KLA12048
Multiple vulnerabilities in Google Chrome

Обновлено: 27/01/2021
Дата обнаружения
19/01/2021
Уровень угрозы
Warning
Описание

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions, spoof user interface.

Below is a complete list of vulnerabilities:

  1. Use after free vulnerability in Media can be exploited to cause denial of service or execute arbitrary code.
  2. Uninitialized use vulnerability in USB can be exploited to bypass security restrictions.
  3. Implementation vulnerability in iframe sandbox can be exploited to potentially cause denial of service.
  4. Implementation vulnerability in Performace API can be exploited to potentially cause denial of service.
  5. Policy enforcement vulnerability in WebView can be exploited to bypass security restrictions.
  6. Policy enforcement vulnerability in File System API can be exploited to bypass security restrictions.
  7. Use after free vulnerability in Blink can be exploited to cause denial of service or execute arbitrary code.
  8. Security UI vulnerability in Page Info can be exploited to spoof user interface.
  9. Policy enforcement vulnerability in extensions can be exploited to bypass security restrictions.
  10. Implementation vulnerability in DevTools can be exploited to potentially cause denial of service.
  11. Heap buffer overflow vulnerability in Blink can be exploited to cause denial of service.
  12. Use after free vulnerability in WebSQL can be exploited to cause denial of service or execute arbitrary code.
  13. Use after free vulnerability in DevTools can be exploited to cause denial of service or execute arbitrary code.
  14. Use after free vulnerability in Speech Recognizer can be exploited to cause denial of service or execute arbitrary code.
  15. Policy enforcement vulnerability in Cryptohome can be exploited to bypass security restrictions.
  16. Data validation vulnerability in File System API can be exploited to bypass security restrictions.
  17. Use after free vulnerability in Omnibox can be exploited to cause denial of service or execute arbitrary code.
  18. Use after free vulnerability in WebRTC can be exploited to cause denial of service or execute arbitrary code.
  19. Policy enforcement vulnerability in Downloads can be exploited to bypass security restrictions.
  20. Data validation vulnerability in V8 can be exploited to bypass security restrictions.
Пораженные продукты

Google Chrome earlier than 88.0.4324.96

Решение

Update to the latest version
Download Google Chrome

Первичный источник обнаружения
Stable Channel Update for Desktop
Оказываемое влияние
?
ACE 
[?]

DoS 
[?]

SB 
[?]

SUI 
[?]
Связанные продукты
Google Chrome
CVE-IDS
Узнай статистику распространения уязвимостей в твоем регионе