DIESER SERVICE KANN ÜBERSETZUNGEN VON GOOGLE ENTHALTEN. GOOGLE ÜBERNIMMT KEINERLEI VERANTWORTUNG FÜR DIE ÜBERSETZUNGEN. DARUNTER FÄLLT JEGLICHE VERANTWORTUNG IN BEZUG AUF RICHTIGKEIT UND ZUVERLÄSSIGKEIT SOWIE JEGLICHE STILLSCHWEIGENDEN GEWÄHRLEISTUNGEN DER MARKTGÄNGIGKEIT, NICHT-VERLETZUNG VON RECHTEN DRITTER ODER DER EIGNUNG FÜR EINEN BESTIMMTEN ZWECK.

Die Website von Kaspersky Lab wurde für Ihre Bequemlichkeit mithilfe einer Übersetzungssoftware von Google Translate übersetzt. Es wurden angemessene Bemühungen für die Bereitstellung einer akkuraten Übersetzung unternommen. Bitte beachten Sie, dass automatisierte Übersetzungen nicht perfekt sind und menschliche Übersetzer in keinem Fall ersetzen sollen. Übersetzungen werden den Nutzern der Kaspersky-Lab-Website als Service und "wie sie sind" zur Verfügung gestellt. Die Richtigkeit, Zuverlässigkeit oder Korrektheit jeglicher Übersetzungen aus dem Englischen in eine andere Sprache wird weder ausdrücklich noch stillschweigend garantiert. Einige Inhalte (z. B. Bilder, Videos, Flash, usw.) können aufgrund der Einschränkungen der Übersetzungssoftware möglicherweise nicht inhaltsgetreu übersetzt werden.

KLA11117
Multiple vulnerabilities in Google Chrome
Aktualisiert: 03/29/2019
Erkennungsdatum
?
10/17/2017
Schweregrad
?
Hoch
Beschreibung

Multiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to cause a denial of service, bypass security restrictions, to spoof user interface, execute arbitrary code and perform cross-site scripting attack.

Below is a complete list of vulnerabilities:

  1. An unspecified vulnerability in the WebAssembly component can be exploited remotely by an unauthenticated attacker possibly to execute arbitrary code;
  2. Unspecified vulnerabilities in the Skia component can be exploited remotely by unauthenticated attacker possibly to cause denial of service;
  3. An unspecified vulnerability in LibXML2 can be exploited remotely by an unauthenticated attacker possibly to execute arbitrary code;
  4. An unspecified vulnerability in the WebAudio component can be exploited remotely by an unauthenticated attacker possibly to execute arbitrary code;
  5. An unspecified vulnerability in the WebGL component can be exploited remotely by an unauthenticated attacker possibly to execute arbitrary code;
  6. Unspecified vulnerabilities in the PDFium component can be exploited remotely by unauthenticated attacker possibly to execute arbitrary code;
  7. An unspecified vulnerability in the Skia component can be exploited remotely by unauthenticated attacker possibly to execute arbitrary code;
  8. A vulnerability in Google Chrome and Chromium can be exploited remotely by unauthenticated attacker possibly to perform a universal cross-site scripting attack;
  9. An unspecified vulnerability in the ImageCapture component can be exploited remotely by unauthenticated attacker possibly to cause denial of service;
  10. An unspecified vulnerability in Extention UI can be exploited remotely by unauthenticated attacker possibly to spoof user interface;
  11. An unspecified vulnerability in the DevTools component can be exploited remotely by unauthenticated attacker possibly to spoof user interface;
  12. An unspecified vulnerability in PlatformIntegration can be exploited remotely by unauthenticated attacker possibly to spoof user interface;
  13. An unspecified vulnerability in extensions can be exploited remotely by unauthenticated attacker possibly to bypass security restrictions;
  14. Unspecified vulnerabilities in Omnibox can be exploited remotely by unauthenticated attacker possibly to spoof user interface;
  15. An unspecified vulnerability in the Skia component can be exploited remotely by unauthenticated attacker possibly to cause denial of service;
  16. A vulnerability in Google Chrome and Chromium can be exploited remotely by unauthenticated attacker possibly to bypass security restrictions;
  17. An unspecified vulnerability in the Blink component can be exploited remotely by unauthenticated attacker possibly to spoof user interface;

Technical details

NB: This vulnerability does not have any public CVSS rating, so rating can be changed by the time.

NB: At this moment Google has just reserved CVE numbers for these vulnerabilities. Information can be changed soon.

Beeinträchtigte Produkte

Google Chrome versions earlier than 62.0.3202.62

Lösung

Update to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk.
Download Google Chrome

Ursprüngliche Informationshinweise

Stable Channel Update for Desktop

Folgen
?
ACE 
[?]

DoS 
[?]

SB 
[?]

XSS/CSS 
[?]

SUI 
[?]
CVE-IDS
?

Link zum Original