Skip to main content

Google Chrome Multiple Vulnerabilities

Last Update Date: 25 Feb 2013 15:59 Release Date: 25 Feb 2013 4397 Views

RISK: High Risk

TYPE: Clients - Browsers

TYPE: Browsers

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

  1. An unspecified error related to web audio node can be exploited to corrupt memory.
  2. A use-after-free error exists in database handling.
  3. An unspecified error exists in Matroska Handling.
  4. An unspecified error exists related to excessive SVG parameters.
  5. An unspecified error exists in Skia.
  6. An unspecified error exists due to inappropriate load of NaCl.
  7. An unspecified error exists due to incorrect NaCl signal handling. (Note: This vulnerability affects the Mac platform only.)
  8. An error exists due to the developer tools process having to many permissions and incorrectly placing too much trust in the connected server.
  9. An out-of-bounds read error exists in Skia.
  10. Some unspecified errors exist due to memory safety issues across the IPC layer.
  11. An integer overflow error exists in blob handling.
  12. Some unspecified errors exist related to IPC layer.
  13. A race condition error exists in media handling.
  14. An error related to vorbis decoding can be exploited to cause a buffer overflow.
  15. An unspecified error exists due to incorrect path handling in file copying. (Note: This vulnerability affects the Linux and Mac platforms only.)
  16. Some unspecified errors exist within the memory management in plug-in message handling.
  17. A use-after-free error exists in URL handling.
  18. An integer overflow error exists in Opus handling.
  19. A race condition error exists in ICU.
  20. An unspecified error exists in the WebKit implementation of MathML.

Impact

  • Remote Code Execution
  • Security Restriction Bypass

System / Technologies affected

  • Google Chrome 24.x

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details. 

  • Upgrade to version 25.0.1364.97 for Windows and Linux and 25.0.1364.99 for Mac.

Vulnerability Identifier


Source


Related Link