SB2011080304 - Multiple vulnerabilities in Techland Chrome
Published: August 3, 2011 Updated: August 11, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 27 secuirty vulnerabilities.
1) Out-of-bounds write (CVE-ID: CVE-2011-2791)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The International Components for Unicode (ICU) functionality in Google Chrome before 13.0.782.107 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an out-of-bounds write.
2) Use-after-free (CVE-ID: CVE-2011-2792)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to float removal. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
3) Use-after-free (CVE-ID: CVE-2011-2793)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to media selectors. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
4) Out-of-bounds read (CVE-ID: CVE-2011-2794)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 13.0.782.107 does not properly perform text iteration, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
5) Input validation error (CVE-ID: CVE-2011-2795)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
Google Chrome before 13.0.782.107 does not prevent calls to functions in other frames, which allows remote attackers to bypass intended access restrictions via a crafted web site, related to a "cross-frame function leak."
6) Use-after-free (CVE-ID: CVE-2011-2796)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing unknown vectors. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
7) Use-after-free (CVE-ID: CVE-2011-2797)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to resource caching. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
8) Input validation error (CVE-ID: CVE-2011-2798)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 13.0.782.107 does not properly restrict access to internal schemes, which allows remote attackers to have an unspecified impact via a crafted web site.
9) Use-after-free (CVE-ID: CVE-2011-2799)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to HTML range handling. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
10) Information disclosure (CVE-ID: CVE-2011-2800)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
Google Chrome before 13.0.782.107 allows remote attackers to obtain potentially sensitive information about client-side redirect targets via a crafted web site.
11) Use-after-free (CVE-ID: CVE-2011-2801)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to the frame loader. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
12) Out-of-bounds read (CVE-ID: CVE-2011-2803)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 13.0.782.107 does not properly handle Skia paths, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
13) Improper Neutralization of Special Elements in Output Used by a Downstream Component (CVE-ID: CVE-2011-2805)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 13.0.782.107 allows remote attackers to bypass the Same Origin Policy and conduct script injection attacks via unspecified vectors.
14) Use-after-free (CVE-ID: CVE-2011-2818)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to display box rendering. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
15) Input validation error (CVE-ID: CVE-2011-2819)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 13.0.782.107 allows remote attackers to bypass the Same Origin Policy via vectors related to handling of the base URI.
16) Input validation error (CVE-ID: CVE-2011-2358)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 13.0.782.107 does not ensure that extension installations are confirmed by a browser dialog, which makes it easier for remote attackers to modify the product's functionality via a Trojan horse extension.
17) Input validation error (CVE-ID: CVE-2011-2359)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 13.0.782.107 does not properly track line boxes during rendering, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."
18) Input validation error (CVE-ID: CVE-2011-2360)
The vulnerability allows a remote non-authenticated attacker to manipulate data.
Google Chrome before 13.0.782.107 does not ensure that the user is prompted before download of a dangerous file, which makes it easier for remote attackers to bypass intended content restrictions via a crafted web site.
19) Improper Authentication (CVE-ID: CVE-2011-2361)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The Basic Authentication dialog implementation in Google Chrome before 13.0.782.107 does not properly handle strings, which might make it easier for remote attackers to capture credentials via a crafted web site.
20) Input validation error (CVE-ID: CVE-2011-2783)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 13.0.782.107 does not ensure that developer-mode NPAPI extension installations are confirmed by a browser dialog, which makes it easier for remote attackers to modify the product's functionality via a Trojan horse extension.
21) Information disclosure (CVE-ID: CVE-2011-2784)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
Google Chrome before 13.0.782.107 allows remote attackers to obtain sensitive information via a request for the GL program log, which reveals a local path in an unspecified log entry.
22) Input validation error (CVE-ID: CVE-2011-2785)
The vulnerability allows a remote non-authenticated attacker to manipulate data.
The extensions implementation in Google Chrome before 13.0.782.107 does not properly validate the URL for the home page, which allows remote attackers to have an unspecified impact via a crafted extension.
23) Input validation error (CVE-ID: CVE-2011-2786)
The vulnerability allows a remote non-authenticated attacker to manipulate data.
Google Chrome before 13.0.782.107 does not ensure that the speech-input bubble is shown on the product's screen, which might make it easier for remote attackers to make audio recordings via a crafted web page containing an INPUT element.
