KLA11312
Multiple vulnerabilities in Google Chrome
Updated: 09/10/2018
CVSS
?
5.5
Detect date
?
09/04/2018
Severity
?
High
Description

Multiple serious vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, obtain sensitive information, bypass security restrictions and spoof user interface.

Below is a complete list of vulnerabilities:

  1. An out-of-bounds write vulnerability in V8 can be exploited remotely to cause denial of service and execute arbitrary code;
  2. An out-of-bounds read vulnerability in Blink can be exploited remotely to cause denial of service and execute arbitrary code;
  3. An out-of-bounds read vulnerability in WebAudio can be exploited remotely to cause denial of service and execute arbitrary code;
  4. An out-of-bounds write vulnerability in Mojo can be exploited remotely to cause denial of service and execute arbitrary code;
  5. An out-of-bounds read vulnerability in SwiftShader can be exploited remotely to cause denial of service and execute arbitrary code;
  6. An integer overflow vulnerability in Skia can be exploited remotely to cause denial of service and execute arbitrary code;
  7. An use after free vulnerability in WebRTC can be exploited remotely to cause denial of service and execute arbitrary code;
  8. An cross origin pixel leak vulnerability in Chrome’s interaction with Android’s MediaPlayer can be exploited remotely to obtain sensitive information;
  9. A site isolation bypass vulnerability can be exploited locally via tab restore to obtain sensitive information;
  10. A site isolation bypass vulnerability can be exploited locally via Blob URLS to obtain sensitive information;
  11. An unspecified vulnerability in Blink can be exploited locally to bypass security restrictions and obtain sensitive information;
  12. An out-of-bounds read vulnerability in PDFium can be exploited remotely to cause denial of service;
  13. A content security policy bypass vulnerability in Blink can be exploited to obtain sensitive information;
  14. A credit card information leak vulnerability in Autofill can be exploited to bypass security restrictions;
  15. An URL spoof vulnerability in permission dialogs can be exploited remotely to spoof user interface;
  16. An URL spoof vulnerability in full screen mode can be exploited remotely to spoof user interface;
  17. An unspecified vulnerability in DevTools can be exploited locally to bypass security restrictions and obtain sensitive information;
  18. A stack buffer overflow vulnerabilty in SwiftShader can be exploited remotely to cause denial of service;
  19. An out of bounds read in WebRTC can be exploited to cause denial of service;
  20. An user confirmation bypass in external protocol handling can be exploited locally to bypass security restrictions;
  21. An use after free vulnerability in Memory Instrumentation can be exploited to cause denial of service.
Affected products

Google Chrome ealier than 69.0.3497.81

Solution

Update to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk.
Google Chrome download page

Original advisories

Stable Channel Update for Desktop

Impacts
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]

SUI 
[?]
Related products
Google Chrome
CVE-IDS
?

CVE-2018-16065
CVE-2018-16066
CVE-2018-16067
CVE-2018-16068
CVE-2018-16069
CVE-2018-16070
CVE-2018-16071
CVE-2018-16072
CVE-2018-16073
CVE-2018-16074
CVE-2018-16075
CVE-2018-16076
CVE-2018-16077
CVE-2018-16078
CVE-2018-16079
CVE-2018-16080
CVE-2018-16081
CVE-2018-16082
CVE-2018-16083
CVE-2018-16084
CVE-2018-16085