SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Browser)  >   Google Chrome Vendors:   Google
Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1027977
SecurityTracker URL:  http://securitytracker.com/id/1027977
CVE Reference:   CVE-2012-5145, CVE-2012-5146, CVE-2012-5147, CVE-2012-5148, CVE-2012-5149, CVE-2012-5150, CVE-2012-5151, CVE-2012-5152, CVE-2012-5153, CVE-2012-5154, CVE-2012-5155, CVE-2012-5156, CVE-2012-5157, CVE-2013-0828, CVE-2013-0829, CVE-2013-0830, CVE-2013-0831, CVE-2013-0832, CVE-2013-0833, CVE-2013-0834, CVE-2013-0835, CVE-2013-0836, CVE-2013-0837, CVE-2013-0838   (Links to External Site)
Date:  Jan 12 2013
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 24.0.1312.52
Description:   Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

A use-after-free may occur in SVG layout [CVE-2012-5145].

A specially crafted URL can bypass same-origin policy [CVE-2012-5146].

A use-after-free may occur in DOM handling [CVE-2012-5147].

Filenames may not be properly sanitized [CVE-2012-5148].

An integer overflow may occur in audio IPC handling [CVE-2012-5149].

A use-after-free may occur when seeking video [CVE-2012-5150].

An integer overflow may occur in PDF JavaScript [CVE-2012-5151].

An out-of-bounds read may occur when seeking video [CVE-2012-5152].

An out-of-bounds stack access may occur in the v8 engine [CVE-2012-5153].

On Windows-based systems, an integer overflow may occur in shared memory allocation [CVE-2012-5154].

Worker processes on OS X may not be properly sandboxed [CVE-2012-5155].

A use-after-free may occur in PDF fields [CVE-2012-5156].

An out-of-bounds read may occur in PDF image handling [CVE-2012-5157].

A bad cast may occur in PDF root handling [CVE-2013-0828].

Corruption of database metadata may allow incorrect file access [CVE-2013-0829].

On Windows-based systems, a missing NUL termination may occur in IPC [CVE-2013-0830].

A path traversal flaw may exist [CVE-2013-0831].

A use-after-free may occur with printing [CVE-2013-0832].

An out-of-bounds read may occur with printing [CVE-2013-0833].

An out-of-bounds read may occur with glyph handling [CVE-2013-0834].

A browser crash may occur with geolocation [CVE-2013-0835].

A crash may occur in the v8 garbage collection [CVE-2013-0836].

A crash may occur in extension tab handling [CVE-2013-0837].

On Linux-based systems, shared memory segments may have insufficient permissions [CVE-2013-0838].

Atte Kettunen of OUSPG, Erling A Ellingsen of Facebook, Subodh Iyengar of Facebook, Jose A. Vazquez, Google Chrome Security Team (Justin Schuh), Google Chrome Security Team (Chris Evans), Google Chrome Security Team (Inferno), Google Chrome Security
Team (Julien Tinnes), Mateusz Jurczyk of Google Security Team, Gynvael Coldwind of Google Security Team, Andreas Rossberg of the Chromium development community, Google Chrome Security Team (Juri Aedla), Google Chrome Security Team (Tom Sepez), Google
Chrome Security Team (Cris Neckar), Arthur Gerkis, Tom Nielsen, and Google Chrome Security Team (Chris Palmer) reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   The vendor has issued a fix (24.0.1312.52).

The vendor's advisory is available at:

http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html

Vendor URL:  googlechromereleases.blogspot.com/2013/01/stable-channel-update.html (Links to External Site)
Cause:   Access control error, Boundary error
Underlying OS:  Linux (Any), UNIX (macOS/OS X), Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC