SB2021101923 - Multiple vulnerabilities in Google Chrome
Published: October 19, 2021 Updated: October 21, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 16 secuirty vulnerabilities.
1) Improperly implemented security check for standard (CVE-ID: CVE-2021-37989)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to incorrect implementation in Blink in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it and gain access to sensitive information.
2) Improperly implemented security check for standard (CVE-ID: CVE-2021-37995)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to incorrect implementation in WebApp Installer in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it and gain access to sensitive information.
3) Improperly implemented security check for standard (CVE-ID: CVE-2021-37994)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to incorrect implementation in iFrame Sandbox in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it and gain access to sensitive information.
4) Input validation error (CVE-ID: CVE-2021-37996)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to insufficient validation of user-supplied input in Downloads in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it and gain access to sensitive information.
5) Use-after-free (CVE-ID: CVE-2021-37993)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error within PDF Accessibility in Google Chrome. A remote attacker can trick the victim into visiting a specially crafted web page, trigger a use-after-free error and gain access to sensitive information.
6) Out-of-bounds read (CVE-ID: CVE-2021-37992)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within the WebAudio component in Google Chrome. A remote attacker can trick the victim into visiting a specially crafted web page, trigger an out-of-bounds read error and gain access to sensitive information.
7) Race condition (CVE-ID: CVE-2021-37991)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to a race condition in V8 in Google Chrome. A remote attacker can trick the victim to open a specially crafted web page and bypass implemented security restrictions.
8) Improperly implemented security check for standard (CVE-ID: CVE-2021-37990)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to incorrect implementation in WebView in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it and gain access to sensitive information.
9) Use-after-free (CVE-ID: CVE-2021-37988)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error within Profiles in Google Chrome. A remote attacker can trick the victim into visiting a specially crafted web page, trigger a use-after-free error and gain access to sensitive information.
10) Use-after-free (CVE-ID: CVE-2021-37987)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error within Network APIs in Google Chrome. A remote attacker can trick the victim into visiting a specially crafted web page, trigger a use-after-free error and gain access to sensitive information.
11) Heap-based buffer overflow (CVE-ID: CVE-2021-37986)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted HTML content in Settings. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
12) Use-after-free (CVE-ID: CVE-2021-37985)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error within the V8 component in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
13) Heap-based buffer overflow (CVE-ID: CVE-2021-37984)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted HTML content in PDFium. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
14) Use-after-free (CVE-ID: CVE-2021-37983)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error within the Dev Tools component in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
15) Use-after-free (CVE-ID: CVE-2021-37982)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error within the Incognito component in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
16) Heap-based buffer overflow (CVE-ID: CVE-2021-37981)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted HTML content in Skia. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Remediation
Install update from vendor's website.
References
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1233067
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-37989
- https://crbug.com/1242315
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-37995
- https://crbug.com/1100761
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-37994
- https://crbug.com/1243020
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-37996
- https://crbug.com/1255332
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-37993
- https://crbug.com/1253746
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-37992
- https://crbug.com/1250660
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-37991
- https://crbug.com/1247395
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-37990
- https://crbug.com/1228248
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-37988
- https://crbug.com/1206928
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-37987
- https://crbug.com/1242404
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-37986
- https://crbug.com/1241860
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-37985
- https://crbug.com/1253399
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-37984
- https://crbug.com/1249810
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-37983
- https://crbug.com/1248661
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-37982
- https://crbug.com/1246631
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-37981