Skip to main content

Google Chrome Multiple Vulnerabilities

Last Update Date: 10 Feb 2012 14:52 Release Date: 10 Feb 2012 4737 Views

RISK: High Risk

TYPE: Clients - Browsers

TYPE: Browsers

Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions, manipulate certain data, and compromise a user's system.

  1. An unspecified error exists within clipboard monitoring after a paste event.
  2. An unspecified error exists related to excessive database usage.
  3. An unspecified error exists when aborting an IndexDB transaction.
  4. An error exists when handling sandboxed origins inside extensions.
  5. A use-after-free error exists in PDF garbage collection.
  6. A type cast error exists when handling column spans.
  7. An error within locale handling can be exploited to cause a buffer overflow.
  8. An error within audio decoding can be exploited to cause an out-of-bounds read.
  9. An unspecified error exists due to a race condition after a crash of a utility process.
  10. An error within path clipping can be exploited to cause an out-of-bounds read.
  11. An error within PDF fax image handling can be exploited to cause an out-of-bounds read.
  12. An unspecified error when handling drag and drop may lead to URL bar confusion.
  13. An unspecified error exists within a signature check.
  14. A use-after-free error exists within stylesheet error handling.
  15. An unspecified error exists when handling unusual certificates.
  16. A use-after-free error exists within CSS handling.
  17. A use-after-free error exists within SVG layout handling.
  18. An error within libxslt can be exploited to cause an out-of-bounds read.
  19. A use-after-free error exists when handling mousemove events.
  20. An error within shader translator can be exploited to cause an out-of-bounds read.

Impact

  • Remote Code Execution

System / Technologies affected

  • Google Chrome 16.x

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • Upgrade to version 17.0.963.46.

Vulnerability Identifier


Source


Related Link