Skip to main content

Google Chrome Multiple Vulnerabilities

Last Update Date: 28 Aug 2014 17:17 Release Date: 28 Aug 2014 3668 Views

RISK: High Risk

TYPE: Clients - Browsers

TYPE: Browsers

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

  1. Some errors within V8, IPC, sync, and extensions can be exploited to execute arbitrary code outside the sandbox.
  2. A use-after-free error exists within SVG, DOM and bindings.
  3. An error within Extension permission dialog can be exploited to spoof certain content.
  4. An error exists within extension debugging.
  5. An uninitialized memory read error exists in WebGL and Web Audio.
  6. Some unspecified errors exist.

Impact

  • Remote Code Execution
  • Security Restriction Bypass
  • Spoofing

System / Technologies affected

  • Versions prior to 37.0.2062.94

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • Upgrade to version 37.0.2062.94.

Vulnerability Identifier


Source


Related Link