SB2012021810 - Gentoo update for Chromium
Published: February 18, 2012 Updated: September 25, 2016
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 31 secuirty vulnerabilities.
1) Use-after-free (CVE-ID: CVE-2011-3016)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors involving counter nodes, related to a "read-after-free" issue. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
2) Use-after-free (CVE-ID: CVE-2011-3017)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to database handling. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
3) Heap-based buffer overflow (CVE-ID: CVE-2011-3018)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Heap-based buffer overflow in Google Chrome before 17.0.963.56. A remote attacker can use vectors related to path rendering. to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
4) Heap-based buffer overflow (CVE-ID: CVE-2011-3019)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Heap-based buffer overflow in Google Chrome before 17.0.963.56. A remote attacker can use a crafted Matroska video to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
5) Input validation error (CVE-ID: CVE-2011-3020)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Unspecified vulnerability in the Native Client validator implementation in Google Chrome before 17.0.963.56 has unknown impact and remote attack vectors.
6) Use-after-free (CVE-ID: CVE-2011-3021)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to subframe loading. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
7) Cleartext transmission of sensitive information (CVE-ID: CVE-2011-3022)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
translate/translate_manager.cc in Google Chrome before 17.0.963.56 and 19.x before 19.0.1036.7 uses an HTTP session to exchange data for translation, which allows remote attackers to obtain sensitive information by sniffing the network.
8) Use-after-free (CVE-ID: CVE-2011-3023)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to drag-and-drop operations. A user-assisted remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
9) Improper Certificate Validation (CVE-ID: CVE-2011-3024)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Google Chrome before 17.0.963.56 allows remote attackers to cause a denial of service (application crash) via an empty X.509 certificate.
10) Out-of-bounds read (CVE-ID: CVE-2011-3025)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Google Chrome before 17.0.963.56 does not properly parse H.264 data, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
11) Type conversion (CVE-ID: CVE-2011-3027)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Google Chrome before 17.0.963.56 does not properly perform a cast of an unspecified variable during handling of columns, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document.
12) Input validation error (CVE-ID: CVE-2011-3953)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 17.0.963.46 does not prevent monitoring of the clipboard after a paste event, which has unspecified impact and remote attack vectors.
13) Resource exhaustion (CVE-ID: CVE-2011-3954)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service (application crash) via vectors that trigger a large amount of database usage.
14) Input validation error (CVE-ID: CVE-2011-3955)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via vectors that trigger the aborting of an IndexedDB transaction.
15) Origin validation error (CVE-ID: CVE-2011-3956)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The extension implementation in Google Chrome before 17.0.963.46 does not properly handle sandboxed origins, which might allow remote attackers to bypass the Same Origin Policy via a crafted extension.
16) Use-after-free (CVE-ID: CVE-2011-3957)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors involving PDF documents. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
17) Use-after-free (CVE-ID: CVE-2011-3958)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 17.0.963.46 does not properly perform casts of variables during handling of a column span, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document.
18) Buffer overflow (CVE-ID: CVE-2011-3959)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Buffer overflow in the locale implementation in Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
19) Out-of-bounds read (CVE-ID: CVE-2011-3960)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Google Chrome before 17.0.963.46 does not properly decode audio data, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
20) Race condition (CVE-ID: CVE-2011-3961)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Race condition in Google Chrome before 17.0.963.46 allows remote attackers to execute arbitrary code via vectors that trigger a crash of a utility process.
21) Out-of-bounds read (CVE-ID: CVE-2011-3962)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Google Chrome before 17.0.963.46 does not properly perform path clipping, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
22) Out-of-bounds read (CVE-ID: CVE-2011-3963)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Google Chrome before 17.0.963.46 does not properly handle PDF FAX images, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
23) Input validation error (CVE-ID: CVE-2011-3964)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 17.0.963.46 does not properly implement the drag-and-drop feature, which makes it easier for remote attackers to spoof the URL bar via unspecified vectors.
24) Improper Verification of Cryptographic Signature (CVE-ID: CVE-2011-3965)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Google Chrome before 17.0.963.46 does not properly check signatures, which allows remote attackers to cause a denial of service (application crash) via unspecified vectors.
25) Use-after-free (CVE-ID: CVE-2011-3966)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to error handling for Cascading Style Sheets (CSS) token-sequence data. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
26) Input validation error (CVE-ID: CVE-2011-3967)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Unspecified vulnerability in Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service (application crash) via a crafted certificate.
27) Use-after-free (CVE-ID: CVE-2011-3968)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors involving Cascading Style Sheets (CSS) token sequences. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
28) Use-after-free (CVE-ID: CVE-2011-3969)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to layout of SVG documents. A remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
29) Out-of-bounds read (CVE-ID: CVE-2011-3970)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
libxslt, as used in Google Chrome before 17.0.963.46, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
30) Use-after-free (CVE-ID: CVE-2011-3971)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to mousemove events. A user-assisted remote attackers can cause a denial of service or possibly have unspecified other impact.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
31) Out-of-bounds write (CVE-ID: CVE-2011-3972)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
The shader translator implementation in Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
Remediation
Install update from vendor's website.