Google Chrome Multiple Vulnerabilities
Last Update Date:
28 Aug 2014 17:17
Release Date:
28 Aug 2014
3668
Views
RISK: High Risk
TYPE: Clients - Browsers
Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.
- Some errors within V8, IPC, sync, and extensions can be exploited to execute arbitrary code outside the sandbox.
- A use-after-free error exists within SVG, DOM and bindings.
- An error within Extension permission dialog can be exploited to spoof certain content.
- An error exists within extension debugging.
- An uninitialized memory read error exists in WebGL and Web Audio.
- Some unspecified errors exist.
Impact
- Remote Code Execution
- Security Restriction Bypass
- Spoofing
System / Technologies affected
- Versions prior to 37.0.2062.94
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Upgrade to version 37.0.2062.94.
Vulnerability Identifier
- CVE-2014-3168
- CVE-2014-3169
- CVE-2014-3170
- CVE-2014-3171
- CVE-2014-3172
- CVE-2014-3173
- CVE-2014-3174
- CVE-2014-3175
- CVE-2014-3176
- CVE-2014-3177
Source
Related Link
Share with