Beschreibung
Multiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, obtain sensitive information, spoof user interface, bypass security restrictions and possibly to execute arbitrary code.
Below is a complete list of vulnerabilities:
- Out of bounds write in QUIC can be exploited remotely possibly to bypass security restrictions;
- Heap buffer overflow in PDFium can be exploited remotely possibly to execute arbitrary code;
- Out of bounds write in Skia can be exploited remotely possibly to execute arbitrary code;
- Use after free in PDFium can be exploited remotely possibly to execute arbitrary code;
- Use after free in libXML can be exploited remotely possibly to execute arbitrary code;
- Type confusion in WebAssembly can be exploited remotely possibly to bypass security restrictions, execute arbitrary code and obtain sensitive information;
- Pointer information disclosure in IPC call can be exploited remotely possibly to obtain sensitive information;
- Out of bounds read in Blink can be exploited remotely possibly to obtain sensitive information;
- Cross origin information disclosure in Skia can be exploited remotely possibly to obtain sensitive information;
- Use of uninitialized value in Skia can be exploited remotely possibly to bypass security restrictions and disclose sensitive information;
- Cross origin leak of redirect URL in Blink can be exploited remotely possibly to obtain sensitive information;
- URL spoofing in Omniboxcan can be exploited remotely possibly to spoof user interface;
- Integer overflow in ICU can be exploited remotely possibly to cause denial of service;
- Issue with SPAKE implementation in BoringSSL can be exploited remotely possibly to obtain sensitive information;
- Insufficient blocking of JavaScript in Omnibox can be exploited remotely possibly to perform a cross-site scripting (XSS) attack;
Technical details
NB: At this moment Google has just reserved CVE numbers for these vulnerabilities. Information can be changed soon.
Ursprüngliche Informationshinweise
CVE Liste
- CVE-2017-15422 critical
- CVE-2017-15423 critical
- CVE-2017-15424 critical
- CVE-2017-15425 critical
- CVE-2017-15426 critical
- CVE-2017-15427 critical
- CVE-2017-15407 critical
- CVE-2017-15408 critical
- CVE-2017-15409 critical
- CVE-2017-15410 critical
- CVE-2017-15411 critical
- CVE-2017-15412 critical
- CVE-2017-15413 critical
- CVE-2017-15415 critical
- CVE-2017-15416 critical
- CVE-2017-15417 critical
- CVE-2017-15418 critical
- CVE-2017-15419 critical
- CVE-2017-15420 critical
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!