-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2014.0060
     A number of vulnerabilities have been identified in Google Chrome
                                14 May 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Google Chrome
Operating System:     Windows
                      OS X
                      Linux variants
Impact/Access:        Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                      Denial of Service               -- Remote/Unauthenticated
                      Access Confidential Data        -- Remote/Unauthenticated
Resolution:           Patch/Upgrade
CVE Names:            CVE-2014-1742 CVE-2014-1741 CVE-2014-1740
Member content until: Friday, June 13 2014

OVERVIEW

        A number of vulnerabilities have been identified in Google Chrome
        prior to version 34.0.1847.137 for Mac and Windows and Linux.
        
        This release also contains a Flash Player update, to version 
        13.0.0.214.


IMPACT

        The vendor has provided the following details regarding these
        vulnerabilities:
        
        "[$2000][358038] High CVE-2014-1740: Use-after-free in WebSockets. Credit to 
        Collin Payne.
        [$1500][349898] High CVE-2014-1741: Integer overflow in DOM ranges. Credit to 
        John Butler.
        [$1000][356690] High CVE-2014-1742: Use-after-free in editing. Credit to 
        cloudfuzzer." [1]


MITIGATION

        The vendor recommends updating to the latest version of
        Google Chrome to correct these issues. [1]


REFERENCES

        [1] Stable Channel Update
            http://googlechromereleases.blogspot.com.au/2014/05/stable-channel-update.html

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=3xHf
-----END PGP SIGNATURE-----