Kaspersky ID:
KLA11232
Detect Date:
04/17/2018
Updated:
01/28/2026

Description

Multiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to bypass security restrictions, obtain sensitive information, cause denial of service, spoof user interface, gain privileges, execute arbitrary code and perform unspecified attacks.

Below is a complete list of vulnerabilities:

  1. Multiple use-after-free vulnerabilities in Disk Cache can be exploited remotely possibly to execute arbitrary code;
  2. An use-after-free vulnerability in WebAssembly can be exploited remotely possibly to execute arbitrary code;
  3. An use-after-free vulnerability in PDFium can be exploited remotely possibly to execute arbitrary code;
  4. Multiple same origin bypass vulnerabilities in Service Worker can be exploited remotely to bypass security restrictions;
  5. A heap buffer overflow vulnerability in Skia can be exploited remotely to cause denial of service;
  6. An incorrect handling of plug-ins by Service Worker can be exploited remotely to perform unspecified attack;
  7. An integer overflow in WebAssembly can be exploited remotely to cause denial of service;
  8. An exploit hardening regression vulnerability in Oilpan can be exploited remotely to perform unspecified attacks;
  9. A lack of meaningful user interaction requirement before file upload can be exploited remotely to obtain sensitive information;
  10. Multiple fullscreen UI spoof vulnerabilities can be exploited remotely to spoof user interface;
  11. Multiple URL spoof vulnerabilities in Omnibox can be exploited remotely to spoof user interface;
  12. A CORS bypass in ServiceWorker can be exploited remotely to bypass security restrictions;
  13. An insufficient protection of remote debugging prototol in DevTools can be exploited remotely to perform unspecified attacks;
  14. An UI spoof vulnerability in Permissions can be exploited remotely to spoof user interface;
  15. An incorrect handling of promises in V8 can be exploited remotely possibly to gain privileges;
  16. An incorrect handling of files by FileAPI can be exploited remotely possibly to execute arbitrary code;
  17. Incorrect handling of plaintext files can be exploited remotely via file:// possibly to cause denial of service;
  18. A heap-use-after-free vulnerability in DevTools can be exploited remotely possibly to execute arbitrary code;
  19. An incorrect URL handling in DevTools can be exploited remotely possibly to cause denial of service;
  20. An URL spoof vulnerability in Navigation can be exploited remotely to spoof user interface;
  21. A CSP bypass vulnerability can be exploited remotely to bypass security restrictions;
  22. A SmartScreen bypass vulnerability in downloads can be exploited remotely possibly to execute arbitrary code;
  23. An incorrect low memory handling in WebAssembly can be exploited remotely possibly to cause denial of service and execute arbitrary code;
  24. A confusing autofill settings can be exploited remotely possibly to obtain sensitive information or cause denial of service;
  25. An incorrect use of Distributed Objects in Google Software Updater on MacOS can be exploited remotely to perform unspecified attacks.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2018-6085
    critical
  • CVE-2018-6086
    critical
  • CVE-2018-6087
    critical
  • CVE-2018-6088
    critical
  • CVE-2018-6089
    high
  • CVE-2018-6090
    critical
  • CVE-2018-6091
    high
  • CVE-2018-6092
    critical
  • CVE-2018-6093
    high
  • CVE-2018-6094
    critical
  • CVE-2018-6095
    high
  • CVE-2018-6096
    high
  • CVE-2018-6097
    high
  • CVE-2018-6098
    high
  • CVE-2018-6099
    high
  • CVE-2018-6100
    high
  • CVE-2018-6101
    critical
  • CVE-2018-6102
    warning
  • CVE-2018-6103
    high
  • CVE-2018-6104
    high
  • CVE-2018-6105
    high
  • CVE-2018-6106
    critical
  • CVE-2018-6107
    high
  • CVE-2018-6108
    high
  • CVE-2018-6109
    high
  • CVE-2018-6110
    high
  • CVE-2018-6111
    critical
  • CVE-2018-6112
    warning
  • CVE-2018-6113
    high
  • CVE-2018-6114
    high
  • CVE-2018-6115
    high
  • CVE-2018-6116
    high
  • CVE-2018-6117
    high
  • CVE-2018-6084
    critical

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Do you want to save your changes?
Your message has been sent successfully.