Google Chrome Multiple Vulnerabilities
Last Update Date:
15 Jan 2014 11:02
Release Date:
15 Jan 2014
3774
Views
RISK: High Risk
TYPE: Clients - Browsers
Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.
- A use-after-free error exists within web workers.
- A use-after-free error exists related to forms.
- An unspecified error can be exploited to spoof the address bar.
- An error related to an unprompted sync with a Google account can be exploited to bypass certain security restrictions.
- A use-after-free error exists related to speech input elements.
- Multiple unspecified errors exist.
Successful exploitation of the vulnerabilities #1, #2, #5, and #6 may allow execution of arbitrary code.
Impact
- Remote Code Execution
- Security Restriction Bypass
- Spoofing
System / Technologies affected
- Google Chrome for Windows and Chrome Frame prior to version 32.0.1700.76.
- Google Chrome for Mac and Linux prior to version 32.0.1700.77.
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Upgrade to version 32.0.1700.76 for Windows and Chrome Frame.
- Upgrade to version 32.0.1700.77 for Mac and Linux.
Vulnerability Identifier
Source
Related Link
Share with