KLA11869
Multiple vulnerability in Google Chrome

Обновлено: 28/09/2023
Дата обнаружения
14/07/2020
Уровень угрозы
Critical
Описание

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to obtain sensitive information, cause denial of service, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. Incorrect security UI vulnerability in PWAs can be exploited to obtain sensitive information.
  2. Inappropriate implementation vulnerability in WebRTC can be exploited to potentially denial of service.
  3. Use after free vulnerability in developer tools can be exploited to potentially denial of service and bypass security restrictions.
  4. Heap buffer overflow vulnerability in Skia can be exploited to potentially denial of service and bypass security restrictions.
  5. Heap buffer overflow vulnerability in Skiacan can be exploited to potentially denial of service and bypass security restrictions.
  6. Inappropriate implementation vulnerability in external protocol handlers can be exploited to potentially denial of service.
  7. Incorrect security UI vulnerability in basic auth can be exploited to obtain sensitive information.
  8. Side-channel information leakage vulnerability in scroll to text can be exploited to obtain sensitive information.
  9. Out of bounds write vulnerability in Skia can be exploited to potentially denial of service and bypass security restrictions.
  10. Out of bounds vulnerability in developer tools can be exploited to potentially denial of service.
  11. Heap buffer overflow vulnerability in background fetch can be exploited to potentially denial of service and bypass security restrictions.
  12. Use after free vulnerability in tab strip can be exploited to potentially denial of service.
  13. Side-channel information leakage vulnerability in content security policy can be exploited to obtain sensitive information.
  14. Type Confusion vulnerability in V8 can be exploited to potentially denial of service.
  15. Policy bypass vulnerability in CORS can be exploited to security bypass.
  16. Insufficient policy enforcement vulnerability in CSP can be exploited to security bypass.
  17. Policy bypass vulnerability in CSP can be exploited to security bypass.
  18. Heap buffer overflow vulnerability in WebAudi can be exploited to potentially denial of service.
  19. Inappropriate implementation vulnerability in iframe sandbox can be exploited to potentially denial of service.
  20. Heap buffer overflow vulnerability in WebRTC can be exploited to potentially denial of service.
  21. Insufficient data validation vulnerability in WebUI can be exploited to potentially denial of service.
  22. Heap buffer overflow vulnerability in history can be exploited to potentially denial of service.
  23. Side-channel information leakage vulnerability in autofill can be exploited to obtain sensitive information.
  24. Inappropriate implementation vulnerability in WebRTC can be exploited to potentially denial of service.
  25. Heap buffer overflow vulnerability in PDFium can be exploited to potentially denial of service.
Эксплуатация

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Пораженные продукты

Google Chrome earlier than 84.0.4147.89

Решение

Update to the latest version
Download Google Chrome

Первичный источник обнаружения
Stable Channel Update for Desktop
Оказываемое влияние
?
OSI 
[?]

DoS 
[?]

SB 
[?]

SUI 
[?]
Связанные продукты
Google Chrome
CVE-IDS
CVE-2020-65364.3Warning
CVE-2020-65294.3Warning
CVE-2020-65189.3Critical
CVE-2020-65209.3Critical
CVE-2020-65256.8High
CVE-2020-65226.8High
CVE-2020-65284.3Warning
CVE-2020-65314.3Warning
CVE-2020-65239.3Critical
CVE-2020-65306.8High
CVE-2020-65106.8High
CVE-2020-65159.3Critical
CVE-2020-65114.3Warning
CVE-2020-65336.8High
CVE-2020-65164.3Warning
CVE-2020-65274.3Warning
CVE-2020-65194.3Warning
CVE-2020-65249.3Critical
CVE-2020-65264.3Warning
CVE-2020-65346.8High
CVE-2020-65129.3Critical
CVE-2020-65354.3Warning
CVE-2020-65179.3Critical
CVE-2020-65214.3Warning
CVE-2020-65144.3Warning
CVE-2020-65136.8High
Узнай статистику распространения уязвимостей в твоем регионе