KLA11550
Multiple vulnerabilities in Google Chrome
Обновлено: 07/10/2019
Дата обнаружения
10/09/2019
Уровень угрозы
Critical
Описание

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, bypass security restrictions and spoof user interface.

Below is a complete list of vulnerabilities:

  1. Use-after-free vulnerability in media component can be exploited to execute arbitrary code;
  2. Heap overflow vulnerability in Mojo component can be exploited to execute arbitrary code;
  3. Unspecified vulnerability can be exploited via trigger other browser to bypass security restrictions;
  4. URL bar spoof vulnerability can be exploited via download redirect to spoof user interface;
  5. Out-of-bounds access vulnerability in V8 component can be exploited to bypass security restrictions;
  6. Use-after-free vulnerability in V8 component can be exploited to execute arbitrary code;
  7. Unspecified vulnerability can be exploited via bypass same origin policy to bypass security restrictions;
  8. Unspecified vulnerability can be exploited via SameSite cookie bypass to bypass security restrictions;
  9. Unspecified vulnerability in SwiftShader component can be exploited via arbitrary read to bypass security restrictions;
  10. Unspecified vulnerability can be exploited via URL spoof to spoof user interface;
  11. Unspecified vulnerability can be exploited via full screen notification overlap to bypass security restrictions;
  12. Unspecified vulnerability can be exploited via CSP spoof to spoof user interface;
  13. Unspecified vulnerability can be exploited via full screen notification spoof to spoof user interface;
  14. Unspecified vulnerability can be exploited via IDN spoof to spoof user interface;
  15. Unspecified vulnerability can be exploited via CSRF bypass to bypass security restrictions;
  16. Unspecified vulnerability can be exploited via multiple file download to bypass security restrictions;
  17. Unspecified vulnerability can be exploited via using storage size estimate by side channel to bypass security restrictions;
  18. URI bar spoofing vulnerability can be exploited via using external app URIs to spoof user interface;
  19. Unspecified vulnerability can be exploited via global window leak via console to bypass security restrictions;
  20. Unspecified vulnerability can be exploited via HTTP authentication spoof to spoof user interface;
  21. Memory corruption vulnerability in V8 component can be exploited to execute arbitrary code;
  22. Unspecified vulnerability can be exploited via dialog box failing to show origin to bypass security restrictions;
  23. Unspecified vulnerability can be exploited via cross-origin information leak using devtools to bypass security restrictions;
  24. Unspecified vulnerability can be exploited via extensions disable by trailing slash to bypass security restrictions;
  25. Unspecified vulnerability can be exploited via shown for certificate warning to bypass security restrictions;
  26. Unspecified vulnerability can be exploited to bypass security restrictions;
  27. Unspecified vulnerability can be exploited via download dialog spoofing to spoof user interface;
  28. Unspecified vulnerability can be exploited via IP address spoofing to servers to spoof user interface;
  29. Unspecified vulnerability can be exploited via downloading to bypass security restrictions;
  30. Unspecified vulnerability can be exploited via site isolation bypass to bypass security restrictions;
  31. Unspecified vulnerability can be exploited via exceptions leaked by devtools to bypass security restrictions;
Решение

Update to the latest version
Google Chrome download page

Первичный источник обнаружения
Stable Channel Update for Desktop
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

SB 
[?]

SUI 
[?]
Связанные продукты
Google Chrome
CVE-IDS
CVE-2019-58700.0Unknown
CVE-2019-58710.0Unknown
CVE-2019-58720.0Unknown
CVE-2019-58730.0Unknown
CVE-2019-58740.0Unknown
CVE-2019-58750.0Unknown
CVE-2019-58760.0Unknown
CVE-2019-58770.0Unknown
CVE-2019-58780.0Unknown
CVE-2019-58790.0Unknown
CVE-2019-58800.0Unknown
CVE-2019-58810.0Unknown
CVE-2019-136590.0Unknown
CVE-2019-136600.0Unknown
CVE-2019-136610.0Unknown
CVE-2019-136620.0Unknown
CVE-2019-136630.0Unknown
CVE-2019-136640.0Unknown
CVE-2019-136650.0Unknown
CVE-2019-136660.0Unknown
CVE-2019-136670.0Unknown
CVE-2019-136680.0Unknown
CVE-2019-136690.0Unknown
CVE-2019-136700.0Unknown
CVE-2019-136710.0Unknown
CVE-2019-136730.0Unknown
CVE-2019-136740.0Unknown
CVE-2019-136750.0Unknown
CVE-2019-136760.0Unknown
CVE-2019-136770.0Unknown
CVE-2019-136780.0Unknown
CVE-2019-136790.0Unknown
CVE-2019-136800.0Unknown
CVE-2019-136810.0Unknown
CVE-2019-136820.0Unknown
CVE-2019-136830.0Unknown
CVE-2019-136910.0Unknown
CVE-2019-136920.0Unknown