Skip to main content

Google Chrome Multiple Vulnerabilities

Last Update Date: 15 Jan 2014 11:02 Release Date: 15 Jan 2014 3774 Views

RISK: High Risk

TYPE: Clients - Browsers

TYPE: Browsers

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

  1. A use-after-free error exists within web workers.
  2. A use-after-free error exists related to forms.
  3. An unspecified error can be exploited to spoof the address bar.
  4. An error related to an unprompted sync with a Google account can be exploited to bypass certain security restrictions.
  5. A use-after-free error exists related to speech input elements.
  6. Multiple unspecified errors exist.

Successful exploitation of the vulnerabilities #1, #2, #5, and #6 may allow execution of arbitrary code.


Impact

  • Remote Code Execution
  • Security Restriction Bypass
  • Spoofing

System / Technologies affected

  • Google Chrome for Windows and Chrome Frame prior to version 32.0.1700.76.
  • Google Chrome for Mac and Linux prior to version 32.0.1700.77.

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • Upgrade to version 32.0.1700.76 for Windows and Chrome Frame.
  • Upgrade to version 32.0.1700.77 for Mac and Linux.

Vulnerability Identifier


Source


Related Link