Описание
Multiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions, obtain sensitive information or conduct another unknown impact.
Below is a complete list of vulnerabilities:
- Multiple unknown vulnerabilities can be exploited to cause denial of service or possibly have another unknown impact;
- Improper cache clearing can be exploited remotely via a valid certificate to spoof web sites;
- Using HTTP instead of HTTPS on dl.google.com can be exploited remotely via man-in-the-middle attack to obtain sensitive information;
- Improper processing of CSS stylesheets at Blink can be exploited remotely via a specially crafted web site to bypass security restriction;
- Improper processing of coincidence runs at Skia can be exploited remotely via a specially crafted curves to cause denial of service or have another unspecified impact;
- Improper field updates at Autofill implementation can be exploited remotely via a specially crafted web site to cause a denial of service or have another unspecified impact;
- An unknown vulnerability can be exploited remotely via a specially crafted web site to cause denial of service or have another unspecified impact;
- Improper implementation of regular expressions at V8 can be exploited remotely via a specially crafted JavaScript code to cause a denial of service;
- Improper restriction of classes public exposure at renderer implementation can be exploited remotely via specially crafted extension to obtain sensitive information;
- Improper handling of decoder-initialization failures at PDFium can be exploited remotely via a specially crafted PDF document to cause denial of service;
- Improper calculating of certain index values at PDFium can be exploited remotely via a specially crafted PDF document to cause a denial of service;
- The i format token for xsl:number data mishandling can be exploited remotely via a specially crafted XML document to cause a denial of service or have another unspecified impact;
- Namespace nodes mishandling can be exploited remotely via a specially crafted XML document to cause a denial of service or have another unspecified impact;
- An unknown vulnerability at Blink can be exploited remotely via a ServiceWorker registration to bypass security restriction;
- An unknown vulnerability at PDFium can be exploited remotely via a specially crafted PDF document to cause denial of service or have another unspecified impact;
- An unknown vulnerability at Skia can be exploited remotely to cause denial of service or have another unspecified impact;
- Improperly restriction of getters and setters using at V8 can be exploited remotely via a specially crafted JavaScript code to cause a denial of service or have another unspecified impact;
- Improperly restriction of lazy deoptimization at V8 can be exploited remotely via a specially crafted JavaScript code to cause a denial of service or have another unspecified impact;
- Using of incorrect array type at V8 can be exploited remotely to obtain sensitive information.
- Improperly using of prototypes at the extensions bindings can be exploited remotely to bypass security restrictions;
- An unknown vulnerability at Blink can be exploited remotely via specially crafted document to bypass security restriction;
- An unknown vulnerability at extensions subsystem can be exploited remotely to bypass security restriction.
Technical details
Vulnerability (2) related to browser/browsing_data/browsing_data_remover.cc which mistakenly deletes HPKP pins during cache clearing.
Vulnerability (3) related to browser/safe_browsing/srt_field_trial_win.cc. Google Chrome does not use the HTTPS service to obtain the Software Removal Tool. This vulnerability can be exploited to spoof the chrome_cleanup_tool.exe (aka CCT) file.
Vulnerability (4) permits cross-origin loading of CSS stylesheets by a ServiceWorker even when the stylesheet download has an incorrect MIME type. It allows to bypass the Same Origin Policy. This vulnerability related to WebKit/Source/core/css/StyleSheetContents.cpp file.
Vulnerability (5) related to SkOpCoincidence.cpp and SkPathOpsCommon.cpp files. It can be exploited to cause heap-based buffer overflow.
Vulnerability (6) caused by improper interaction between field updates and JavaScript code that triggers a frame deletion. It allows to cause use-after-free. Vulnerability (6) different than CVE-2016-1701.
Vulnerability (7) related to content/renderer/media/canvas_capture_handler.cc. It allows to cause heap-based buffer overflow.
Vulnerability (8) related to Google V8 before 5.0.71.40. This vulnerability caused by improper processing of external string sizes. It allows to cause out-of-bounds read.
Vulnerability (10) related to CPDF_DIBSource::CreateDecoder function in core/fpdfapi/fpdf_render/fpdf_render_loadimage.cpp in PDFium. It allows to cause out-of-bounds read.
Vulnerability (11) related to core/fxge/ge/fx_ge_text.cpp in PDFium and allows out-of-bounds read.
Vulnerabilities (12) and (13) related to numbers.c in libxslt before 1.1.29 and allow to cause integer overflow, resource consumption and out-of-bounds heap memory access.
Vulnerability (14) related to ServiceWorkerContainer::registerServiceWorkerImpl function in WebKit/Source/modules/serviceworkers/ServiceWorkerContainer.cpp in Blink. It allows to bypass the Content Security Policy (CSP) protection mechanism.
Vulnerability (15) related to opj_j2k_read_SPCod_SPCoc function in j2k.c in OpenJPEG, as used in PDFium, and allows to cause heap-based buffer overflow.
Vulnerability (16) related to ports/SkFontHost_FreeType.cpp in Skia. This vulnerability allows to cause use-after-free.
Vulnerability (17) related to ToV8Value function in content/child/v8_value_converter_impl.cc in the V8 bindings.
Vulnerability (18) related to objects.cc in V8 and allows to cause heap-based buffer overflow.
Vulnerability (19) related to uri.js in V8. It can be exploited by calling the decodeURI function and leveraging «type confusion».
Vulnerability (20) related to extensions/renderer/resources/binding.js file and allows to bypass the Same Origin Policy.
Vulnerability (21) related to FrameLoader.cpp and LocalFrame.cpp files. It can be exploited by leveraging the mishandling of Document reattachment during destruction.
Первичный источник обнаружения
Связанные продукты
Список CVE
- CVE-2016-1684 high
- CVE-2016-1685 warning
- CVE-2016-1690 high
- CVE-2016-1691 high
- CVE-2016-1692 warning
- CVE-2016-1693 warning
- CVE-2016-1686 warning
- CVE-2016-1687 warning
- CVE-2016-1688 warning
- CVE-2016-1689 warning
- CVE-2016-1695 high
- CVE-2016-1694 warning
- CVE-2016-1675 high
- CVE-2016-1674 high
- CVE-2016-1683 high
- CVE-2016-1682 warning
- CVE-2016-1681 high
- CVE-2016-1680 high
- CVE-2016-1679 high
- CVE-2016-1678 high
- CVE-2016-1677 warning
- CVE-2016-1676 high
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com