Kaspersky ID:
KLA11413
Detect Date:
01/29/2019
Updated:
12/08/2024

Description

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. Inappropriate implementation vulnerability in QUIC Networking component can be exploited to execute arbitrary code;
  2. Inappropriate implementation vulnerability in V8 component can be exploited to execute arbitrary code;
  3. Use after free vulnerability in PDFium component can be exploited remotely to execute arbitrary code;
  4. Type Confusion vulnerability in SVG component can be exploited remotely to execute arbitrary code;
  5. Use after free vulnerability in Blink component can be exploited remotely to execute arbitrary code;
  6. Use after free vulnerability in HTML select elements can be exploited remotely to execute arbitrary code;
  7. Use after free vulnerability in WebRTC component can be exploited remotely to execute arbitrary code;
  8. Use after free vulnerability in SwiftShader component can be exploited remotely to execute arbitrary code;
  9. Insufficient validation vulnerability in V8 component can be exploited remotely to execute arbitrary code;
  10. Insufficient policy enforcement vulnerability in browser can be exploited remotely to execute arbitrary code;
  11. Stack buffer overflow vulnerability in Skia component can be exploited remotely to bypass security restrictions;
  12. Insufficient policy enforcement vulnerability in Canvas component can be exploited remotely to execute arbitrary code;
  13. Incorrect security vulnerability of UI in WebAPKs component can be exploited remotely to execute arbitrary code;
  14. Insufficient policy enforcement vulnerability in DevTools component can be exploited remotely to execute arbitrary code;
  15. Insufficient validation of untrusted input vulnerability in Blink component can be exploited remotely to execute arbitrary code;
  16. Heap buffer overflow vulnerability in WebGL component can be exploited remotely to execute arbitrary code;
  17. Heap buffer overflow vulnerability in SwiftShader component can be exploited remotely to execute arbitrary code;
  18. Insufficient data validation vulnerability in IndexedDB component can be exploited remotely to execute arbitrary code;
  19. Insufficient validation of untrusted input vulnerability in SafeBrowsing component can be exploited remotely to execute arbitrary code;
  20. Insufficient policy enforcement vulnerability in Omnibox component can be exploited remotely to execute arbitrary code;
  21. Insufficient policy enforcement vulnerability in Extensions component can be exploited remotely to execute arbitrary code;
  22. Insufficient policy enforcement vulnerability in ServiceWorker component can be exploited remotely to execute arbitrary code;
  23. Insufficient validation of untrusted input vulnerability in DevTools component can be exploited remotely to execute arbitrary code;
  24. Use after free vulnerability in FileAPI component can be exploited remotely to execute arbitrary code.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Related products

CVE list

  • CVE-2019-5754
    high
  • CVE-2019-5782
    critical
  • CVE-2019-5755
    critical
  • CVE-2019-5756
    critical
  • CVE-2019-5757
    critical
  • CVE-2019-5758
    critical
  • CVE-2019-5759
    critical
  • CVE-2019-5760
    critical
  • CVE-2019-5761
    critical
  • CVE-2019-5762
    critical
  • CVE-2019-5763
    critical
  • CVE-2019-5764
    critical
  • CVE-2019-5765
    high
  • CVE-2019-5785
    high
  • CVE-2019-5766
    high
  • CVE-2019-5767
    high
  • CVE-2019-5768
    high
  • CVE-2019-5769
    critical
  • CVE-2019-5770
    critical
  • CVE-2019-5771
    critical
  • CVE-2019-5772
    critical
  • CVE-2019-5773
    high
  • CVE-2019-5774
    critical
  • CVE-2019-5775
    high
  • CVE-2019-5776
    high
  • CVE-2019-5777
    high
  • CVE-2019-5778
    high
  • CVE-2019-5779
    warning
  • CVE-2019-5780
    critical
  • CVE-2019-5783
    critical
  • CVE-2019-5781
    high
  • CVE-2019-13684
    high
  • CVE-2018-20073
    high
  • CVE-2019-13768
    high

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.