SB2012040602 - Multiple vulnerabilities in Techland Chrome
Published: April 6, 2012 Updated: August 11, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 12 secuirty vulnerabilities.
1) Use-after-free (CVE-ID: CVE-2011-3076)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to focus handling. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
2) Use-after-free (CVE-ID: CVE-2011-3077)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors involving the script bindings, related to a "read-after-free" issue. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
3) Out-of-bounds read (CVE-ID: CVE-2011-3066)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Skia, as used in Google Chrome before 18.0.1025.151, does not properly perform clipping, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
4) Origin validation error (CVE-ID: CVE-2011-3067)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 18.0.1025.151 allows remote attackers to bypass the Same Origin Policy via vectors related to replacement of IFRAME elements.
5) Use-after-free (CVE-ID: CVE-2011-3068)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to run-in boxes. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
6) Use-after-free (CVE-ID: CVE-2011-3069)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to line boxes. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
7) Use-after-free (CVE-ID: CVE-2011-3070)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to the Google V8 bindings. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
8) Use-after-free (CVE-ID: CVE-2011-3071)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing unknown vectors. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
9) Origin validation error (CVE-ID: CVE-2011-3072)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 18.0.1025.151 allows remote attackers to bypass the Same Origin Policy via vectors related to pop-up windows.
10) Use-after-free (CVE-ID: CVE-2011-3073)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to the handling of SVG resources. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
11) Use-after-free (CVE-ID: CVE-2011-3074)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to the handling of media. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
12) Use-after-free (CVE-ID: CVE-2011-3075)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to style-application commands. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
Remediation
Install update from vendor's website.
References
- http://code.google.com/p/chromium/issues/detail?id=120037
- http://googlechromereleases.blogspot.com/2012/04/stable-and-beta-channel-updates.html
- http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://secunia.com/advisories/48732
- http://secunia.com/advisories/48749
- http://security.gentoo.org/glsa/glsa-201204-03.xml
- http://support.apple.com/kb/HT5400
- http://support.apple.com/kb/HT5485
- http://support.apple.com/kb/HT5503
- http://www.securityfocus.com/bid/52913
- http://www.securitytracker.com/id?1026892
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74636
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15172
- http://code.google.com/p/chromium/issues/detail?id=120189
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74637
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15343
- http://code.google.com/p/chromium/issues/detail?id=106577
- http://osvdb.org/81036
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74626
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15453
- http://code.google.com/p/chromium/issues/detail?id=117583
- http://osvdb.org/81037
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74627
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15342
- http://code.google.com/p/chromium/issues/detail?id=117698
- http://osvdb.org/81038
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74628
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15285
- http://code.google.com/p/chromium/issues/detail?id=117728
- http://osvdb.org/81039
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74629
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15310
- http://code.google.com/p/chromium/issues/detail?id=118185
- http://osvdb.org/81040
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74630
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15521
- http://code.google.com/p/chromium/issues/detail?id=118273
- http://osvdb.org/81041
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74631
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15317
- http://code.google.com/p/chromium/issues/detail?id=118467
- http://osvdb.org/81042
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74632
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15480
- http://code.google.com/p/chromium/issues/detail?id=118593
- http://osvdb.org/81043
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74633
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14576
- http://code.google.com/p/chromium/issues/detail?id=119281
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74634
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15513
- http://code.google.com/p/chromium/issues/detail?id=119525
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74635
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15141