Kaspersky ID:
KLA12009
Erkennungsdatum:
11/17/2020
Aktualisiert:
02/08/2026

Beschreibung

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, cause denial of service, bypass security restrictions, spoof user interface.

Below is a complete list of vulnerabilities:

  1. An information disclosure vulnerability in Adobe Flash can be exploited to obtain sensitive information.
  2. A use after free vulnerability in WebCodecs can be exploited to execute arbitrary code or cause denial of service.
  3. An implementation vulnerability in cookies can be exploited to cause denial of service.
  4. A side-channel information leakage vulnerability in graphics component can be exploited to obtain sensitive information.
  5. A policy enforcement vulnerability in developer tools can be exploited to bypass security restrictions.
  6. An implementation vulnerability in filesystem component can be exploited to cause denial of service.
  7. A heap buffer overflow vulnerability in WebRTC can be exploited to cause denial of service.
  8. A use after free vulnerability in WebRTC can be exploited to execute arbitrary code or cause denial of service.
  9. An implementation vulnerability in WebRTC can be exploited to cause denial of service.
  10. A security UI vulnerability in tab preview component can be exploited to spoof user interface.
  11. A security UI vulnerability in WebUSB can be exploited to spoof user interface.
  12. A race condition vulnerability in ImageBurner can be exploited to cause denial of service.
  13. A use after free vulnerability in PPAPI can be exploited to execute arbitrary code or cause denial of service.
  14. A data validation vulnerability in cros-disks can be exploited to cause denial of service or bypass security restrictions.
  15. A data validation vulnerability in Blink can be exploited to cause denial of service or obtain sensitive information.
  16. An implementation vulnerability in cryptohome component can be exploited to cause denial of service.
  17. A data validation vulnerability in WASM can be exploited to cause denial of service or bypass security restrictions.
  18. A heap buffer overflow vulnerability in UI can be exploited to cause denial of service or spoof user interface.
  19. An implementation vulnerability in PDFium can be exploited to cause denial of service.
  20. A use after free vulnerability in payments component can be exploited to execute arbitrary code or cause denial of service.
  21. A heap buffer overflow vulnerability in clipboard can be exploited to cause denial of service.
  22. A security UI vulnerability in sharing component can be exploited to spoof user interface.
  23. A policy enforcement vulnerability in networking component can be exploited to bypass security restrictions.
  24.  

Ursprüngliche Informationshinweise

Ausnutzung

Public exploits exist for this vulnerability.

Betroffene Produkte

CVE Liste

  • CVE-2019-8075
    critical
  • CVE-2020-16023
    critical
  • CVE-2020-16036
    high
  • CVE-2020-16012
    warning
  • CVE-2020-16027
    high
  • CVE-2020-16019
    critical
  • CVE-2020-16028
    critical
  • CVE-2020-16026
    critical
  • CVE-2020-16034
    warning
  • CVE-2020-16031
    warning
  • CVE-2020-16033
    warning
  • CVE-2020-16021
    critical
  • CVE-2020-16014
    critical
  • CVE-2020-16035
    critical
  • CVE-2020-16030
    high
  • CVE-2020-16020
    critical
  • CVE-2020-16015
    critical
  • CVE-2020-16024
    critical
  • CVE-2020-16029
    critical
  • CVE-2020-16018
    critical
  • CVE-2020-16025
    critical
  • CVE-2020-16032
    warning
  • CVE-2020-16022
    critical
  • CVE-2020-16045
    critical

Mehr erfahren

Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com

Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!
Kaspersky Next
Let´s go Next: Cybersicherheit neu gedacht
Erfahren Sie mehr
Neu: Kaspersky!
Dein digitales Leben verdient umfassenden Schutz!
Erfahren Sie mehr
Do you want to save your changes?
Your message has been sent successfully.