Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading
Highly critical

Google Chrome Multiple Vulnerabilities

-

Release Date:  2010-11-04    Last Update:  2010-11-16    Views:  8,343

Secunia Advisory SA42109

Where:

From remote

Impact:

Unknown, System access

Solution Status:

Vendor Patch

CVE Reference(s):

Description


Multiple vulnerabilities have been reported in Google Chrome, where some have unknown impacts and others can be exploited by malicious people to potentially compromise a user's system.

1) A use-after-free error related to text editing can be exploited to corrupt memory.

2) An unspecified error related to the processing of an enormous text area can be exploited to corrupt memory.

3) An error related to a bad cast exists within the handling of the SVG use element.

4) An error in the XPath handling can be exploited to access invalid memory.

For more information:
SA42175

5) A use-after-free error related to text control selections can be exploited to corrupt memory.

6) Multiple integer overflow errors exist in the font handling.

These vulnerabilities affect only the Linux platform.

7) An error in libvpx can be exploited to corrupt memory.

For more information:
SA42118

8) An unspecified error exists related to the usage of a destroyed frame object.

9) An unspecified error exists related to type confusions with event objects.

10) An unspecified error in the SVG handling can be exploited to trigger an out-of-bounds array access.


Solution:
Update to version 7.0.517.44.

Provided and/or discovered by:
The vendor credits:
1) David Bloom, Google Security Team, Google Chrome Security Team (Inferno), and Google Chrome Security Team (Cris Neckar).
2, 10) wushi, team509
3) kuzzcc
4) Bui Quang Minh, Bkis
5) "vkouchna"
6) Aki Helin, OUSPG.
7) Christoph Diehl
8) Various developers, including "gundlach"
9) "fam.lam" and Google Chrome Security Team (Inferno)

Original Advisory:
http://googlechromereleases.blogspot.com/2010/11/stable-channel-update.html

Deep Links:
Links available to Secunia VIM customers

Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Subject: Google Chrome Multiple Vulnerabilities

User Message
bravejoe RE: Google Chrome Multiple Vulnerabilities
Member 28th Nov, 2010 19:36
Score: -1
Posts: 4
User Since: 29th Nov 2008
System Score: N/A
Location: N/A
Last edited on 28th Nov, 2010 19:36
If I have upgraded to the referenced version of Chrome, 7.0.517.44, then why does it still show up as a threat?
Was this reply relevant?
+0
-0
mogs RE: Google Chrome Multiple Vulnerabilities
Expert Contributor 28th Nov, 2010 20:49
Score: 2265
Posts: 6,266
User Since: 22nd Apr 2009
System Score: 100%
Location: UK
Hello.
Below is a copy of an extract from the advisory :-
) An unspecified error exists related to type confusions with event objects.

10) An unspecified error in the SVG handling can be exploited to trigger an out-of-bounds array access.

Solution
Update to version 7.0.517.44.


Provided and/or discovered by
The vendor credits:
1) David Bloom, Google Security Team, Google Chrome Security Team (Inferno), and Google Chrome Security Team (Cris Neckar).
2, 10) wushi, team509
3) kuzzcc

The advisory is therefore relative to prior versions of Stable Chrome.
If you have an insecurity/vulnerability being reported by psi...tho' you have 7.0.517.44 installed.....it's probable that you havn't deleted the previous version which is not automatically removed. psi will continue to detect older/prior versions even if they are in the Recycle bin.
This section of the forum is reserved for staff discussion specifically related to the advisory......please use other sections in the future.....thankyou.
Hope this helps...regards,


--
Was this reply relevant?
+1
-0

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Factsheets
Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability