Description
Multiple serious vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, spoof user interface.
Below is a complete list of vulnerabilities:
- An out-of-bounds read in V8 can be exploited remotely to execute arbitrary code;
- A use after free in PDFium can be exploited remotely to obtain sensitive information;
- A heap overflow vulnerability in the Skia component can be exploited remotely to execute arbitrary code;
- A use after free in PDFium can be exploited remotely to obtain sensitive information;
- A use after free in Blink can be exploited remotely to obtain sensitive information;
- A heap overflow vulnerability in the Canvas component can be exploited remotely to cause denial of service;
- A use after free in WebAudio can be exploited remotely to bypass security restrictions;
- A use after free in MediaRecorder can be exploited remotely to obtain sensitive information;
- A heap overflow vulnerability in the Blink component can be exploited remotely spoof user interface;
- An out-of-bounds read in V8 can be exploited remotely to cause denial of service;
- A use after free in Skia can be exploited remotely to obtain sensitive information;
- A use after free in Skia can be exploited remotely to obtain sensitive information;
Original advisories
Related products
- Google-Chrome
- Google-Chrome-Enterprise
- Google-Chrome-Enterprise-for-current-user
- Google-Chrome-for-KIS
- Google-Chrome-for-current-user
CVE list
- CVE-2018-20070 warning
- CVE-2018-20065 high
- CVE-2018-20068 warning
- CVE-2018-20069 warning
- CVE-2018-20071 warning
- CVE-2018-20067 warning
- CVE-2018-20066 high
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!