KLA12106
Multiple vulnerabilities in Google Chrome

Updated: 03/03/2021
Detect date
?
03/02/2021
Severity
?
High
Description

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions, spoof user interface, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. A heap buffer overflow vulnerability in OpenJPEG can be exploited to cause denial of service.
  2. A heap buffer overflow vulnerability in TabStrip can be exploited to cause denial of service.
  3. A heap buffer overflow vulnerability in WebAudio can be exploited to cause denial of service.
  4. A use after free vulnerability in WebRTC can be exploited to cause denial of service or execute arbitrary code.
  5. A data validation vulnerability in Reader Mode can be exploited to bypass security restrictions.
  6. A data validation vulnerability in Chrome for iOS can be exploited to bypass security restrictions.
  7. An object lifecycle vulnerability in audio component can be exploited to bypass security restrictions.
  8. A use after free vulnerability in bookmarks can be exploited to cause denial of service or execute arbitrary code.
  9. A policy enforcement vulnerability in appcache component can be exploited to bypass security restrictions.
  10. An out of bounds memory access vulnerability in V8 can be exploited to bypass security restrictions.
  11. A security UI vulnerability in Loader canbe exploited to spoof user interface.
  12. A security UI vulnerability in TabStrip and Navigation canbe exploited to spoof user interface.
  13. A policy enforcement vulnerability in File System API can be exploited to bypass security restrictions.
  14. An information leakage vulnerability in Network Internals can be exploited to obtain sensitive information.
  15. An implementation vulnerability in Referrer can be exploited to cause denial of service.
  16. An implementation vulnerability in Site isolation can be exploited to cause denial of service.
  17. An implementation vulnerability in full screen mode can be exploited to cause denial of service.
  18. A policy enforcement vulnerability in autofill component can be exploited to bypass security restrictions.
  19. An implementation vulnerability in Compositing can be exploited to cause denial of service.
  20. A use after free vulnerability in Network Internals can be exploited to cause denial of service or execute arbitrary code.
  21. A use after free vulnerability in tab search component can be exploited to cause denial of service or execute arbitrary code.
  22. An information leakage vulnerability in autofill component can be exploited to obtain sensitive information.
  23. A policy enforcement vulnerability in navigations can be exploited to bypass security restrictions.
  24. An implementation vulnerability in performance APIs can be exploited to cause denial of service.
  25. A policy enforcement vulnerability in extensions can be exploited to bypass security restrictions.
  26. A policy enforcement vulnerability in QR can be exploited to bypass security restrictions.
  27. A data validation vulnerability in URL formatting can be exploited to bypass security restrictions.
  28. A use after free vulnerability in Blink can be exploited to cause denial of service or execute arbitrary code.
  29. A policy enforcement vulnerability in payments can be exploited to bypass security restrictions.
  30. An uninitialized use vulnerability in PDFium can be exploited to obtain sensitive information.
Affected products

Google Chrome earlier than 89.0.4389.72

Solution

Update to the latest version
Download Google Chrome

Original advisories

Stable Channel Update for Desktop

Impacts
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]

SUI 
[?]
Related products
Google Chrome
CVE-IDS
?
CVE-2020-278440.0Unknown
CVE-2021-211590.0Unknown
CVE-2021-211600.0Unknown
CVE-2021-211610.0Unknown
CVE-2021-211620.0Unknown
CVE-2021-211630.0Unknown
CVE-2021-211640.0Unknown
CVE-2021-211650.0Unknown
CVE-2021-211660.0Unknown
CVE-2021-211670.0Unknown
CVE-2021-211680.0Unknown
CVE-2021-211690.0Unknown
CVE-2021-211700.0Unknown
CVE-2021-211710.0Unknown
CVE-2021-211720.0Unknown
CVE-2021-211730.0Unknown
CVE-2021-211740.0Unknown
CVE-2021-211750.0Unknown
CVE-2021-211760.0Unknown
CVE-2021-211770.0Unknown
CVE-2021-211780.0Unknown
CVE-2021-211790.0Unknown
CVE-2021-211800.0Unknown
CVE-2021-211810.0Unknown
CVE-2021-211820.0Unknown
CVE-2021-211830.0Unknown
CVE-2021-211840.0Unknown
CVE-2021-211850.0Unknown
CVE-2021-211860.0Unknown
CVE-2021-211870.0Unknown
CVE-2021-211880.0Unknown
CVE-2021-211890.0Unknown
CVE-2021-211900.0Unknown
Find out the statistics of the vulnerabilities spreading in your region