Kaspersky ID:
KLA10745
Detect Date:
01/20/2016
Updated:
01/22/2024

Description

Multiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to spoof user interface, cause denial of service or execute arbitrary code.

Below is a complete list of vulnerabilities

  1. Multiple unspecified vulnerabilities at HarfBuzz and V8 can be exploited to cause denial of service;
  2. Multiple integer overflows at PDFium can be exploited via a specially designed PDF to cause denial of service;
  3. Lack of random numbers generator enforcement at Blink can be exploited remotely to bypass security restrictions;
  4. Lack of http and ws policies enforcement at Blink can be exploited remotely to obtain sensitive information;
  5. An unknown vulnerability can be exploited remotely via vectors related to buttons to spoof user interface;
  6. An unknown vulnerability at Omnibox can be exploited remotely to spoof user interface;
  7. Improper initialization at Blink can be exploited remotely via a specially designed web site to obtain sensitive information;
  8. Multiple use-after-free vulnerabilities at PDFium can be exploited remotely via a specially designed PDF to cause denial of service;
  9. Lack of compatibility check at V8 can be exploited remotely via a specially designed JavaScript to cause denial of service.

Technical details

Vulnerability (2) related to sycc422_to_rgb and sycc444_to_rgb functions in fxcodec/codec/fx_codec_jpx_opj.cpp.

Vulnerability (3) related to Blink version which does not ensure that cryptographicallyRandomValues is used. Exploitation of this vulnerability can lead to defeat cryptographic protection.

Vulnerability (4) related to CSPSource::schemeMatches function in WebKit/Source/core/frame/csp/CSPSource.cpp in the Content Security Policy (CSP) implementation which does not apply http policies to HTTPS URLs and does not apply ws polivies to WSS URLs. Exploitation of this vulnerability can lead to disclosure of information about specific HSTS sites visits. This vulnerability can be exploited via reading CSP report.

Vulnerability (5) related to CustomButton::AcceleratorPressed function in ui/views/controls/button/custom_button.cc and can be triggered via unknown vectors related to unfocused custom button.

By exploiting vulnerability (6) malicious can spoof document’s origin.

Vulnerability (7) related to UnacceleratedImageBufferSurface class in WebKit/Source/platform/graphics/UnacceleratedImageBufferSurface.cpp. By exploiting this vulnerability malicious can obtain sensitive information from process memory.

Vulnerability (8) related to improper tracking of the destruction of IPWL_FocusHandler and IPWL_Provider objects.

Vulnerability (9) related toLoadIC::UpdateCaches function in ic/ic.cc which does not ensure receiver compatibility.

Original advisories

Related products

CVE list

  • CVE-2016-2051
    high
  • CVE-2016-1620
    critical
  • CVE-2016-1619
    high
  • CVE-2016-1618
    warning
  • CVE-2016-1617
    warning
  • CVE-2016-1616
    warning
  • CVE-2016-1615
    warning
  • CVE-2016-1614
    warning
  • CVE-2016-1613
    high
  • CVE-2016-1612
    high
  • CVE-2016-2052
    high

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.