Description
Multiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to spoof user interface, cause denial of service or execute arbitrary code.
Below is a complete list of vulnerabilities
- Multiple unspecified vulnerabilities at HarfBuzz and V8 can be exploited to cause denial of service;
- Multiple integer overflows at PDFium can be exploited via a specially designed PDF to cause denial of service;
- Lack of random numbers generator enforcement at Blink can be exploited remotely to bypass security restrictions;
- Lack of http and ws policies enforcement at Blink can be exploited remotely to obtain sensitive information;
- An unknown vulnerability can be exploited remotely via vectors related to buttons to spoof user interface;
- An unknown vulnerability at Omnibox can be exploited remotely to spoof user interface;
- Improper initialization at Blink can be exploited remotely via a specially designed web site to obtain sensitive information;
- Multiple use-after-free vulnerabilities at PDFium can be exploited remotely via a specially designed PDF to cause denial of service;
- Lack of compatibility check at V8 can be exploited remotely via a specially designed JavaScript to cause denial of service.
Technical details
Vulnerability (2) related to sycc422_to_rgb and sycc444_to_rgb functions in fxcodec/codec/fx_codec_jpx_opj.cpp.
Vulnerability (3) related to Blink version which does not ensure that cryptographicallyRandomValues is used. Exploitation of this vulnerability can lead to defeat cryptographic protection.
Vulnerability (4) related to CSPSource::schemeMatches function in WebKit/Source/core/frame/csp/CSPSource.cpp in the Content Security Policy (CSP) implementation which does not apply http policies to HTTPS URLs and does not apply ws polivies to WSS URLs. Exploitation of this vulnerability can lead to disclosure of information about specific HSTS sites visits. This vulnerability can be exploited via reading CSP report.
Vulnerability (5) related to CustomButton::AcceleratorPressed function in ui/views/controls/button/custom_button.cc and can be triggered via unknown vectors related to unfocused custom button.
By exploiting vulnerability (6) malicious can spoof document’s origin.
Vulnerability (7) related to UnacceleratedImageBufferSurface class in WebKit/Source/platform/graphics/UnacceleratedImageBufferSurface.cpp. By exploiting this vulnerability malicious can obtain sensitive information from process memory.
Vulnerability (8) related to improper tracking of the destruction of IPWL_FocusHandler and IPWL_Provider objects.
Vulnerability (9) related toLoadIC::UpdateCaches function in ic/ic.cc which does not ensure receiver compatibility.
Original advisories
Related products
CVE list
- CVE-2016-2051 high
- CVE-2016-1620 critical
- CVE-2016-1619 high
- CVE-2016-1618 warning
- CVE-2016-1617 warning
- CVE-2016-1616 warning
- CVE-2016-1615 warning
- CVE-2016-1614 warning
- CVE-2016-1613 high
- CVE-2016-1612 high
- CVE-2016-2052 high
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com