Google Chrome Memory Corruption and Security Bypass Vulnerabilities
RISK: Medium Risk
Multiple vulnerabilities have been identified in Google Chrome, which could be exploited by attackers to bypass security restrictions, manipulate certain information or compromise a vulnerable system.
1. Due to an unknown error related to autofill / autocomplete profile spamming.
2. Due to a memory corruption error when processing malformed forms, which could be exploited to execute arbitrary code.
3. Due to a memory corruption error related to form autofill, which could be exploited to execute arbitrary code.
4. Due to an error when handling page unloads, which could allow URL spoofing attacks.
5. Due to an unspecified error which could allow malicious web sites to bypass the pop-up blocker.
6. Due to an error related to shutdown with Web Sockets.
7. Due to a bad construction of the PATH variable.
8. Due to a memory corruption error when processing animated GIFs, which could be exploited to execute arbitrary code.
9. Due to a failure to sandbox worker processes on Linux.
10. Due to stale elements in an element map, which could be exploited to execute arbitrary code.
Impact
- Remote Code Execution
- Security Restriction Bypass
System / Technologies affected
- Google Chrome versions prior to 7.0.517.41
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Upgrade to Google Chrome version 7.0.517.41 :
- http://www.google.com/chrome
Vulnerability Identifier
- No CVE information is available
Source
Related Link
Share with