Beschreibung
Multiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions, spoof user interface, gain privileges, write local files and obtain sensitive information.
Below is a complete list of vulnerabilities:
- A stack buffer overflow vulnerability in Skia can be exploited remotely to execute arbitrary code and cause denial of service;
- Multiple heap buffer overflow vulnerabilities in WebGL can be exploited remotely to execute arbitrary code and cause denial of service;
- A use after free vulnerability in WebRTC can be exploited remotely to execute arbitrary code;
- A heap buffer overflow vulnerability in WebRTC can be exploited remotely to execute arbitrary code and cause denial of service;
- A use after free vulnerability in Blink can be exploited remotely to execute arbitrary code;
- Multiple same origin policy bypass vulnerabilities in ServiceWorker can be exploited remotely to bypass security restrictions;
- A same origin policy bypass vulnerability in WebAudio can be exploited remotely to bypass security restrictions;
- Multiple URL spoof vulnerabilities in Omnibox can be exploited remotely to spoof user interface;
- A CORS bypass vulnerabilities in Blink can be exploited remotely to bypass security restrictions;
- A permission bypass vulnerability in extension installation can be exploited remotely to bypass security restrictions;
- A type confusion vulnerability in PDFium can be exploited remotely to execute arbitrary code;
- A use after free vulnerability in WebBluetooth can be exploited remotely to execute arbitrary code;
- A integer overflow vulnerability in SwiftShader can be exploited remotely to cause denial of service;
- An unspecified vulnerability in Extensions can be exploited remotely to gain privileges;
- Multiple cross origin information leak vulnerabilities in Blink can be exploited remotely to obtain sensitive information;
- A UI spoof vulnerability in Extensions can be exploited remotely to spoof user interface;
- A local file information leak vulnerability in Extensions can be exploited remotely to obtain sensitive information;
- A request privilege escalation vulnerability in Extensions can be exploited remotely to gain privileges;
- A cross origin information disclosure in Service Workers can be exploited remotely to obtain sensitive information;
- A local file write in DevTools can be exploited locally to write local files.
Ursprüngliche Informationshinweise
CVE Liste
- CVE-2018-4117 critical
- CVE-2018-6169 critical
- CVE-2018-6170 critical
- CVE-2018-6171 critical
- CVE-2018-6172 critical
- CVE-2018-6173 critical
- CVE-2018-6174 critical
- CVE-2018-6175 critical
- CVE-2018-6176 critical
- CVE-2018-6177 critical
- CVE-2018-6178 critical
- CVE-2018-6179 critical
- CVE-2018-6044 critical
- CVE-2018-6150 critical
- CVE-2018-6151 critical
- CVE-2018-6152 critical
- CVE-2018-6153 critical
- CVE-2018-6154 critical
- CVE-2018-6155 critical
- CVE-2018-6156 critical
- CVE-2018-6157 critical
- CVE-2018-6158 critical
- CVE-2018-6159 critical
- CVE-2018-6161 critical
- CVE-2018-6162 critical
- CVE-2018-6163 critical
- CVE-2018-6164 critical
- CVE-2018-6165 critical
- CVE-2018-6166 critical
- CVE-2018-6167 critical
- CVE-2018-6168 critical
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!