Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2018.0123 Google Chrome for desktop receives security updates 31 May 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Google Chrome Operating System: Windows Linux variants Mac OS Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Cross-site Scripting -- Remote with User Interaction Denial of Service -- Remote with User Interaction Provide Misleading Information -- Remote with User Interaction Unauthorised Access -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2018-6147 CVE-2018-6145 CVE-2018-6144 CVE-2018-6143 CVE-2018-6142 CVE-2018-6141 CVE-2018-6140 CVE-2018-6139 CVE-2018-6138 CVE-2018-6137 CVE-2018-6136 CVE-2018-6135 CVE-2018-6134 CVE-2018-6133 CVE-2018-6132 CVE-2018-6131 CVE-2018-6130 CVE-2018-6129 CVE-2018-6128 CVE-2018-6127 CVE-2018-6126 CVE-2018-6125 CVE-2018-6124 CVE-2018-6123 Member content until: Saturday, June 30 2018 OVERVIEW Multiple vulnerabilities have been addressed in Google Chrome for Windows, Mac and Linux version 67.0.3396.62. [1] IMPACT "[$3000][835639] High CVE-2018-6123: Use after free in Blink. Reported by Looben Yang on 2018-04-22 [$5000][840320] High CVE-2018-6124: Type confusion in Blink. Reported by Guang Gong of Alpha Team, Qihoo 360 on 2018-05-07 [$5000][818592] High CVE-2018-6125: Overly permissive policy in WebUSB. Reported by Yubico, Inc on 2018-03-05 [$N/A][844457] High CVE-2018-6126: Heap buffer overflow in Skia. Reported by Ivan Fratric of Google Project Zero on 2018-05-18 [$TBD][842990] High CVE-2018-6127: Use after free in indexedDB. Reported by Looben Yang on 2018-05-15 [$TBD][841105] High CVE-2018-6128: uXSS in Chrome on iOS. Reported by Tomasz Bojarski on 2018-05-09 [$N/A][838672] High CVE-2018-6129: Out of bounds memory access in WebRTC. Reported by Natalie Silvanovich of Google Project Zero on 2018-05-01 [$N/A][838402] High CVE-2018-6130: Out of bounds memory access in WebRTC. Reported by Natalie Silvanovich of Google Project Zero on 2018-04-30 [$N/A][826434] High CVE-2018-6131: Incorrect mutability protection in WebAssembly. Reported by Natalie Silvanovich of Google Project Zero on 2018-03-27 [$500][839960] Medium CVE-2018-6132: Use of uninitialized memory in WebRTC. Reported by Ronald E. Crane on 2018-05-04 [$500][817247] Medium CVE-2018-6133: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-02-28 [$500][797465] Medium CVE-2018-6134: Referrer Policy bypass in Blink. Reported by Jun Kokatsu (@shhnjk) on 2017-12-23 [$1000][823353] Medium CVE-2018-6135: UI spoofing in Blink. Reported by Jasper Rebane on 2018-03-19 [$1500][831943] Medium CVE-2018-6136: Out of bounds memory access in V8. Reported by Peter Wong on 2018-04-12 [$2000][835589] Medium CVE-2018-6137: Leak of visited status of page in Blink. Reported by Michael Smith (spinda.net) on 2018-04-21 [$2000][810220] Medium CVE-2018-6138: Overly permissive policy in Extensions. Reported by François Lajeunesse-Robert on 2018-02-08 [$2000][805224] Medium CVE-2018-6139: Restrictions bypass in the debugger extension API. Reported by Rob Wu on 2018-01-24 [$2000][798222] Medium CVE-2018-6140: Restrictions bypass in the debugger extension API. Reported by Rob Wu on 2018-01-01 [$2000][796107] Medium CVE-2018-6141: Heap buffer overflow in Skia. Reported by Yangkang(@dnpushme) & Wanglu of Qihoo360 Qex Team on 2017-12-19 [$4500][837939] Medium CVE-2018-6142: Out of bounds memory access in V8. Reported by Choongwoo Han of Naver Corporation on 2018-04-28 [$TBD][843022] Medium CVE-2018-6143: Out of bounds memory access in V8. Reported by Guang Gong of Alpha Team, Qihoo 360 on 2018-05-15 [$500][828049] Low CVE-2018-6144: Out of bounds memory access in PDFium. Reported by pdknsk on 2018-04-02 [$500][805924] Low CVE-2018-6145: Incorrect escaping of MathML in Blink. Reported by Masato Kinugawa on 2018-01-25 [$TBD][818133] Low CVE-2018-6147: Password fields not taking advantage of OS protections in Views. Reported by Michail Pishchagin (Yandex) on 2018-03-02" [1] MITIGATION Google advises updating to Google Chrome version 67.0.3396.62. [1] REFERENCES [1] Stable Channel Update for Desktop https://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop_58.html AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWw8mxmaOgq3Tt24GAQi+yhAApD5h/ti8EZlvt8IAys0jShlbImSuBTJ+ Uql9QAamDnbDdnbscrtz7LJrpacm3OxPkZU+G9bSi/FHLMsdES4cxjiI9WEveXNg xJjNqrD5tUjRHVEhwTxk8qVljRj23gS8HLLPYLAE5eHexAg8Fo2FF/CI8plibORl v4tFRi4QuchsFb63AWzu6y/VoN6XjBwO6ybvjUSeFG/XTAh9PZvTs3wvS5MktMB1 6YddSWbGh3x1i79WlrLlueO4Oyv6YqCKtlI76rngU0eckblBSo/0JTiRUPugEaFQ ryVf6anIjr3ecasfgogddcvvjYFrm90S+z3LdyKrv76WuOqeqm2svtkGFLtSbX9y lGJevwYGSwRuY//5HA1OtKsOUofwND8X/JlXfxJZuQXXwGQg9kHiYaY+2V0A1Qi6 w1QpNtmwA3vDrnr9h3Q1scTb/Q3twBVIJyBG5g+0rzHQfaFIs+mInVLAtyjYiiTS YYwJUyKLjgH8fygCRIHB56hEvWEuMK/FOaMximp2OOC9Gd/bbuRhceLGE+UyVkn3 A0bNizmbzaHWFstaImwasZFOvSoV8D9aPR3tU06uwifmv2nsi1L9VvmI8U0EP3OI C9dOz3+Jh9FxqyYwu4BlzUI51VbgH4bxD/sM2W+gVXxXoay0/USUbXDUKmW7OJza KZuqts85dKc= =5bS3 -----END PGP SIGNATURE-----