Searching
..

Click anywhere to stop

KLA11129
Multiple vulnerabilities in Google Chrome

Обновлено: 22/01/2024
Дата обнаружения
25/07/2017
Уровень угрозы
High
Описание

Multiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to cause a denial of service, bypass security restrictions, spoof user interface, execute arbitrary code, escalate privileges, obtain sensitive information and perform cross-site scripting attack.

Below is a complete list of vulnerabilities:

  1. A use after free in IndexedDB component can be exploited remotely by an unauthenticated attacker to cause denial of service;
  2. Insufficient validation of untrusted input in PPAPI Plugins component can be exploited remotely by an unauthenticated attacker to bypass security restrictions;
  3. Inappropriate implementation in modal dialog handling in Blink component can be exploited remotely by an unauthenticated attacker to spoof user interface;
  4. Type confusion in extensions JavaScript can be exploited remotely by an unauthenticated attacker to bypass security restrictions;
  5. Stack overflow in PDFium component can be exploited remotely by an unauthenticated attacker to execute arbitrary code;
  6. Insufficient policy enforcement during navigation can be exploited remotely by an unauthenticated attacker to perform a universal cross-site scripting attack;
  7. Insufficient validation of untrusted input in Skia component can be exploited remotely by an unauthenticated attacker to cause denial of service;
  8. A use after free in V8 component can be exploited remotely by an unauthenticated attacker to cause denial of service;
  9. Insufficient validation of untrusted input in PPAPI Plugins component can be exploited remotely by an unauthenticated attacker to escalate privilege;
  10. A use after free in Apps component can be exploited remotely by an unauthenticated attacker to cause denial of service;
  11. Inappropriate implementation in Omnibox component can be exploited remotely by an unauthenticated attacker to spoof user interface;
  12. Use of an uninitialized value in Skia component can be exploited remotely by an unauthenticated attacker to obtain sensitive information;
  13. Inappropriate implementation in interstitials can be exploited remotely by an unauthenticated attacker to spoof user interface;
  14. Insufficient Policy Enforcement in Omnibox component can be exploited remotely by an unauthenticated attacker to spoof user interface;
  15. A timing attack in SVG rendering can be exploited remotely by an unauthenticated attacker to perform a universal cross-site scripting attack;
  16. Type confusion in PDFium component can be exploited remotely by an unauthenticated attacker to bypass security restrictions;
  17. Inappropriate implementation of unload handler handling in permission prompts can be exploited remotely by an unauthenticated attacker to spoof user interface;
  18. Inappropriate implementation of the web payments API on blob: and data: schemes in Web Payments component can be exploited remotely by an unauthenticated attacker to spoof user interface;

Technical details

NB: This vulnerability does not have any public CVSS rating, so rating can be changed by the time.

Пораженные продукты

Google Chrome versions earlier than 60.0.3112.78

Решение

Update to the latest version
Download Google Chrome

Первичный источник обнаружения
Stable Channel Update for Desktop
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]

PE 
[?]

XSS/CSS 
[?]

SUI 
[?]
Связанные продукты
Google Chrome
CVE-IDS
CVE-2017-51086.8High
CVE-2017-51094.3Warning
CVE-2017-51104.3Warning
CVE-2017-50916.8High
CVE-2017-50926.8High
CVE-2017-50934.3Warning
CVE-2017-50944.3Warning
CVE-2017-50956.8High
CVE-2017-50964.3Warning
CVE-2017-50976.8High
CVE-2017-50986.8High
CVE-2017-50996.8High
CVE-2017-51006.8High
CVE-2017-51014.3Warning
CVE-2017-51024.3Warning
CVE-2017-51034.3Warning
CVE-2017-51044.3Warning
CVE-2017-51054.3Warning
CVE-2017-51064.3Warning
CVE-2017-51072.6Warning
Узнай статистику распространения уязвимостей в твоем регионе