KLA10585
Multiple vulnerabilities in Google Chrome

Updated: 06/18/2020
Detect date
?
05/19/2015
Severity
?
Critical
Description

Multiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to bypass security restrictions, spoof user interface, conduct cross-scripting attack, cause denial of service or execute arbitrary code.

Below is a complete list of vulnerabilities

  1. An unknown vulnerability can be exploited remotely via vectors related to sandbox, DOM, Editing, URL bar;
  2. Use-after-free vulnerability can be exploited remotely via vectors related to WebAudio, SVG, WebRTC and Speech;
  3. Container-overflow can be exploited remotely via vectors related to SVG;
  4. Negative-size parameter can be exploited remotely via vectors related to Libvpx;
  5. Uninitialized value can be exploited remotely via vectors related to PDFium and Blink;
  6. Insecure download can be exploited remotely via vectors related to spellcheck dictionary;
  7. XSS vulnerability can be exploited remotely via vectors related to bookmarks.
Affected products

Google Chrome versions earlier than 43.0.2357.65

Solution

Update to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk.
Get Google Chrome

Original advisories

Google blog

Impacts
?
ACE 
[?]

DoS 
[?]

SB 
[?]

XSS/CSS 
[?]

SUI 
[?]
Related products
Google Chrome
CVE-IDS
?
CVE-2015-12587.5Critical
CVE-2015-12597.5Critical
CVE-2015-12657.5Critical
CVE-2015-12516.8High
CVE-2015-12627.5Critical
CVE-2015-12644.3Warning
CVE-2015-12527.5Critical
CVE-2015-39107.5Critical
CVE-2015-12634.3Warning
CVE-2015-12607.5Critical
CVE-2015-12615.0Critical
CVE-2015-12556.8High
CVE-2015-12577.5Critical
CVE-2015-12567.5Critical
CVE-2015-12545.0Critical
CVE-2015-12537.5Critical
Exploitation

The following public exploits exists for this vulnerability:

https://www.exploit-db.com/exploits/37766

Find out the statistics of the vulnerabilities spreading in your region