Skip to main content

Google Chrome Memory Corruption and Security Bypass Vulnerabilities

Last Update Date: 28 Jan 2011 Release Date: 21 Oct 2010 5757 Views

RISK: Medium Risk

Multiple vulnerabilities have been identified in Google Chrome, which could be exploited by attackers to bypass security restrictions, manipulate certain information or compromise a vulnerable system.

1. Due to an unknown error related to autofill / autocomplete profile spamming.

2. Due to a memory corruption error when processing malformed forms, which could be exploited to execute arbitrary code.

3. Due to a memory corruption error related to form autofill, which could be exploited to execute arbitrary code.

4. Due to an error when handling page unloads, which could allow URL spoofing attacks.

5. Due to an unspecified error which could allow malicious web sites to bypass the pop-up blocker.

6. Due to an error related to shutdown with Web Sockets.

7. Due to a bad construction of the PATH variable.

8. Due to a memory corruption error when processing animated GIFs, which could be exploited to execute arbitrary code.

9. Due to a failure to sandbox worker processes on Linux.

10. Due to stale elements in an element map, which could be exploited to execute arbitrary code.


Impact

  • Remote Code Execution
  • Security Restriction Bypass

System / Technologies affected

  • Google Chrome versions prior to 7.0.517.41

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.


Vulnerability Identifier

  • No CVE information is available

Source


Related Link