Kaspersky ID:
KLA12048
Дата обнаружения:
19/01/2021
Обновлено:
25/01/2024

Описание

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions, spoof user interface.

Below is a complete list of vulnerabilities:

  1. Use after free vulnerability in Media can be exploited to cause denial of service or execute arbitrary code.
  2. Uninitialized use vulnerability in USB can be exploited to bypass security restrictions.
  3. Implementation vulnerability in iframe sandbox can be exploited to potentially cause denial of service.
  4. Implementation vulnerability in Performace API can be exploited to potentially cause denial of service.
  5. Policy enforcement vulnerability in WebView can be exploited to bypass security restrictions.
  6. Policy enforcement vulnerability in File System API can be exploited to bypass security restrictions.
  7. Use after free vulnerability in Blink can be exploited to cause denial of service or execute arbitrary code.
  8. Security UI vulnerability in Page Info can be exploited to spoof user interface.
  9. Policy enforcement vulnerability in extensions can be exploited to bypass security restrictions.
  10. Implementation vulnerability in DevTools can be exploited to potentially cause denial of service.
  11. Heap buffer overflow vulnerability in Blink can be exploited to cause denial of service.
  12. Use after free vulnerability in WebSQL can be exploited to cause denial of service or execute arbitrary code.
  13. Use after free vulnerability in DevTools can be exploited to cause denial of service or execute arbitrary code.
  14. Use after free vulnerability in Speech Recognizer can be exploited to cause denial of service or execute arbitrary code.
  15. Policy enforcement vulnerability in Cryptohome can be exploited to bypass security restrictions.
  16. Data validation vulnerability in File System API can be exploited to bypass security restrictions.
  17. Use after free vulnerability in Omnibox can be exploited to cause denial of service or execute arbitrary code.
  18. Use after free vulnerability in WebRTC can be exploited to cause denial of service or execute arbitrary code.
  19. Policy enforcement vulnerability in Downloads can be exploited to bypass security restrictions.
  20. Data validation vulnerability in V8 can be exploited to bypass security restrictions.

Первичный источник обнаружения

Связанные продукты

Список CVE

  • CVE-2020-16044
    critical
  • CVE-2021-21119
    critical
  • CVE-2021-21140
    high
  • CVE-2021-21139
    high
  • CVE-2021-21135
    high
  • CVE-2021-21136
    high
  • CVE-2021-21129
    high
  • CVE-2021-21130
    high
  • CVE-2021-21122
    critical
  • CVE-2021-21134
    high
  • CVE-2021-21125
    critical
  • CVE-2021-21131
    high
  • CVE-2021-21126
    high
  • CVE-2021-21132
    critical
  • CVE-2021-21128
    critical
  • CVE-2021-21120
    critical
  • CVE-2021-21138
    critical
  • CVE-2021-21137
    high
  • CVE-2021-21124
    critical
  • CVE-2021-21117
    critical
  • CVE-2021-21123
    high
  • CVE-2021-21127
    critical
  • CVE-2021-21141
    high
  • CVE-2021-21121
    critical
  • CVE-2021-21133
    high
  • CVE-2021-21118
    critical

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.