Date: 09 February 2012
References: ESB-2012.0705 ESB-2012.0874 ESB-2012.0885 ESB-2012.0898 ESB-2013.0143.5
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT Security Bulletin
ASB-2012.0019
New release of Google Chrome
9 February 2012
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Chrome
Operating System: UNIX variants (UNIX, Linux, OSX)
Windows
Impact/Access: Denial of Service -- Remote with User Interaction
Resolution: Patch/Upgrade
CVE Names: CVE-2011-3972 CVE-2011-3971 CVE-2011-3970
CVE-2011-3969 CVE-2011-3968 CVE-2011-3967
CVE-2011-3966 CVE-2011-3965 CVE-2011-3964
CVE-2011-3963 CVE-2011-3962 CVE-2011-3961
CVE-2011-3960 CVE-2011-3959 CVE-2011-3958
CVE-2011-3957 CVE-2011-3956 CVE-2011-3955
CVE-2011-3954 CVE-2011-3953
Member content until: Saturday, March 10 2012
OVERVIEW
A number of vulnerabilities have been identified in Google Chrome prior
to version 17.[1]
IMPACT
The Vendor (Google) has provided the following details regarding
these vulnerabilities:
"Critical CVE-2011-3961: Race condition after crash of utility
process. Credit to Shawn Goertzen.
High CVE-2011-3955: Crash aborting an IndexDB transaction.
Credit to David Grogan of the Chromium development community.
High CVE-2011-3957: Use-after-free in PDF garbage collection.
Credit to Aki Helin of OUSPG.
High CVE-2011-3958: Bad casts with column spans. Credit to miaubiz.
High CVE-2011-3959: Buffer overflow in locale handling. Credit to
Aki Helin of OUSPG.
High CVE-2011-3966: Use-after-free in stylesheet error handling.
Credit to Aki Helin of OUSPG.
High CVE-2011-3968: Use-after-free in CSS handling. Credit to Arthur
Gerkis.
High CVE-2011-3969: Use-after-free in SVG layout. Credit to Arthur
Gerkis.
High CVE-2011-3971: Use-after-free with mousemove events. Credit to
Arthur Gerkis." [2]
MITIGATION
The vendor recommends upgrading to the latest version of Google Chrome
to correct these issues. [2]
REFERENCES
[1] Google Chrome v17 release notes
http://googlechromereleases.blogspot.com.au/2012/02/stable-channel-update.html
[2] Get the new Google Chrome v17
https://www.google.com/chrome?brand=chmo&hl=en
AusCERT has made every effort to ensure that the information contained
in this document is accurate. However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=reSn
-----END PGP SIGNATURE-----
|