KLA10712
Multiple vulnerabilities in Google Chrome
Обновлено: 17/06/2019
Дата обнаружения
08/12/2015
Уровень угрозы
Critical
Описание

Multiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions, inject arbitrary code or execute arbitrary code.

Below is a complete list of vulnerabilities

  1. Improper objects handling at extensions can be exploited remotely to cause denial of service;
  2. Race condition at Blink can be exploited remotely via unexpected object deletion to cause denial of service;
  3. Improper HTML entities handling at page serializer can be exploited remotely via a specially designed document to inject arbitrary code;
  4. Multiple unknown vulnerabilities can be exploited to cause denial of service
  5. Obsolete version of embedded Adobe Flash Player can be exploited via multiple vectors.

Technical details

Vulnerability (1) related to ObjectBackedNativeHandler class in extensions/renderer/object_backed_native_handler.cc which improperly implements handler functions.

Vulnerability (2) related to MutationObserver implementation.

Vulnerability (3) related to WebPageSerializerImpl::openTagToString function in WebKit/Source/web/WebPageSerializerImpl.cpp

Further information about vulnerability (5) you can find at KLA10711.

Пораженные продукты

Google Chrome versions earlier than 47.0.2526.80 (all branches)

Решение

Update to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk.
Get Google Chrome

Первичный источник обнаружения
Google Chrome releases blog
Оказываемое влияние
?
ACE 
[?]

DoS 
[?]

CI 
[?]

SB 
[?]
Связанные продукты
Google Chrome
CVE-IDS
CVE-2015-67904.3Warning
CVE-2015-678810.0Critical
CVE-2015-854810.0Critical
CVE-2015-679110.0Critical
CVE-2015-67899.3Critical