Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2009.1126.2 Google Chrome 3.0.195.32 Released 13 November 2009 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Google Chrome Operating System: Windows Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: ESB-2009-3934 ESB-2009-3933 ESB-2009-3932 ESB-2009-3931 Member content until: Wednesday, December 9 2009 Revision History: November 13 2009: Added CVE References November 9 2009: Initial Release OVERVIEW Google have released an update for Chrome, correcting several security vulnerabilities. IMPACT The vendor has provided the following information regarding these vulnerabilities: "CVE-2009-XXXX User not warned for some file types that can execute JavaScript The user was not warned about certain possibly dangerous file types such as SVG, MHT and XML files. In some browsers, JavaScript can execute within these types of files. Because the JavaScript runs in the local context, it may be able to access local resources." [1] "CVE-2009-XXXX Possible memory corruption in the Gears plugin A malicious site could use the Gears SQL API to put SQL metadata into a bad state, which could cause a subsequent memory corruption. This may lead to a Gears plugin crash or possibly arbitrary code execution." [1] MITIGATION The latest version of Google Chrome can be downloaded from the vendor's website. [2] REFERENCES [1] Google Chrome Releases http://googlechromereleases.blogspot.com/2009/11/stable-channel-update.html [2] Google Chrome http://www.google.com/chrome AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iD8DBQFK/NgANVH5XJJInbgRAktOAJwL+L05X+BE0pQzFf/TXmvbas2JMQCdHGMX QWLAlBz5AhZ4q4+PU1ZGh4c= =fPa1 -----END PGP SIGNATURE-----