Beschreibung
Multiple serious vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, cause denial of service and obtain sensitive information.
Below is a complete list of vulnerabilities:
- A sandbox escape vulnerability in AppCache can be exploited remotely to execute arbitrary code;
- An unspecified vulnerability in V8 can be exploited remotely to execute arbitrary code;
- Multiple URL spoof vulnerabilities in Omnibox can be exploited remotely to spoof user interface;
- An use-after-free vulnerability in V8 can be exploited remotely to cause denial of service and possibly to execute arbitrary code;
- A memory corruption vulnerability in Angle can be exploited remotely to cause denial of service and possibly to obtain sensitive information and execute arbitrary code;
- A cross-origin URL disclosure vulnerability in Blink can be exploited remotely to obtain sensitive information;
- Multiple heap buffer overflow vulnerabilities in PDFium can be exploited remotely to cause denial of service and possibly to execute arbitrary code;
- A memory corruption vulnerability in GPU internals can be exploited remotely to cause denial of service and possibly to obtain sensitive information and execute arbitrary code;
- Multiple security UI occlusions in full screen mode can be exploited locally to cause denial of service;
- An use-after-free vulnerability in Blunk can be exploited remotely to cause denial of service and possibly to execute arbitrary code;
- A lack of limits on update() in ServiceWorker can be exploited remotely to cause denial of service;
- An UI spoof vulnerability in Extentions can be exploited remotely to spoof user interface.
Ursprüngliche Informationshinweise
Betroffene Produkte
CVE Liste
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!