Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2011.0068 A number of vulnerabilities have been identified in Google Chrome 25 August 2011 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Google Chrome Operating System: Windows Linux variants Mac OS X Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2011-2839 CVE-2011-2829 CVE-2011-2828 CVE-2011-2827 CVE-2011-2826 CVE-2011-2825 CVE-2011-2824 CVE-2011-2823 CVE-2011-2822 CVE-2011-2821 CVE-2011-2806 Member content until: Saturday, September 24 2011 OVERVIEW A number of vulnerabilities have been identified in Google Chrome prior to version 13.0.782.215. [1] IMPACT The vendor has provided the following details regarding these vulnerabilities: "* [$1000] [Windows only] [72492] Medium CVE-2011-2822: URL parsing confusion on the command line. Credit to Vladimir Vorontsov, ONsec company. * [82552] High CVE-2011-2823: Use-after-free in line box handling. Credit to Google Chrome Security Team (SkyLined) and independent later discovery by miaubiz. * [$1000] [88216] High CVE-2011-2824: Use-after-free with counter nodes. Credit to miaubiz. * [88670] High CVE-2011-2825: Use-after-free with custom fonts. Credit to wushi of team509 reported through ZDI (ZDI-CAN-1283), plus indepdendent later discovery by miaubiz. * [$1000] [89402] High CVE-2011-2821: Double free in libxml XPath handling. Credit to Yang Dingning from NCNIPC, Graduate University of Chinese Academy of Sciences. * [$1000] [87453] High CVE-2011-2826: Cross-origin violation with empty origins. Credit to Sergey Glazunov. * [$1337] [Windows only] [89836] Critical CVE-2011-2806: Memory corruption in vertex handing. Credit to Michael Braithwaite of Turbulenz Limited. * [$1000] [90668] High CVE-2011-2827: Use-after-free in text searching. Credit to miaubiz. * [91517] High CVE-2011-2828: Out-of-bounds write in v8. Credit to Google Chrome Security Team (SkyLined). * [$1500] [32-bit only] [91598] High CVE-2011-2829: Integer overflow in uniform arrays. Credit to Sergey Glazunov. * [$1000] [Linux only] [91665] High CVE-2011-2839: Buggy memset() in PDF. Credit to Aki Helin of OUSPG." [1] MITIGATION The vendor recommends upgrading to the latest version of Google Chrome to correct these issues. [1] REFERENCES [1] Stable Channel Update http://googlechromereleases.blogspot.com/2011/08/stable-channel-update_22.html AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBTlWdMe4yVqjM2NGpAQIwIg/9EpuukggTvxNRQUcYinL/YaejXnT9qu+4 6LXGF0HIB7hMBIvz5dvmHX8u5ht58s8Vufnjrv4eO4KI9CZ1grlGKWKUXkYfIlx1 YIDX6BWLaoHaSikP6QpNasf0fhAx2R/nx9ZQNdUzBwzSkRU5UVEhxbfLYhkMK2As GGKZi6qHOtJcjx9ADKutN4xlfnECxgQW1l5U+K8gAe8Xmf1Xj8OtcJ8ipL79YoDK kqHNQswOep2bOIpzTI5dNJaCRcFaXCqrpQbiCVKmYSm68Gn4DndV3FoiRHDTjX7p YtPkk4qODD2AyLPlcI8qsXwBHEJWG+sO2BXPqKToZwlImkeCmcEs09Lybm8ig2kK 0ImQtSke5IByimoXEUU5BoSln9c7asfLq4mUXgQynt4ipE5WcnU7oiervVo2D6cC Mpplj2j1gr5hHkbk2Yl49YaiOwl+2KWPUdMSpZdSloir1Qui5EJvqLuckaomNwR+ eMwLwovBYm5eBOdPOyLrodGtcEw/rtqHP0nNK745MDxBotEEj8ms+kJS9Ha5yYJd 8sN0qUjJh3AfFrqYNMQCvJYT9vAQSXaAY3w5DPpMTUBvbY2dwmtWprMP+dw/V00m wrRXJG6Q0MZaU/w6Zj94EeAhxk8a6+ZjUq6w/rooysfDov5aMORmya7tR6tywVC5 psu2kEtapPc= =9hGN -----END PGP SIGNATURE-----