Description
Multiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to bypass security restrictions, execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities:
- A use-after-free vulnerability in PDFium can be exploited remotely possibly to execute arbitrary code;
- A Heap buffer overflow vulnerability in WebGL can be exploited remotely possibly to execute arbitrary code;
- A Heap buffer overflow vulnerability in Skia can be exploited remotely possibly to execute arbitrary code;
- An unspecified vulnerability in PDFium’s memory lifecycle can be exploited remotely possibly to execute arbitrary code;
- Multiple type-confusion vulnerabilities in V8 component can be exploited remotely possibly to execute arbitrary code;
- Multiple unspecified vulnerabilities in Skia component can be exploited remotely possibly to obtain sensitive information or execute arbitrary code;
- An unspecified vulnerability in Blink component can be exploited remotely to bypass security restrictions;
- A vulnerability related to redirect navigation to can be exploited remotely to bypass security restrictions.
Technical details
Vulnerabilities (6) exist because uninitialized value is used.
Exploiting vulnerability (8) can potentially lead to downgrading an HTTPS-secured connection during a redirect navigation.
NB: This vulnerability does not have any public CVSS rating, so rating can be changed by the time.
Original advisories
Exploitation
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
CVE list
- CVE-2017-5111 critical
- CVE-2017-5112 critical
- CVE-2017-5113 critical
- CVE-2017-5114 critical
- CVE-2017-5115 critical
- CVE-2017-5116 critical
- CVE-2017-5117 high
- CVE-2017-5118 warning
- CVE-2017-5119 warning
- CVE-2017-5120 high
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com