Date: 08 September 2010
References: ESB-2010.1061 ESB-2010.1066 ESB-2011.0083
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
AUSCERT Security Bulletin
Google have released an update for Chrome
8 September 2010
AusCERT Security Bulletin Summary
Product: Google Chrome
Operating System: Windows
Mac OS X
Impact/Access: Access Privileged Data -- Remote with User Interaction
Denial of Service -- Remote with User Interaction
Provide Misleading Information -- Remote with User Interaction
CVE Names: CVE-2010-3259 CVE-2010-3258 CVE-2010-3257
CVE-2010-3256 CVE-2010-3255 CVE-2010-3254
CVE-2010-3253 CVE-2010-3252 CVE-2010-3251
CVE-2010-3250 CVE-2010-3249 CVE-2010-3248
Member content until: Sunday, October 3 2010
Revision History: September 8 2010: Added CVE references
September 3 2010: Initial Release
Google have released an update for Chrome, correcting several security
The vendor has provided the following information regarding these
"*  Low Pop-up blocker bypass with blank frame target.
Credit to Google Chrome Security Team (Inferno) and ironfist99.
*  Medium URL bar visual spoofing with homographic
sequences. Credit to Chris Weber of Casaba Security.
*  Medium Apply more restrictions on setting clipboard
content. Credit to Brook Novak.
*  High Stale pointer with SVG filters. Credit to Tavis
Ormandy of the Google Security Team.
*  Medium Possible installed extension enumeration. Credit
*   Low Browser NULL crash with WebSockets. Credit
to Google Chrome Security Team (SkyLined), Google Chrome
Security Team (Justin Schuh) and Keith Campbell.
* [$1000]  High Use-after-free in Notifications presenter.
Credit to Sergey Glazunov.
*  High Notification permissions memory corruption. Credit
to Michal Zalewski of the Google Security Team and Google Chrome
Security Team (SkyLined).
* [$1337]   High Integer errors in WebSockets.
Credit to Keith Campbell and Google Chrome Security Team (Cris
* [$500]  High Memory corruption with counter nodes.
Credit to kuzzcc.
*  Low Avoid storing excessive autocomplete entries. Credit
to Google Chrome Security Team (Inferno).
*  High Stale pointer in focus handling. Credit to VUPEN
Vulnerability Research Team (VUPEN-SR-2010-249).
* [$1000]  High Sandbox parameter deserialization error.
Credit to Ashutosh Mehra and Vineet Batra of the Adobe Reader
* [$500]  Medium Cross-origin image theft. Credit to Isaac
This release also fixes  (Windows kernel bug workaround;
credit to Marc Schoenefeld), which was incorrectly declared fixed
in version 5.0.375.127." 
The latest version of Google Chrome (currently 6.0.472.53) can be
downloaded from the vendor's website. 
The update can also be applied from within Google Chrome using
the built in update feature.
 Stable and Beta Channel Updates
 Google Chrome - Get a fast new browser. For PC, Mac, and Linux
AusCERT has made every effort to ensure that the information contained
in this document is accurate. However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.
Australian Computer Emergency Response Team
The University of Queensland
Internet Email: email@example.com
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----