Searching
..

Click anywhere to stop

KLA11869
Multiple vulnerability in Google Chrome

Updated: 01/22/2024
Detect date
?
07/14/2020
Severity
?
Critical
Description

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to obtain sensitive information, cause denial of service, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. Incorrect security UI vulnerability in PWAs can be exploited to obtain sensitive information.
  2. Inappropriate implementation vulnerability in WebRTC can be exploited to potentially denial of service.
  3. Use after free vulnerability in developer tools can be exploited to potentially denial of service and bypass security restrictions.
  4. Heap buffer overflow vulnerability in Skia can be exploited to potentially denial of service and bypass security restrictions.
  5. Heap buffer overflow vulnerability in Skiacan can be exploited to potentially denial of service and bypass security restrictions.
  6. Inappropriate implementation vulnerability in external protocol handlers can be exploited to potentially denial of service.
  7. Incorrect security UI vulnerability in basic auth can be exploited to obtain sensitive information.
  8. Side-channel information leakage vulnerability in scroll to text can be exploited to obtain sensitive information.
  9. Out of bounds write vulnerability in Skia can be exploited to potentially denial of service and bypass security restrictions.
  10. Out of bounds vulnerability in developer tools can be exploited to potentially denial of service.
  11. Heap buffer overflow vulnerability in background fetch can be exploited to potentially denial of service and bypass security restrictions.
  12. Use after free vulnerability in tab strip can be exploited to potentially denial of service.
  13. Side-channel information leakage vulnerability in content security policy can be exploited to obtain sensitive information.
  14. Type Confusion vulnerability in V8 can be exploited to potentially denial of service.
  15. Policy bypass vulnerability in CORS can be exploited to security bypass.
  16. Insufficient policy enforcement vulnerability in CSP can be exploited to security bypass.
  17. Policy bypass vulnerability in CSP can be exploited to security bypass.
  18. Heap buffer overflow vulnerability in WebAudi can be exploited to potentially denial of service.
  19. Inappropriate implementation vulnerability in iframe sandbox can be exploited to potentially denial of service.
  20. Heap buffer overflow vulnerability in WebRTC can be exploited to potentially denial of service.
  21. Insufficient data validation vulnerability in WebUI can be exploited to potentially denial of service.
  22. Heap buffer overflow vulnerability in history can be exploited to potentially denial of service.
  23. Side-channel information leakage vulnerability in autofill can be exploited to obtain sensitive information.
  24. Inappropriate implementation vulnerability in WebRTC can be exploited to potentially denial of service.
  25. Heap buffer overflow vulnerability in PDFium can be exploited to potentially denial of service.
Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Affected products

Google Chrome earlier than 84.0.4147.89

Solution

Update to the latest version
Download Google Chrome

Original advisories

Stable Channel Update for Desktop

Impacts
?
OSI 
[?]

DoS 
[?]

SB 
[?]

SUI 
[?]
Related products
Google Chrome
CVE-IDS
?
CVE-2020-65364.3Warning
CVE-2020-65294.3Warning
CVE-2020-65189.3Critical
CVE-2020-65209.3Critical
CVE-2020-65256.8High
CVE-2020-65226.8High
CVE-2020-65284.3Warning
CVE-2020-65314.3Warning
CVE-2020-65239.3Critical
CVE-2020-65306.8High
CVE-2020-65106.8High
CVE-2020-65159.3Critical
CVE-2020-65114.3Warning
CVE-2020-65336.8High
CVE-2020-65164.3Warning
CVE-2020-65274.3Warning
CVE-2020-65194.3Warning
CVE-2020-65249.3Critical
CVE-2020-65264.3Warning
CVE-2020-65346.8High
CVE-2020-65129.3Critical
CVE-2020-65354.3Warning
CVE-2020-65179.3Critical
CVE-2020-65214.3Warning
CVE-2020-65144.3Warning
CVE-2020-65136.8High
Find out the statistics of the vulnerabilities spreading in your region