SB2018020114 - SUSE Linux update for chromium
Published: February 1, 2018 Updated: July 1, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 24 secuirty vulnerabilities.
1) Spoofing attack (CVE-ID: CVE-2017-15420)
The vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to URL spoofing in OmniBox. A remote attacker can trick the victim into visiting a specially crafted website and conduct domain spoofing attacks.
Successful exploitation of the vulnerability results in address spoofing.
2) Use-after-free error (CVE-ID: CVE-2018-6031)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due use-after-free memory error in PDFium. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
3) Cross-origin bypass (CVE-ID: CVE-2018-6032)
The vulnerability allows a remote attacker to perform XSS attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in Shared Worker. A remote attacker can bypass same origin policy restrictions and access potentially sensitive information.
4) Race condition (CVE-ID: CVE-2018-6033)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to race condition when opening downloaded files. A remote attacker can trick the victim into opening a specially crafted file, trigger race condition and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
5) Integer overflow (CVE-ID: CVE-2018-6034)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow in Blink. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
6) Security restrictions bypass (CVE-ID: CVE-2018-6035)
The vulnerability allows a remote attacker to bypass security restrictions.
The vulnerability exists due to insufficient isolation of devtools from extensions. A remote attacker can trick the victim into visiting a specially crafted website, bypass security restrictions and gain access to system.
7) Integer underflow (CVE-ID: CVE-2018-6036)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due integer underflow in WebAssembly. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and cause the service to crash.
8) Security restrictions bypass (CVE-ID: CVE-2018-6037)
The vulnerability allows a remote attacker to bypass security restrictions.
The vulnerability exists due to insufficient user gesture requirements in autofill. A remote attacker can trick the victim into visiting a specially crafted website, bypass security restrictions and gain access to system.
9) Heap-based buffer overflow (CVE-ID: CVE-2018-6038)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due heap-based buffer overflow in WebGL. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and cause the service to crash.
10) Cross-site scripting (CVE-ID: CVE-2018-6039)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists in DevTools due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
11) Information disclosure (CVE-ID: CVE-2018-6040)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to content security policy bypass. A remote attacker can trick the victim into visiting a specially crafted website, bypass security restrictions and read arbitrary files on the target system.
12) Spoofing attack (CVE-ID: CVE-2018-6041)
The vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to URL spoofing in Navigation. A remote attacker can trick the victim into visiting a specially crafted website and conduct domain spoofing attacks.
Successful exploitation of the vulnerability results in address spoofing.
13) Spoofing attack (CVE-ID: CVE-2018-6042)
The vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to URL spoofing in OmniBox. A remote attacker can trick the victim into visiting a specially crafted website and conduct domain spoofing attacks.
Successful exploitation of the vulnerability results in address spoofing.
14) Security restrictions bypass (CVE-ID: CVE-2018-6043)
The vulnerability allows a remote attacker to bypass security restrictions.
The vulnerability exists due to insufficient escaping with external URL handlers. A remote attacker can trick the victim into visiting a specially crafted website, bypass security restrictions and gain access to system.
15) Security restrictions bypass (CVE-ID: CVE-2018-6045)
The vulnerability allows a remote attacker to bypass security restrictions.
The vulnerability exists due to insufficient isolation of devtools from extensions. A remote attacker can trick the victim into visiting a specially crafted website, bypass security restrictions and gain access to system.
16) Security restrictions bypass (CVE-ID: CVE-2018-6046)
The vulnerability allows a remote attacker to bypass security restrictions.
The vulnerability exists due to шnsufficient isolation of devtools from extensions. A remote attacker can trick the victim into visiting a specially crafted website, bypass security restrictions and gain access to system.
17) Memory leak (CVE-ID: CVE-2018-6047)
The vulnerability allows a remote attacker to obtain potentially sensitive information.The weakness exists due to cross origin leak of redirect URL in in WebGL. A remote attacker can trick the victim into visiting a specially crafted website and read important data from system memory.
18) Security restrictions bypass (CVE-ID: CVE-2018-6048)
The vulnerability allows a remote attacker to bypass security restrictions.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can trick the victim into visiting a specially crafted website, bypass referrer policy in Blink and gain access to system.
19) Spoofing attack (CVE-ID: CVE-2018-6049)
The vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to UI spoofing in Permissions. A remote attacker can create a specially crafted web page, trick the victim into visiting it and conduct domain spoofing attacks.
Successful exploitation of the vulnerability results in address spoofing.
20) Spoofing attack (CVE-ID: CVE-2018-6050)
The vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to URL spoofing in OmniBox. A remote attacker can trick the victim into visiting a specially crafted website and conduct domain spoofing attacks.
Successful exploitation of the vulnerability results in address spoofing.
21) Memory leak (CVE-ID: CVE-2018-6051)
The vulnerability allows a remote attacker to obtain potentially sensitive information.
The vulnerability exists due to referrer leak in XSS Auditor. A remote attacker can trick the victim into visiting a specially crafted website and read arbitrary files on the target system.
22) Security restrictions bypass (CVE-ID: CVE-2018-6052)
The vulnerability allows a remote attacker to bypass security restrictions.
The vulnerability exists due to incomplete no-referrer policy implementation. A remote attacker can trick the victim into visiting a specially crafted website, bypass security restrictions and gain access to system.
23) Memory leak (CVE-ID: CVE-2018-6053)
The vulnerability allows a remote attacker to obtain potentially sensitive information.
The vulnerability exists due to leak of page thumbnails in New Tab Page. A remote attacker can trick the victim into visiting a specially crafted website and read arbitrary files on the target system.
24) Use-after-free error (CVE-ID: CVE-2018-6054)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due use-after-free memory error in WebUI. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and cause the service to crash.
Remediation
Install update from vendor's website.