Дата обнаружения
|
11/05/2016 |
Уровень угрозы
|
Critical |
Описание
|
Multiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to bypass security restrictions, obtain sensitive information or cause denial of service. Below is a complete list of vulnerabilities
Technical details Vulnerability (1) related to net/base/escape.cc and net/base/filename_util.cc which mishandles slash and backslash symbols. This vulnerability can be exploited via directory traversal attack. Vulnerability (2) ResourceDispatcherHostImpl::BeginRequest function in content/browser/loader/resource_dispatcher_host_impl.cc and can allow attacker to conduct arbitrary HTTP requests. This vulnerability can be exploited via access to renderer process and reusing request ID. Vulnerability (3) related to Zone::New function in zone.cc which does not properly determine when to expand certain memory allocations. Vulnerability (4) related to forEachForBinding function in WebKit/Source/bindings/core/v8/Iterable.h and can be exploited to bypass Same Origin Policy. Vulnerability (5) related to TreeScope::adoptIfNeeded function in WebKit/Source/core/dom/TreeScope.cpp at the DOM implementation which does not prevent script execution during node-adoption operations. This vulnerability can be exploited to bypass Same Origin Policy. |
Пораженные продукты
|
Google Chrome versions earlier than 50.0.2661.102 (All branches) |
Решение
|
Update to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk. |
Первичный источник обнаружения
|
Google Chrome releases blog |
Оказываемое влияние
?
|
ACE
[?]
OSI
[?]
DoS
[?]
SB
[?]
|
Связанные продукты
|
Google Chrome |
CVE-IDS
|
CVE-2016-16686.8High
CVE-2016-16676.8High CVE-2016-16702.6Warning CVE-2016-16699.3Critical CVE-2016-16716.8High |
Узнай статистику распространения уязвимостей в твоем регионе |