to multi-column handling. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
9) Use-after-free (CVE-ID: CVE-2011-3039)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to quote handling. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
10) Out-of-bounds read (CVE-ID: CVE-2011-3040)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Google Chrome before 17.0.963.65 does not properly handle text, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted document.
11) Use-after-free (CVE-ID: CVE-2011-3041)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to the handling of class attributes. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
12) Use-after-free (CVE-ID: CVE-2011-3042)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to the handling of table sections. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
13) Use-after-free (CVE-ID: CVE-2011-3043)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors involving a flexbox (aka flexible box) in conjunction with the floating of elements. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
14) Use-after-free (CVE-ID: CVE-2011-3044)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors involving SVG animation elements. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
Remediation
Install update from vendor's website.
References
- http://code.google.com/p/chromium/issues/detail?id=105867
- http://googlechromereleases.blogspot.com/2012/03/chrome-stable-update.html
- http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00012.html
- http://secunia.com/advisories/48265
- http://secunia.com/advisories/48419
- http://secunia.com/advisories/48527
- http://security.gentoo.org/glsa/glsa-201203-19.xml
- http://www.securityfocus.com/bid/52271
- http://www.securitytracker.com/id?1026759
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73642
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14967
- http://code.google.com/p/chromium/issues/detail?id=108037
- http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://support.apple.com/kb/HT5400
- http://support.apple.com/kb/HT5485
- http://support.apple.com/kb/HT5503
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73643
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14438
- http://code.google.com/p/chromium/issues/detail?id=108406
- http://code.google.com/p/chromium/issues/detail?id=115471
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15094
- http://code.google.com/p/chromium/issues/detail?id=111748
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73645
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14839
- http://code.google.com/p/chromium/issues/detail?id=112212
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73646
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15097
- http://code.google.com/p/chromium/issues/detail?id=113258
- http://osvdb.org/79795
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73647
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15072
- http://code.google.com/p/chromium/issues/detail?id=113439
- http://code.google.com/p/chromium/issues/detail?id=114924
- http://code.google.com/p/chromium/issues/detail?id=115028
- http://osvdb.org/79796
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73648
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14397
- http://code.google.com/p/chromium/issues/detail?id=113497
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73649
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15106
- http://code.google.com/p/chromium/issues/detail?id=113707
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73650
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14904
- http://code.google.com/p/chromium/issues/detail?id=114054
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73651
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14996
- http://code.google.com/p/chromium/issues/detail?id=114068
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73652
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14923
- http://code.google.com/p/chromium/issues/detail?id=114219
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73653
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14989
- http://code.google.com/p/chromium/issues/detail?id=115681
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73654
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15077
- http://code.google.com/p/chromium/issues/detail?id=116093
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73655
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14830