navigation bar left navigation bar right

Secunia CSI7
navigation left tab Advisories navigation right tab
navigation left tab Research navigation right tab
navigation left tab Forums navigation right tab
navigation left tab Create Profile navigation right tab
navigation left tab Our Commitment navigation right tab
PSI
PSI API
CSI
OSI
xSI
Vulnerabilities
Programs
Open Discussions
My Threads
Create Thread
Statistics
About

Forum Thread: Google Chrome Multiple Vulnerabilities

You are currently viewing a forum thread in the Secunia Community Forum. Please note that opinions expressed here are not of Secunia but solely reflect those of the user who wrote it.

This thread was submitted in the following forum:
Vulnerabilities

See the original Secunia advisory:
Google Chrome Multiple Vulnerabilities

Secunia Google Chrome Multiple Vulnerabilities
Secunia Official 10th Mar, 2011 01:35
Ranking: 0
Posts: 0
User Since: -
System Score: -
Location: Copenhagen, DK
Multiple vulnerabilities have been reported in Google Chorme, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system.

1) An error when handling sandboxed frames can be exploited to navigate to or close the top location.

2) An unspecified error can lead to cross-origin message leaks.

3) An error related to counter nodes can be exploited to corrupt memory.

4) An error when handling box layout may lead to a stale node.

5) An error in certain workers can lead to cross-origin message leaks.

6) A use-after-free error exists within the DOM URL handling.

7) An error when handling unicode ranges can be exploited to cause an out-of-bounds read.

This vulnerability affects builds for Linux only.

8) An error in v8 can be exploited to bypass the same origin policy.

9) An unspecified error allows bypassing the pop-up blocker.

10) A use-after-free error exists within the document script lifetime handling.

11) An error within the OGG container can be exploited to cause an out-of-bounds write.

12) An error when handling table painting may lead to a stale pointer.

13) An error within the video code may result in use of corrupt out-of-bounds structures.

14) An unspecified error exists in the handling of the DataView object.

15) An error related to a bad cast exists within the handling of text rendering.

16) An error in the WebKit context code can lead to a stale pointer.

17) An error in XSLT may leak heap addresses.

18) An error in the handling of SVG cursors can lead to a stale pointer.

19) An error when handling attributes can be exploited to corrupt the DOM tree.

20) An error when handling re-entrancy of RegExp code can lead to memory corruption.

21) An error in v8 can be exploited to access invalid memory.

The vulnerabilities are reported in versions prior to 10.0.648.127.

maravilha00

RE: Google Chrome Multiple Vulnerabilities
[+]
This reply has been minimised due to a negative Relevancy Score.

camperpride

RE: Google Chrome Multiple Vulnerabilities
[+]
This reply has been minimised due to a negative Relevancy Score.

Igpol

RE: Google Chrome Multiple Vulnerabilities
[+]
This reply has been minimised due to a negative Relevancy Score.
Anthony Wells RE: Google Chrome Multiple Vulnerabilities
Expert Contributor 10th Mar, 2011 13:27
Score: 2463
Posts: 3,348
User Since: 19th Dec 2007
System Score: N/A
Location: N/A

For the three posters above ,

You may not be aware that the comments section under any Secunia Advisory is for technical discussion of the SA itself and the vulnerabilities ; your posting creates a thread in the "vulnerabilities" sub-Forum , but it is still limited to technical input regarding the specific SA .

Your problems are with the PSI itself and not relevant to the SA itself ; besides your problem is already dealt with in other threads in other parts of the Forum (some already created/commented on by you) .

See :-

http://secunia.com/community/forum/thread/show/779...

Take care

Anthony

--


It always seems impossible until its done.
Nelson Mandela
Was this reply relevant?
+17
-0


 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


Secunia is a member of FIRST Secunia is a member of EDUcause Secunia is a member of The Open Group Secunia is a member of FS-ISAC
 
Secunia © 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability - Disclaimer
follow Secunia on Facebook follow Secunia on Twitter follow Secunia on LinkedIn follow Secunia on YouTube follow Secunia Xing follow Secunias RSS feed follow Secunia on Google+