SB2013052201 - Multiple vulnerabilities in Techland Chrome
Published: May 22, 2013 Updated: May 9, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 12 secuirty vulnerabilities.
1) Use-after-free (CVE-ID: CVE-2013-2840)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing unknown vectors, a different vulnerability than CVE-2013-2846. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
2) Use-after-free (CVE-ID: CVE-2013-2841)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to the handling of Pepper resources. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
3) Use-after-free (CVE-ID: CVE-2013-2843)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to the handling of speech data. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
4) Use-after-free (CVE-ID: CVE-2013-2844)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to style resolution. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
5) Buffer overflow (CVE-ID: CVE-2013-2845)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The Web Audio implementation in Google Chrome before 27.0.1453.93 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
6) Use-after-free (CVE-ID: CVE-2013-2846)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing unknown vectors, a different vulnerability than CVE-2013-2840. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
7) Use-after-free (CVE-ID: CVE-2013-2847)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing unknown vectors. A remote attackers can cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
8) Cross-site scripting (CVE-ID: CVE-2013-2848)
The vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data when processing data passed via unspecified vectors. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
9) Cross-site scripting (CVE-ID: CVE-2013-2849)
The vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data when processing data passed via vectors involving a (1) drag-and-drop or (2) copy-and-paste operation. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
10) Input validation error (CVE-ID: CVE-2013-2836)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Multiple unspecified vulnerabilities in Google Chrome before 27.0.1453.93 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
11) Use-after-free (CVE-ID: CVE-2013-2837)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing unknown vectors. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
12) Resource management error (CVE-ID: CVE-2013-2839)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 27.0.1453.93 does not properly perform a cast of an unspecified variable during handling of clipboard data, which allows remote attackers to cause a denial of service or possibly have other impact via unknown vectors.
Remediation
Install update from vendor's website.
References
- http://googlechromereleases.blogspot.com/2013/05/stable-channel-release.html
- http://www.debian.org/security/2013/dsa-2695
- https://code.google.com/p/chromium/issues/detail?id=230117
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16706
- https://code.google.com/p/chromium/issues/detail?id=227350
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16534
- https://code.google.com/p/chromium/issues/detail?id=222000
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16547
- https://code.google.com/p/chromium/issues/detail?id=196393
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16624
- https://code.google.com/p/chromium/issues/detail?id=179522
- https://code.google.com/p/chromium/issues/detail?id=188092
- https://code.google.com/p/chromium/issues/detail?id=222136
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16354
- https://code.google.com/p/chromium/issues/detail?id=177620
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15805
- https://code.google.com/p/chromium/issues/detail?id=176692
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16716
- http://lists.apple.com/archives/security-announce/2013/Oct/msg00003.html
- http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html
- http://secunia.com/advisories/54886
- http://support.apple.com/kb/HT5934
- https://code.google.com/p/chromium/issues/detail?id=176137
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15849
- https://code.google.com/p/chromium/issues/detail?id=171392
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16753
- https://code.google.com/p/chromium/issues/detail?id=162896
- https://code.google.com/p/chromium/issues/detail?id=168050
- https://code.google.com/p/chromium/issues/detail?id=170715
- https://code.google.com/p/chromium/issues/detail?id=173397
- https://code.google.com/p/chromium/issues/detail?id=173672
- https://code.google.com/p/chromium/issues/detail?id=174920
- https://code.google.com/p/chromium/issues/detail?id=176719
- https://code.google.com/p/chromium/issues/detail?id=177815
- https://code.google.com/p/chromium/issues/detail?id=178130
- https://code.google.com/p/chromium/issues/detail?id=178269
- https://code.google.com/p/chromium/issues/detail?id=178581
- https://code.google.com/p/chromium/issues/detail?id=178761
- https://code.google.com/p/chromium/issues/detail?id=179580
- https://code.google.com/p/chromium/issues/detail?id=180058
- https://code.google.com/p/chromium/issues/detail?id=180920
- https://code.google.com/p/chromium/issues/detail?id=181375
- https://code.google.com/p/chromium/issues/detail?id=181438
- https://code.google.com/p/chromium/issues/detail?id=196571
- https://code.google.com/p/chromium/issues/detail?id=196575
- https://code.google.com/p/chromium/issues/detail?id=196648
- https://code.google.com/p/chromium/issues/detail?id=222036
- https://code.google.com/p/chromium/issues/detail?id=222754
- https://code.google.com/p/chromium/issues/detail?id=222770
- https://code.google.com/p/chromium/issues/detail?id=223034
- https://code.google.com/p/chromium/issues/detail?id=223125
- https://code.google.com/p/chromium/issues/detail?id=223145
- https://code.google.com/p/chromium/issues/detail?id=224920
- https://code.google.com/p/chromium/issues/detail?id=225403
- https://code.google.com/p/chromium/issues/detail?id=225979
- https://code.google.com/p/chromium/issues/detail?id=226012
- https://code.google.com/p/chromium/issues/detail?id=226090
- https://code.google.com/p/chromium/issues/detail?id=226659
- https://code.google.com/p/chromium/issues/detail?id=227390
- https://code.google.com/p/chromium/issues/detail?id=229402
- https://code.google.com/p/chromium/issues/detail?id=231725
- https://code.google.com/p/chromium/issues/detail?id=232389
- https://code.google.com/p/chromium/issues/detail?id=232532
- https://code.google.com/p/chromium/issues/detail?id=232865
- https://code.google.com/p/chromium/issues/detail?id=236631
- https://code.google.com/p/chromium/issues/detail?id=241595
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16609
- https://code.google.com/p/chromium/issues/detail?id=235638
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16250
- https://code.google.com/p/chromium/issues/detail?id=230176
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16760