24) Input validation error (CVE-ID: CVE-2011-2787)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Google Chrome before 13.0.782.107 does not properly address re-entrancy issues associated with the GPU lock, which allows remote attackers to cause a denial of service (application crash) via unspecified vectors.
25) Buffer overflow (CVE-ID: CVE-2011-2788)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Buffer overflow in the inspector serialization functionality in Google Chrome before 13.0.782.107 allows user-assisted remote attackers to have an unspecified impact via unknown vectors.
26) Use-after-free (CVE-ID: CVE-2011-2789)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to instantiation of the Pepper plug-in. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
27) Use-after-free (CVE-ID: CVE-2011-2790)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors involving floating styles. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
Remediation
Install update from vendor's website.
References
- http://code.google.com/p/chromium/issues/detail?id=86900
- http://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html
- http://osvdb.org/74241
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68953
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14179
- http://code.google.com/p/chromium/issues/detail?id=87148
- http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html
- http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
- http://lists.apple.com/archives/Security-announce/2011//Oct/msg00004.html
- http://osvdb.org/74242
- http://support.apple.com/kb/HT4981
- http://support.apple.com/kb/HT4999
- http://support.apple.com/kb/HT5000
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68954
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14511
- http://code.google.com/p/chromium/issues/detail?id=87227
- http://osvdb.org/74243
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68955
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14554
- http://code.google.com/p/chromium/issues/detail?id=87298
- http://osvdb.org/74244
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68956
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14515
- http://code.google.com/p/chromium/issues/detail?id=87339
- http://osvdb.org/74245
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68957
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14653
- http://code.google.com/p/chromium/issues/detail?id=87548
- http://osvdb.org/74246
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68958
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14093
- http://code.google.com/p/chromium/issues/detail?id=87729
- http://osvdb.org/74247
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68959
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14437
- http://code.google.com/p/chromium/issues/detail?id=87815
- http://osvdb.org/74248
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68960
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14284
- http://code.google.com/p/chromium/issues/detail?id=87925
- http://osvdb.org/74250
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68961
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14617
- http://code.google.com/p/chromium/issues/detail?id=88337
- http://osvdb.org/74251
- http://www.debian.org/security/2011/dsa-2307
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68962
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14711
- http://code.google.com/p/chromium/issues/detail?id=88846
- http://osvdb.org/74252
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68963
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14391
- http://code.google.com/p/chromium/issues/detail?id=88827
- http://osvdb.org/74254
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68965
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14333
- http://code.google.com/p/chromium/issues/detail?id=89520
- http://osvdb.org/74257
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68967
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14583
- http://code.google.com/p/chromium/issues/detail?id=88889
- http://osvdb.org/74255
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68968
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14674
- http://code.google.com/p/chromium/issues/detail?id=90222
- http://osvdb.org/74258
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68969
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13716
- http://code.google.com/p/chromium/issues/detail?id=75821
- http://osvdb.org/74228
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68940
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14425
- http://code.google.com/p/chromium/issues/detail?id=78841
- http://osvdb.org/74229
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68941
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14671
- http://code.google.com/p/chromium/issues/detail?id=79266
- http://osvdb.org/74230
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68942
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14362
- http://code.google.com/p/chromium/issues/detail?id=79426
- http://osvdb.org/74231
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68943
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14595
- http://code.google.com/p/chromium/issues/detail?id=83273
- http://osvdb.org/74233
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68945
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14406
- http://code.google.com/p/chromium/issues/detail?id=83841
- http://osvdb.org/74234
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68946
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14580
- http://code.google.com/p/chromium/issues/detail?id=84402
- http://osvdb.org/74235
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68947
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14298
- http://code.google.com/p/chromium/issues/detail?id=84600
- http://osvdb.org/74236
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68948
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14331
- http://code.google.com/p/chromium/issues/detail?id=84805
- http://osvdb.org/74237
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68949
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14533
- http://code.google.com/p/chromium/issues/detail?id=85559
- http://osvdb.org/74238
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68950
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14330
- http://code.google.com/p/chromium/issues/detail?id=85808
- http://osvdb.org/74239
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68951
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14751
- http://code.google.com/p/chromium/issues/detail?id=86502
- http://osvdb.org/74240
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68952
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14078