Description
Multiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, obtain sensitive information, spoof user interface, bypass security restrictions and possibly to execute arbitrary code.
Below is a complete list of vulnerabilities:
- Out of bounds write in QUIC can be exploited remotely possibly to bypass security restrictions;
- Heap buffer overflow in PDFium can be exploited remotely possibly to execute arbitrary code;
- Out of bounds write in Skia can be exploited remotely possibly to execute arbitrary code;
- Use after free in PDFium can be exploited remotely possibly to execute arbitrary code;
- Use after free in libXML can be exploited remotely possibly to execute arbitrary code;
- Type confusion in WebAssembly can be exploited remotely possibly to bypass security restrictions, execute arbitrary code and obtain sensitive information;
- Pointer information disclosure in IPC call can be exploited remotely possibly to obtain sensitive information;
- Out of bounds read in Blink can be exploited remotely possibly to obtain sensitive information;
- Cross origin information disclosure in Skia can be exploited remotely possibly to obtain sensitive information;
- Use of uninitialized value in Skia can be exploited remotely possibly to bypass security restrictions and disclose sensitive information;
- Cross origin leak of redirect URL in Blink can be exploited remotely possibly to obtain sensitive information;
- URL spoofing in Omniboxcan can be exploited remotely possibly to spoof user interface;
- Integer overflow in ICU can be exploited remotely possibly to cause denial of service;
- Issue with SPAKE implementation in BoringSSL can be exploited remotely possibly to obtain sensitive information;
- Insufficient blocking of JavaScript in Omnibox can be exploited remotely possibly to perform a cross-site scripting (XSS) attack;
Technical details
NB: At this moment Google has just reserved CVE numbers for these vulnerabilities. Information can be changed soon.
Original advisories
Exploitation
Public exploits exist for this vulnerability.
Related products
CVE list
- CVE-2017-15422 high
- CVE-2017-15423 high
- CVE-2017-15424 high
- CVE-2017-15425 high
- CVE-2017-15426 high
- CVE-2017-15427 high
- CVE-2017-15407 critical
- CVE-2017-15408 critical
- CVE-2017-15409 critical
- CVE-2017-15410 critical
- CVE-2017-15411 critical
- CVE-2017-15412 critical
- CVE-2017-15413 critical
- CVE-2017-15415 high
- CVE-2017-15416 high
- CVE-2017-15417 high
- CVE-2017-15418 warning
- CVE-2017-15419 high
- CVE-2017-15420 high
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!