Date: 08 December 2010
References: ESB-2011.0001 ESB-2011.0244 ESB-2011.0275 ESB-2011.0276 ESB-2011.0287
Related Files:
ASB-2010.0246
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT Security Bulletin
ASB-2010.0246.2
Google have released an update for Chrome
8 December 2010
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Google Chrome prior to 8.0.552.215
Operating System: Windows
Linux variants
Mac OS X
Impact/Access: Denial of Service -- Remote with User Interaction
Reduced Security -- Remote with User Interaction
Resolution: Patch/Upgrade
CVE Names: CVE-2010-4482 CVE-2010-4483 CVE-2010-4484
CVE-2010-4485 CVE-2010-4486 CVE-2010-4487
CVE-2010-4488 CVE-2010-4489 CVE-2010-4490
CVE-2010-4491 CVE-2010-4492 CVE-2010-4493
CVE-2010-4494
Member content until: Wednesday, January 5 2011
Revision History: December 8 2010: CVE references added
December 6 2010: Initial Release
OVERVIEW
Google have released an update for Chrome, correcting several security
vulnerabilities.
IMPACT
The vendor has provided the following information regarding these
vulnerabilities:
"* [17655] Low Possible pop-up blocker bypass. Credit to Google Chrome
Security Team (SkyLined).
* [55745] Medium Cross-origin video theft with canvas. Credit to
Nirankush Panchbhai and Microsoft Vulnerability Research (MSVR).
* [56237] Low Browser crash with HTML5 databases. Credit to Google
Chrome Security Team (Inferno).
* [58319] Low Prevent excessive file dialogs, possibly leading to
browser crash. Credit to Cezary Tomczak (gosu.pl).
* [$500] [59554] High Use after free in history handling. Credit to
Stefan Troger.
* [Linux / Mac] [59817] Medium Make sure the dangerous file types
list is uptodate with the Windows platforms. Credit to Billy Rios
of the Google Security Team.
* [61701] Low Browser crash with HTTP proxy authentication. Credit
to Mohammed Bouhlel.
* [61653] Medium Out-of-bounds read regression in WebM video support.
Credit to Google Chrome Security Team (Chris Evans), based on
earlier testcases from Mozilla and Microsoft (MSVR).
* [$1000] [62127] High Crash due to bad indexing with malformed video.
Credit to miaubiz.
* [62168] Medium Possible browser memory corruption via malicious
privileged extension. Credit to kuzzcc.
* [$1000] [62401] High Use after free with SVG animations. Credit to
S?awomir B?az.ek.
* [$500] [63051] Medium Use after free in mouse dragging event
handling. Credit to kuzzcc.
* [$1000] [63444] High Double free in XPath handling. Credit to Yang
Dingning from NCNIPC, Graduate University of Chinese Academy of
Sciences." [1]
MITIGATION
The latest version of Google Chrome (currently 8.0.552.215) can be
downloaded from the vendor's website. [1]
The update can also be applied from within Google Chrome using
the built in update feature.
REFERENCES
[1] Stable, Beta Channel Updates
http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates.html
AusCERT has made every effort to ensure that the information contained
in this document is accurate. However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iD8DBQFM/uoZ/iFOrG6YcBERAtL7AKCgWRErPq7L9xeGXjWk5B+RG7xUNQCfWdzc
LZqN2mxigfeVob7gUu/DUEA=
=ZSeE
-----END PGP SIGNATURE-----
|