exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 37769

Secunia Security Advisory 37769
Posted Jan 26, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities and weaknesses have been reported in Google Chrome, where some have unknown impacts and others can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, or compromise a user's system.

tags | advisory, vulnerability
SHA-256 | dd68f878fdbf054cbca1b92574b0879c383af48e16f1d0c1b7de16faa96eedcb

Secunia Security Advisory 37769

Change Mirror Download
----------------------------------------------------------------------



Secunia integrated with Microsoft WSUS
http://secunia.com/blog/71/



----------------------------------------------------------------------

TITLE:
Google Chrome Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA37769

VERIFY ADVISORY:
http://secunia.com/advisories/37769/

DESCRIPTION:
Some vulnerabilities and weaknesses have been reported in Google
Chrome, where some have unknown impacts and others can be exploited
by malicious people to disclose potentially sensitive information,
bypass certain security restrictions, or compromise a user's system.

1) A use-after-free error when handling pop-up windows and navigating
away from the current site can be exploited to corrupt memory via a
specially crafted web page.

Successful exploitation may allow execution of arbitrary code.

The vulnerability is confirmed in version 3.0.195.38. Other versions
may also be affected.

2) An unspecified error can be exploited to bypass the pop-up
blocker.

3) A design error in the handling of CSS stylesheets can be exploited
to potentially disclose sensitive information from other domains.

4) An unspecified error allows XMLHttpRequests to directories.

5) An unspecified error exists related to escaping characters in
shortcuts.

6) Unspecified errors exist related to drawing on canvases, which can
corrupt memory.

7) An unspecified error exists during image decoding, which can
corrupt memory.

8) An unspecified error exists, which may result in failure to strip
"Referer".

9) An unspecified error affects cross-domain access.

10) An unspecified error exists in the deserialisation of bitmaps.

SOLUTION:
Upgrade to version 4.0.249.78.

PROVIDED AND/OR DISCOVERED BY:
1) Jakob Balle and Carsten Eiram, Secunia Research.

The vendor credits:
2) SkyLined
3) Chris Evans
4) Chromium development community
5) Michal Zalewski and Inferno of SecureThoughts.com
6) Michal Zalewski and SkyLined
7) Robert Swiecki
8) Chromium development community
9) Tokuji Akamine, Symantec Consulting Services
10) Mark Dowd

ORIGINAL ADVISORY:
Secunia Research:
http://secunia.com/secunia_research/2009-65/

Google:
http://googlechromereleases.blogspot.com/2010/01/stable-channel-update_25.html

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close