KLA10745
Multiple vulnerabilities in Google Chrome
Обновлено: 17/06/2019
Дата обнаружения
20/01/2016
Уровень угрозы
Critical
Описание

Multiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to spoof user interface, cause denial of service or execute arbitrary code.

Below is a complete list of vulnerabilities

  1. Multiple unspecified vulnerabilities at HarfBuzz and V8 can be exploited to cause denial of service;
  2. Multiple integer overflows at PDFium can be exploited via a specially designed PDF to cause denial of service;
  3. Lack of random numbers generator enforcement at Blink can be exploited remotely to bypass security restrictions;
  4. Lack of http and ws policies enforcement at Blink can be exploited remotely to obtain sensitive information;
  5. An unknown vulnerability can be exploited remotely via vectors related to buttons to spoof user interface;
  6. An unknown vulnerability at Omnibox can be exploited remotely to spoof user interface;
  7. Improper initialization at Blink can be exploited remotely via a specially designed web site to obtain sensitive information;
  8. Multiple use-after-free vulnerabilities at PDFium can be exploited remotely via a specially designed PDF to cause denial of service;
  9. Lack of compatibility check at V8 can be exploited remotely via a specially designed JavaScript to cause denial of service.

Technical details

Vulnerability (2) related to sycc422_to_rgb and sycc444_to_rgb functions in fxcodec/codec/fx_codec_jpx_opj.cpp.

Vulnerability (3) related to Blink version which does not ensure that cryptographicallyRandomValues is used. Exploitation of this vulnerability can lead to defeat cryptographic protection.

Vulnerability (4) related to CSPSource::schemeMatches function in WebKit/Source/core/frame/csp/CSPSource.cpp in the Content Security Policy (CSP) implementation which does not apply http policies to HTTPS URLs and does not apply ws polivies to WSS URLs. Exploitation of this vulnerability can lead to disclosure of information about specific HSTS sites visits. This vulnerability can be exploited via reading CSP report.

Vulnerability (5) related to CustomButton::AcceleratorPressed function in ui/views/controls/button/custom_button.cc and can be triggered via unknown vectors related to unfocused custom button.

By exploiting vulnerability (6) malicious can spoof document’s origin.

Vulnerability (7) related to UnacceleratedImageBufferSurface class in WebKit/Source/platform/graphics/UnacceleratedImageBufferSurface.cpp. By exploiting this vulnerability malicious can obtain sensitive information from process memory.

Vulnerability (8) related to improper tracking of the destruction of IPWL_FocusHandler and IPWL_Provider objects.

Vulnerability (9) related toLoadIC::UpdateCaches function in ic/ic.cc which does not ensure receiver compatibility.

Пораженные продукты

Google Chrome versions earlier than 48.0.2564.82

Решение

Update to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk.
Get Chrome

Первичный источник обнаружения
Google Chrome releases blog
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SUI 
[?]
Связанные продукты
Google Chrome
CVE-IDS
CVE-2016-20516.8High
CVE-2016-16209.3Critical
CVE-2016-16196.8High
CVE-2016-16184.3Warning
CVE-2016-16174.3Warning
CVE-2016-16164.3Warning
CVE-2016-16154.3Warning
CVE-2016-16144.3Warning
CVE-2016-16136.8High
CVE-2016-16126.8High
CVE-2016-20526.8High