SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Browser)  >   Google Chrome Vendors:   Google
Google Chrome Multiple Bugs Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1029330
SecurityTracker URL:  http://securitytracker.com/id/1029330
CVE Reference:   CVE-2013-2931, CVE-2013-6621, CVE-2013-6622, CVE-2013-6623, CVE-2013-6624, CVE-2013-6625, CVE-2013-6626, CVE-2013-6627, CVE-2013-6628, CVE-2013-6629, CVE-2013-6630, CVE-2013-6631   (Links to External Site)
Date:  Nov 12 2013
Impact:   Execution of arbitrary code via network, Modification of system information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 31.0.1650.48
Description:   Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof address bar URLs.

A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

A use-after-free may occur in speech input elements [CVE-2013-6621]. Khalil Zhani reported this vulnerability.

A use-after-free may occur in media elements [CVE-2013-6622]. cloudfuzzer reported this vulnerability.

An out-of-bounds read may occur in SVG [CVE-2013-6623]. miaubiz reported this vulnerability.

A use-after-free may occur in the 'id' attribute strings [CVE-2013-6624]. Jon Butler reported this vulnerability.

A use-after-free may occur in DOM ranges [CVE-2013-6625]. cloudfuzzer reported this vulnerability.

A remote user can spoof address bar URLs [CVE-2013-6626]. Chamal de Silva reported this vulnerability.

An out-of-bounds read may occur in HTTP parsing [CVE-2013-6627]. skylined reported this vulnerability.

Certificates may not be checked during TLS renegotiation [CVE-2013-6628]. Antoine Delignat-Lavaud and Karthikeyan Bhargavan from Prosecco of INRIA Paris reported this vulnerability.

Various other flaws may occur [CVE-2013-2931].

Uninitialized memory may be accessed in libjpeg and libjpeg-turbo [CVE-2013-6629]. Michal Zalewski of Google reported this vulnerability.

Uninitialized memory may be accessed in libjpeg-turbo [CVE-2013-6630]. Michal Zalewski of Google reported this vulnerability.

A use-after-free may occur in libjingle [CVE-2013-6631]. Patrik Hoglund of the Chromium project reported this vulnerability.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can spoof address bar URLs.

Solution:   The vendor has issued a fix (31.0.1650.48).

The vendor's advisory is available at:

http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html

Vendor URL:  googlechromereleases.blogspot.com/2013/11/stable-channel-update.html (Links to External Site)
Cause:   Access control error, Boundary error
Underlying OS:  Linux (Any), UNIX (macOS/OS X), Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC