KLA11232
Multiple vulnerabilities in Google Chrome
Updated: 08/17/2018
CVSS
?
0.0
Detect date
?
04/17/2018
Severity
?
Critical
Description

Multiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to bypass security restrictions, obtain sensitive information, cause denial of service, spoof user interface, gain privileges, execute arbitrary code and perform unspecified attacks.

Below is a complete list of vulnerabilities:

  1. Multiple use-after-free vulnerabilities in Disk Cache can be exploited remotely possibly to execute arbitrary code;
  2. An use-after-free vulnerability in WebAssembly can be exploited remotely possibly to execute arbitrary code;
  3. An use-after-free vulnerability in PDFium can be exploited remotely possibly to execute arbitrary code;
  4. Multiple same origin bypass vulnerabilities in Service Worker can be exploited remotely to bypass security restrictions;
  5. A heap buffer overflow vulnerability in Skia can be exploited remotely to cause denial of service;
  6. An incorrect handling of plug-ins by Service Worker can be exploited remotely to perform unspecified attack;
  7. An integer overflow in WebAssembly can be exploited remotely to cause denial of service;
  8. An exploit hardening regression vulnerability in Oilpan can be exploited remotely to perform unspecified attacks;
  9. A lack of meaningful user interaction requirement before file upload can be exploited remotely to obtain sensitive information;
  10. Multiple fullscreen UI spoof vulnerabilities can be exploited remotely to spoof user interface;
  11. Multiple URL spoof vulnerabilities in Omnibox can be exploited remotely to spoof user interface;
  12. A CORS bypass in ServiceWorker can be exploited remotely to bypass security restrictions;
  13. An insufficient protection of remote debugging prototol in DevTools can be exploited remotely to perform unspecified attacks;
  14. An UI spoof vulnerability in Permissions can be exploited remotely to spoof user interface;
  15. An incorrect handling of promises in V8 can be exploited remotely possibly to gain privileges;
  16. An incorrect handling of files by FileAPI can be exploited remotely possibly to execute arbitrary code;
  17. Incorrect handling of plaintext files can be exploited remotely via file:// possibly to cause denial of service;
  18. A heap-use-after-free vulnerability in DevTools can be exploited remotely possibly to execute arbitrary code;
  19. An incorrect URL handling in DevTools can be exploited remotely possibly to cause denial of service;
  20. An URL spoof vulnerability in Navigation can be exploited remotely to spoof user interface;
  21. A CSP bypass vulnerability can be exploited remotely to bypass security restrictions;
  22. A SmartScreen bypass vulnerability in downloads can be exploited remotely possibly to execute arbitrary code;
  23. An incorrect low memory handling in WebAssembly can be exploited remotely possibly to cause denial of service and execute arbitrary code;
  24. A confusing autofill settings can be exploited remotely possibly to obtain sensitive information or cause denial of service;
  25. An incorrect use of Distributed Objects in Google Software Updater on MacOS can be exploited remotely to perform unspecified attacks.
Affected products

Google Chrome earlier than 66.0.3359.117

Solution

Update to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk.
Google Chrome download page

Original advisories

Stable Channel Update for Desktop

Impacts
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]

PE 
[?]

SUI 
[?]
CVE-IDS
?

CVE-2018-6085
CVE-2018-6086
CVE-2018-6087
CVE-2018-6088
CVE-2018-6089
CVE-2018-6090
CVE-2018-6091
CVE-2018-6092
CVE-2018-6093
CVE-2018-6094
CVE-2018-6095
CVE-2018-6096
CVE-2018-6097
CVE-2018-6098
CVE-2018-6099
CVE-2018-6100
CVE-2018-6101
CVE-2018-6102
CVE-2018-6103
CVE-2018-6104
CVE-2018-6105
CVE-2018-6106
CVE-2018-6107
CVE-2018-6108
CVE-2018-6109
CVE-2018-6110
CVE-2018-6111
CVE-2018-6112
CVE-2018-6113
CVE-2018-6114
CVE-2018-6115
CVE-2018-6116
CVE-2018-6117
CVE-2018-6084