Kaspersky ID:
KLA11598
Detect Date:
12/04/2018
Updated:
01/22/2024

Description

Multiple serious vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, spoof user interface.

Below is a complete list of vulnerabilities:

  1. An out-of-bounds read in V8 can be exploited remotely to execute arbitrary code;
  2. A use after free in PDFium can be exploited remotely to obtain sensitive information;
  3. A heap overflow vulnerability in the Skia component can be exploited remotely to execute arbitrary code;
  4. A use after free in PDFium can be exploited remotely to obtain sensitive information;
  5. A use after free in Blink can be exploited remotely to obtain sensitive information;
  6. A heap overflow vulnerability in the Canvas component can be exploited remotely to cause denial of service;
  7. A use after free in WebAudio can be exploited remotely to bypass security restrictions;
  8. A use after free in MediaRecorder can be exploited remotely to obtain sensitive information;
  9. A heap overflow vulnerability in the Blink component can be exploited remotely spoof user interface;
  10. An out-of-bounds read in V8 can be exploited remotely to cause denial of service;
  11. A use after free in Skia can be exploited remotely to obtain sensitive information;
  12. A use after free in Skia can be exploited remotely to obtain sensitive information;

Original advisories

Related products

CVE list

  • CVE-2018-20070
    warning
  • CVE-2018-20065
    high
  • CVE-2018-20068
    warning
  • CVE-2018-20069
    warning
  • CVE-2018-20071
    warning
  • CVE-2018-20067
    warning
  • CVE-2018-20066
    high

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.