SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Web Browser)  >   Google Chrome Vendors:   Google
Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1024390
SecurityTracker URL:  http://securitytracker.com/id/1024390
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Sep 3 2010
Impact:   Disclosure of user information, Execution of arbitrary code via network, Modification of system information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 6.0.472.53
Description:   Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

A remote user can bypass the pop-up blocker.

A remote user can spoof the URL bar contents.

A remote user can determine installed extensions.

A remote user can obtain images from a different domain.

Google Chrome Security Team (Inferno), "ironfist99", Chris Weber of Casaba Security, Brook Novak, Tavis Ormandy of the Google Security Team, Lostmon, Google Chrome Security Team (SkyLined), Google Chrome Security Team (Justin Schuh), Keith Campbell, Sergey Glazunov, Michal Zalewski of the Google Security Team, Google Chrome Security Team (SkyLined), Keith Campbell, Google Chrome Security Team (Cris Neckar), kuzzcc, VUPEN Vulnerability Research Team, Mehra and Vineet Batra of the Adobe Reader Sandbox Team, and Isaac Dawson reported these vulnerabilities.

Impact:   A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can bypass the pop-up blocker.

A remote user can spoof the URL bar contents.

A remote user can determine installed extensions.

A remote user can obtain images from a different domain.

Solution:   The vendor has issued a fix (6.0.472.53).

The vendor's advisory is available at:

http://googlechromereleases.blogspot.com/2010/09/stable-and-beta-channel-updates.html

Vendor URL:  googlechromereleases.blogspot.com/2010/09/stable-and-beta-channel-updates.html (Links to External Site)
Cause:   Not specified
Underlying OS:   Linux (Any), UNIX (OS X), Windows (Any)

Message History:   None.


 Source Message Contents

Date:  Fri, 03 Sep 2010 20:40:44 +0000
Subject:  Google Chrome


http://googlechromereleases.blogspot.com/2010/09/stable-and-beta-channel-updates.html


    * [34414] Low Pop-up blocker bypass with blank frame target. Credit to Google Chrome Security Team (Inferno) and “ironfist99”.
    * [37201] Medium URL bar visual spoofing with homographic sequences. Credit to Chris Weber of Casaba Security.
    * [41654] Medium Apply more restrictions on setting clipboard content. Credit to Brook Novak.
    * [45659] High Stale pointer with SVG filters. Credit to Tavis Ormandy of the Google Security Team.
    * [45876] Medium Possible installed extension enumeration. Credit to Lostmon.
    * [46750] [51846] Low Browser NULL crash with WebSockets. Credit to Google Chrome Security Team (SkyLined), Google Chrome Security Team (Justin Schuh) and Keith Campbell.
    * [$1000] [50386] High Use-after-free in Notifications presenter. Credit to Sergey Glazunov.
    * [50839] High Notification permissions memory corruption. Credit to Michal Zalewski of the Google Security Team and Google Chrome Security Team (SkyLined).
    * [$1337] [51630] [51739] High Integer errors in WebSockets. Credit to Keith Campbell and Google Chrome Security Team (Cris Neckar).
    * [$500] [51653] High Memory corruption with counter nodes. Credit to kuzzcc.
    * [51727] Low Avoid storing excessive autocomplete entries. Credit to Google Chrome Security Team (Inferno).
    * [52443] High Stale pointer in focus handling. Credit to VUPEN Vulnerability Research Team (VUPEN-SR-2010-249).
    * [$1000] [52682] High Sandbox parameter deserialization error. Credit to Ashutosh Mehra and Vineet Batra of the Adobe Reader Sandbox Team.
    * [$500] [53001] Medium Cross-origin image theft. Credit to Isaac Dawson.

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC