-----BEGIN PGP SIGNED MESSAGE-----
AUSCERT Security Bulletin
Multiple vulnerabilities have been identified in Google Chrome
6 June 2017
AusCERT Security Bulletin Summary
Product: Google Chrome
Operating System: UNIX variants (UNIX, Linux, OSX)
Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction
Provide Misleading Information -- Remote with User Interaction
Denial of Service -- Remote with User Interaction
Access Confidential Data -- Remote with User Interaction
Reduced Security -- Remote with User Interaction
CVE Names: CVE-2017-5086 CVE-2017-5085 CVE-2017-5083
CVE-2017-5082 CVE-2017-5081 CVE-2017-5080
CVE-2017-5079 CVE-2017-5078 CVE-2017-5077
CVE-2017-5076 CVE-2017-5075 CVE-2017-5074
CVE-2017-5073 CVE-2017-5072 CVE-2017-5071
Member content until: Thursday, July 6 2017
Multiple vulnerabilities have been identified in Google Chrome prior
to version 59.0.3071.86. 
The vendor has provided the following details regarding the
"[$7500] High CVE-2017-5070: Type confusion in V8. Reported
by Zhao Qixun(@S0rryMybad) of Qihoo 360 Vulcan Team on 2017-05-16
[$3000] High CVE-2017-5071: Out of bounds read in V8.
Reported by Choongwoo Han on 2017-04-26
[$3000] High CVE-2017-5072: Address spoofing in Omnibox.
Reported by Rayyan Bijoora on 2017-04-07
[$2000] High CVE-2017-5073: Use after free in print preview.
Reported by Khalil Zhani on 2017-04-28
[$1000] High CVE-2017-5074: Use after free in Apps
Bluetooth. Reported by anonymous on 2017-03-09
[$2000] Medium CVE-2017-5075: Information leak in CSP
reporting. Reported by Emmanuel Gil Peyrot on 2017-01-05
[$1000] Medium CVE-2017-5086: Address spoofing in Omnibox.
Reported by Rayyan Bijoora on 2017-05-16
[$1000] Medium CVE-2017-5076: Address
spoofing in Omnibox. Reported by Samuel Erb on 2017-05-06
[$1000] Medium CVE-2017-5077: Heap buffer overflow in Skia.
Reported by Sweetchip on 2017-04-28
[$1000] Medium CVE-2017-5078: Possible command injection in
mailto handling. Reported by Jose Carlos Exposito Bueno on 2017-04-12
[$500]Medium CVE-2017-5079: UI spoofing in Blink.
Reported by Khalil Zhani on 2017-04-20
[$500] Medium CVE-2017-5080: Use after free in
credit card autofill. Reported by Khalil Zhani on 2017-04-05
[$N/A] Medium CVE-2017-5081: Extension verification bypass.
Reported by Andrey Kovalev (@L1kvID) Yandex Security Team on
[$N/A] Low CVE-2017-5082: Insufficient hardening
in credit card editor. Reported by Nightwatch Cybersecurity Research
[$N/A] Low CVE-2017-5083: UI spoofing in Blink. Reported by
Khalil Zhani on 2017-04-24
on WebUI pages. Reported by Zhiyang Zeng of Tencent security
platform department on 2017-02-15" 
The vendor advises users to upgrade to the latest version to fix
 Stable Channel Update for Desktop
AusCERT has made every effort to ensure that the information contained
in this document is accurate. However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.
Australian Computer Emergency Response Team
The University of Queensland
Internet Email: firstname.lastname@example.org
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----