Kaspersky ID:
KLA11312
Bulunma tarihi:
09/04/2018
Yüklendi:
01/28/2026

Açıklama

Multiple serious vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, obtain sensitive information, bypass security restrictions and spoof user interface. Below is a complete list of vulnerabilities:

  1. An out-of-bounds write vulnerability in V8 can be exploited remotely to cause denial of service and execute arbitrary code;
  2. An out-of-bounds read vulnerability in Blink can be exploited remotely to cause denial of service and execute arbitrary code;
  3. An out-of-bounds read vulnerability in WebAudio can be exploited remotely to cause denial of service and execute arbitrary code;
  4. An out-of-bounds write vulnerability in Mojo can be exploited remotely to cause denial of service and execute arbitrary code;
  5. An out-of-bounds read vulnerability in SwiftShader can be exploited remotely to cause denial of service and execute arbitrary code;
  6. An integer overflow vulnerability in Skia can be exploited remotely to cause denial of service and execute arbitrary code;
  7. An use after free vulnerability in WebRTC can be exploited remotely to cause denial of service and execute arbitrary code;
  8. An cross origin pixel leak vulnerability in Chrome’s interaction with Android’s MediaPlayer can be exploited remotely to obtain sensitive information;
  9. A site isolation bypass vulnerability can be exploited locally via tab restore to obtain sensitive information;
  10. A site isolation bypass vulnerability can be exploited locally via Blob URLS to obtain sensitive information;
  11. An unspecified vulnerability in Blink can be exploited locally to bypass security restrictions and obtain sensitive information;
  12. An out-of-bounds read vulnerability in PDFium can be exploited remotely to cause denial of service;
  13. A content security policy bypass vulnerability in Blink can be exploited to obtain sensitive information;
  14. A credit card information leak vulnerability in Autofill can be exploited to bypass security restrictions;
  15. An URL spoof vulnerability in permission dialogs can be exploited remotely to spoof user interface;
  16. An URL spoof vulnerability in full screen mode can be exploited remotely to spoof user interface;
  17. An unspecified vulnerability in DevTools can be exploited locally to bypass security restrictions and obtain sensitive information;
  18. A stack buffer overflow vulnerabilty in SwiftShader can be exploited remotely to cause denial of service;
  19. An out of bounds read in WebRTC can be exploited to cause denial of service;
  20. An user confirmation bypass in external protocol handling can be exploited locally to bypass security restrictions;
  21. An use after free vulnerability in Memory Instrumentation can be exploited to cause denial of service.

Orijinal öneriler

Kötüye kullanma

Public exploits exist for this vulnerability.

İlgili ürünler

CVE Listesi

  • CVE-2018-16065
    critical
  • CVE-2018-16066
    high
  • CVE-2018-16067
    high
  • CVE-2018-16068
    critical
  • CVE-2018-16069
    high
  • CVE-2018-16070
    critical
  • CVE-2018-16071
    critical
  • CVE-2018-16072
    high
  • CVE-2018-16073
    high
  • CVE-2018-16074
    high
  • CVE-2018-16075
    high
  • CVE-2018-16076
    critical
  • CVE-2018-16077
    high
  • CVE-2018-16078
    high
  • CVE-2018-16079
    high
  • CVE-2018-16080
    high
  • CVE-2018-16081
    high
  • CVE-2018-16082
    high
  • CVE-2018-16083
    critical
  • CVE-2018-16084
    high
  • CVE-2018-16085
    critical
  • CVE-2018-16087
    warning
  • CVE-2018-17457
    critical
  • CVE-2018-16088
    high
  • CVE-2018-16086
    high

Daha fazlasını okuyun

Bölgenizde yayılan güvenlik açıklarının istatistiklerini öğrenin statistics.securelist.com

Bu güvenlik açığının açıklamasında bir tutarsızlık mı tespit ettiniz? Bize bildirin!
Kaspersky IT Security Calculator
Daha fazla bilgi edin
Yeni Kaspersky!
Dijital hayatınız güçlü korumayı hak ediyor!
Daha fazla bilgi edin
Do you want to save your changes?
Your message has been sent successfully.