Click anywhere to stop

Multiple vulnerabilities in Google Chrome

Обновлено: 22/01/2024
Дата обнаружения
Уровень угрозы

Multiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to bypass security restrictions, spoof user interface, inject arbitrary code, cause denial of service or obtain sensitive information.

Below is a complete list of vulnerabilities

  1. An unknown vulnerability at extensions bindings can be exploited to conduct XSS attack via a crafted web site;
  2. An improper data types use in Google V8 can be exploited remotely via crafted JavaScript code to cause a denial of service or possibly have unspecified other impact;
  3. An improper implementation of color space conversion functions in PDFium can be exploited remotely via specially crafted PDF document to obtain sensitive information from process memory or cause a denial of service.
  4. Uninitialized data structure in media subsystem can be exploited remotely via unknown vectors to cause denial of service;
  5. Improper frame removal can be exploited remotely via a crafted extension to cause a denial of service or possibly have unspecified other impact;
  6. Improper download implementation in Google Chrome on Android can be exploited via unspecified vectors remotely to bypass downloaded file path restrictions;
  7. Improper relies origin comparisons method in the Extensions subsystem can be exploited remotely via crafted extension to obtain sensitive information;
  8. Improper focus handling can be exploited remotely via a crafted URL to spoof the address bar.
  9. Multiple another unknown vulnerabilities.

Technical details

Vulnerability (1) related to ModuleSystem::RequireForJsInner function in extensions/renderer/ in the Extensions subsystem.

Vulnerability (2) caused by improper implementation of LoadBuffer function. Mishandles data types allows remote attackers to trigger an out-of-bounds write operation, related to compiler/ and compiler/

Vulnerability (3) caused by improper implementation of sycc420_to_rgb and sycc422_to_rgb functions in fxcodec/codec/fx_codec_jpx_opj.cpp. It allows to read out-of-bounds via crafted JPEG 2000 data in a PDF document.

Vulnerability (4) allows attackers to cause invalid read operation.

Vulnerability (5) caused by the fact that Google Chrome improperly consider that frame removal may occur during callback execution. It allows remote attackers use-after-free or possibly have unspecified other impact.

Vulnerability (7) caused by incorrectly relies on GetOrigin method. It allows remote attackers to bypass the Same Origin Policy.

Vulnerability (8) caused by improper focus handling for certain about:blank pages in WebContentsImpl::FocusLocationBarByDefault function in content/browser/web_contents/

Пораженные продукты

Google Chrome versions earlier than 50.0.2661.75


Update to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk.
Get Chrome

Первичный источник обнаружения
Google chrome releases blog entry
Оказываемое влияние




Связанные продукты
Google Chrome
Узнай статистику распространения уязвимостей в твоем регионе