KLA12048
Multiple vulnerabilities in Google Chrome

Updated: 01/27/2021
Detect date
?
01/19/2021
Severity
?
Warning
Description

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions, spoof user interface.

Below is a complete list of vulnerabilities:

  1. Use after free vulnerability in Media can be exploited to cause denial of service or execute arbitrary code.
  2. Uninitialized use vulnerability in USB can be exploited to bypass security restrictions.
  3. Implementation vulnerability in iframe sandbox can be exploited to potentially cause denial of service.
  4. Implementation vulnerability in Performace API can be exploited to potentially cause denial of service.
  5. Policy enforcement vulnerability in WebView can be exploited to bypass security restrictions.
  6. Policy enforcement vulnerability in File System API can be exploited to bypass security restrictions.
  7. Use after free vulnerability in Blink can be exploited to cause denial of service or execute arbitrary code.
  8. Security UI vulnerability in Page Info can be exploited to spoof user interface.
  9. Policy enforcement vulnerability in extensions can be exploited to bypass security restrictions.
  10. Implementation vulnerability in DevTools can be exploited to potentially cause denial of service.
  11. Heap buffer overflow vulnerability in Blink can be exploited to cause denial of service.
  12. Use after free vulnerability in WebSQL can be exploited to cause denial of service or execute arbitrary code.
  13. Use after free vulnerability in DevTools can be exploited to cause denial of service or execute arbitrary code.
  14. Use after free vulnerability in Speech Recognizer can be exploited to cause denial of service or execute arbitrary code.
  15. Policy enforcement vulnerability in Cryptohome can be exploited to bypass security restrictions.
  16. Data validation vulnerability in File System API can be exploited to bypass security restrictions.
  17. Use after free vulnerability in Omnibox can be exploited to cause denial of service or execute arbitrary code.
  18. Use after free vulnerability in WebRTC can be exploited to cause denial of service or execute arbitrary code.
  19. Policy enforcement vulnerability in Downloads can be exploited to bypass security restrictions.
  20. Data validation vulnerability in V8 can be exploited to bypass security restrictions.
Affected products

Google Chrome earlier than 88.0.4324.96

Solution

Update to the latest version
Download Google Chrome

Original advisories

Stable Channel Update for Desktop

Impacts
?
ACE 
[?]

DoS 
[?]

SB 
[?]

SUI 
[?]
Related products
Google Chrome
CVE-IDS
?
Find out the statistics of the vulnerabilities spreading in your region