Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2015.0113 A number of vulnerabilities have been identified in Google Chrome 3 December 2015 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Google Chrome Operating System: UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Access Privileged Data -- Remote with User Interaction Denial of Service -- Remote with User Interaction Provide Misleading Information -- Remote with User Interaction Reduced Security -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2015-6786 CVE-2015-6785 CVE-2015-6784 CVE-2015-6783 CVE-2015-6782 CVE-2015-6781 CVE-2015-6780 CVE-2015-6779 CVE-2015-6778 CVE-2015-6777 CVE-2015-6776 CVE-2015-6775 CVE-2015-6774 CVE-2015-6773 CVE-2015-6772 CVE-2015-6771 CVE-2015-6770 CVE-2015-6769 CVE-2015-6768 CVE-2015-6767 CVE-2015-6766 CVE-2015-6765 CVE-2015-6764 Member content until: Saturday, January 2 2016 OVERVIEW A number of vulnerabilities have been identified in Google Chrome prior to version 47.0.2526.73. [1] IMPACT The vendor has provided the following information about the vulnerabilities: "This update includes 41 security fixes. Below, we highlight fixes that were contributed by external researchers. Please see the Chromium security page for more information [$10000][558589] Critical CVE-2015-6765: Use-after-free in AppCache. Credit to anonymous. [$11337][551044] High CVE-2015-6766: Use-after-free in AppCache. Credit to anonymous. [$10000][554908] High CVE-2015-6767: Use-after-free in AppCache. Credit to anonymous. [$8000][556724] High CVE-2015-6768: Cross-origin bypass in DOM. Credit to Mariusz Mlynski. [$7500][534923] High CVE-2015-6769: Cross-origin bypass in core. Credit to Mariusz Mlynski. [$7500][541206] High CVE-2015-6770: Cross-origin bypass in DOM. Credit to Mariusz Mlynski. [$7500][544991] High CVE-2015-6771: Out of bounds access in v8. Credit to anonymous. [$7500][546545] High CVE-2015-6772: Cross-origin bypass in DOM. Credit to Mariusz Mlynski. [$7500][554946] High CVE-2015-6764: Out of bounds access in v8. Credit to Guang Gong of Qihoo 360 via pwn2own. [$5000][491660] High CVE-2015-6773: Out of bounds access in Skia. Credit to cloudfuzzer. [$5000][549251] High CVE-2015-6774: Use-after-free in Extensions. Credit to anonymous. [$3500][529012] High CVE-2015-6775: Type confusion in PDFium. Credit to Atte Kettunen of OUSPG. [$3000][457480] High CVE-2015-6776: Out of bounds access in PDFium. Credit to Hanno Bock. [$3000][544020] High CVE-2015-6777: Use-after-free in DOM. Credit to Long Liu of Qihoo 360Vulcan Team. [$2000][514891] Medium CVE-2015-6778: Out of bounds access in PDFium. Credit to Karl Skomski. [$2000][528505] Medium CVE-2015-6779: Scheme bypass in PDFium. Credit to Til Jasper Ullrich. [$1000][490492] Medium CVE-2015-6780: Use-after-free in Infobars. Credit to Khalil Zhani. [$1000][497302] Medium CVE-2015-6781: Integer overflow in Sfntly. Credit to miaubiz. [$1000][536652] Medium CVE-2015-6782: Content spoofing in Omnibox. Credit to Luan Herrera. [$1000][537205] Medium CVE-2015-6783: Signature validation issue in Android Crazy Linker. Credit to Michal Bednarski. [$500][503217] Low CVE-2015-6784: Escaping issue in saved pages. Credit to Inti De Ceukelaire. [$500][534542] Low CVE-2015-6785: Wildcard matching issue in CSP. Credit to Michael Ficarra / Shape Security. [$500][534570] Low CVE-2015-6786: Scheme bypass in CSP. Credit to Michael Ficarra / Shape Security." [1] MITIGATION The vendor recommends updating to the latest version of Google Chrome to correct these issues. [1] REFERENCES [1] Tuesday, December 1, 2015 - Stable Channel Update http://googlechromereleases.blogspot.fr/2015/12/stable-channel-update.html AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVl/EVn6ZAP0PgtI9AQJMlxAAurCgJZtJa3l5aQHQNLEpQ3gTINAww4zY i+ir8lJt9G+R+zDDeTDWasgp5+8bDjSDDJw3Y2534HWwzjCfmRNGpYtrWggtVCw5 cc+VCaTdua9XtuyT6a+2I/yFLC/66OC0Uqir+Z/bYB4ywwVmY3QgUU/tC3PWe0Wq W0aQjdJZaM8ovD/bqgDpqlzZvcdUK3smsfTJcV1D5AdWRB7VkVyA1BIQcatBr4ms f3q06CcjmqytHzFwzxnGp+u2ecqV3MqdlD2gaCqejwChfk+PePU+/T6zEb1/EA5B OxfUvq1BEJiI2gvvXzA1jqxo7Ug4xFFdv/oXE7pgErs0abGw2bZdOiHsEwwzX5cp Ia4YdZ49zXSnYYKoVyhQXz4HPC3XHyH6M4586Rh0DBlCTU4Dt6bLpMr5/eh4HD64 ok9gF/W6CSRur2QknqPUQVNh3eYx0qWQpCOUmo7pDR6q/VGDZxwyv+Yi30LueO0c ZUlUATvMZI6L+tTCcD9fwjKez6U67cOVcHd+g+sLEhzyMvPVxdVBLRt4vsKFnJiz pMokK1wSUpIvMs6rT01VXdktTW0a+VffmhGhBu7WfWPIdh941UYhc/jcUZm7rEfy 1jqE6f4Kf26k10iYZcMguQezYYa+PUjWQBjKGKE0SPPL+asPBjZv2iSz5mjXg5o9 mxF7G1smFN0= =bn7y -----END PGP SIGNATURE-----