Kaspersky ID:
KLA12438
Дата обнаружения:
01/02/2022
Обновлено:
22/01/2024

Описание

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. Implementation vulnerability in Extensions Platform can be exploited to cause denial of service.
  2. Use after free vulnerability in Web Search can be exploited to cause denial of service or execute arbitrary code.
  3. Use after free vulnerability in Reader Mode can be exploited to cause denial of service or execute arbitrary code.
  4. Implementation vulnerability in Full Screen Mode can be exploited to cause denial of service.
  5. Use after free vulnerability in Thumbnail Tab Strip can be exploited to cause denial of service or execute arbitrary code.
  6. Use after free vulnerability in Accessibility can be exploited to cause denial of service or execute arbitrary code.
  7. Use after free vulnerability in Cast can be exploited to cause denial of service or execute arbitrary code.
  8. Use after free vulnerability in Payments can be exploited to cause denial of service or execute arbitrary code.
  9. Use after free vulnerability in Windows Dialog can be exploited to cause denial of service or execute arbitrary code.
  10. Out of bounds memory access vulnerability in V8 can be exploited to cause denial of service.
  11. Heap buffer overflow vulnerability in ANGLE can be exploited to cause denial of service.
  12. Implementation vulnerability in Pointer Lock can be exploited to cause denial of service.
  13. Use after free vulnerability in Safe Browsing can be exploited to cause denial of service or execute arbitrary code.
  14. Use after free vulnerability in Screen Capture can be exploited to cause denial of service or execute arbitrary code.
  15. Use after free vulnerability in Extensions can be exploited to cause denial of service or execute arbitrary code.
  16. Type confusion vulnerability in V8 can be exploited to cause denial of service.
  17. Implementation vulnerability in Scroll can be exploited to cause denial of service.
  18. Policy bypass vulnerability in COOP can be exploited to bypass security restrictions.
  19. Implementation vulnerability in Paint can be exploited to cause denial of service.

Первичный источник обнаружения

Связанные продукты

Список CVE

  • CVE-2022-0466
    high
  • CVE-2022-0456
    high
  • CVE-2022-0453
    high
  • CVE-2022-0455
    warning
  • CVE-2022-0458
    high
  • CVE-2022-0464
    high
  • CVE-2022-0469
    high
  • CVE-2022-0468
    high
  • CVE-2022-0463
    high
  • CVE-2022-0460
    high
  • CVE-2022-0470
    high
  • CVE-2022-0454
    high
  • CVE-2022-0467
    high
  • CVE-2022-0452
    high
  • CVE-2022-0459
    high
  • CVE-2022-0465
    high
  • CVE-2022-0457
    high
  • CVE-2022-0462
    warning
  • CVE-2022-0461
    high
  • CVE-2022-4025
    warning

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.