Hash: SHA1

                         AUSCERT Security Bulletin

                 Google have released an update for Chrome
                             8 September 2010


        AusCERT Security Bulletin Summary

Product:              Google Chrome
Operating System:     Windows
                      Linux variants
                      Mac OS X
Impact/Access:        Access Privileged Data         -- Remote with User Interaction
                      Denial of Service              -- Remote with User Interaction
                      Provide Misleading Information -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2010-3259 CVE-2010-3258 CVE-2010-3257
                      CVE-2010-3256 CVE-2010-3255 CVE-2010-3254
                      CVE-2010-3253 CVE-2010-3252 CVE-2010-3251
                      CVE-2010-3250 CVE-2010-3249 CVE-2010-3248
                      CVE-2010-3247 CVE-2010-3246 
Member content until: Sunday, October  3 2010

Revision History:     September 8 2010: Added CVE references
                      September 3 2010: Initial Release


        Google have released an update for Chrome, correcting several security 


        The vendor has provided the following information regarding these
           "* [34414] Low Pop-up blocker bypass with blank frame target. 
              Credit to Google Chrome Security Team (Inferno) and ironfist99.
            * [37201] Medium URL bar visual spoofing with homographic 
              sequences. Credit to Chris Weber of Casaba Security.
            * [41654] Medium Apply more restrictions on setting clipboard 
              content. Credit to Brook Novak.
            * [45659] High Stale pointer with SVG filters. Credit to Tavis 
              Ormandy of the Google Security Team.
            * [45876] Medium Possible installed extension enumeration. Credit 
              to Lostmon.
            * [46750] [51846] Low Browser NULL crash with WebSockets. Credit 
              to Google Chrome Security Team (SkyLined), Google Chrome 
              Security Team (Justin Schuh) and Keith Campbell.
            * [$1000] [50386] High Use-after-free in Notifications presenter. 
              Credit to Sergey Glazunov.
            * [50839] High Notification permissions memory corruption. Credit 
              to Michal Zalewski of the Google Security Team and Google Chrome 
              Security Team (SkyLined).
            * [$1337] [51630] [51739] High Integer errors in WebSockets. 
              Credit to Keith Campbell and Google Chrome Security Team (Cris 
            * [$500] [51653] High Memory corruption with counter nodes. 
              Credit to kuzzcc.
            * [51727] Low Avoid storing excessive autocomplete entries. Credit 
              to Google Chrome Security Team (Inferno).
            * [52443] High Stale pointer in focus handling. Credit to VUPEN 
              Vulnerability Research Team (VUPEN-SR-2010-249).
            * [$1000] [52682] High Sandbox parameter deserialization error. 
              Credit to Ashutosh Mehra and Vineet Batra of the Adobe Reader 
              Sandbox Team.
            * [$500] [53001] Medium Cross-origin image theft. Credit to Isaac 
            This release also fixes [51070] (Windows kernel bug workaround; 
            credit to Marc Schoenefeld), which was incorrectly declared fixed 
            in version 5.0.375.127." [1]


        The latest version of Google Chrome (currently 6.0.472.53) can be
        downloaded from the vendor's website. [2]
        The update can also be applied from within Google Chrome using 
        the built in update feature.


        [1] Stable and Beta Channel Updates

        [2] Google Chrome - Get a fast new browser. For PC, Mac, and Linux

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

Australian Computer Emergency Response Team
The University of Queensland
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
Comment: http://www.auscert.org.au/render.html?it=1967