Multiple vulnerabilities in Techland Chrome



| Updated: 2020-08-11
Risk Medium
Patch available YES
Number of vulnerabilities 9
CVE-ID CVE-2011-3049
CVE-2011-3045
CVE-2011-3050
CVE-2011-3051
CVE-2011-3053
CVE-2011-3054
CVE-2011-3055
CVE-2011-3056
CVE-2011-3057
CWE-ID CWE-20
CWE-190
CWE-416
CWE-269
CWE-306
CWE-346
CWE-125
Exploitation vector Network
Public exploit N/A
Vulnerable software
Google Chrome
Client/Desktop applications / Web browsers

Vendor Google

Security Bulletin

This security bulletin contains information about 9 vulnerabilities.

1) Input validation error

EUVDB-ID: #VU44185

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2011-3049

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

Google Chrome before 17.0.963.83 does not properly restrict the extension web request API, which allows remote attackers to cause a denial of service (disrupted system requests) via a crafted extension.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Google Chrome: 17.0.963.0 - 17.0.963.82

CPE2.3 External links

https://code.google.com/p/chromium/issues/detail?id=108648
https://googlechromereleases.blogspot.com/2012/03/stable-channel-update_21.html
https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00000.html
https://osvdb.org/80295
https://secunia.com/advisories/48527
https://security.gentoo.org/glsa/glsa-201203-19.xml
https://www.securityfocus.com/bid/52674
https://www.securitytracker.com/id?1026841
https://exchange.xforce.ibmcloud.com/vulnerabilities/74218
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15049


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Integer overflow

EUVDB-ID: #VU44186

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2011-3045

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

Integer signedness error in the png_inflate function in pngrutil.c in libpng before 1.4.10beta01, as used in Google Chrome before 17.0.963.83 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file, a different vulnerability than CVE-2011-3026.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Google Chrome: 17.0.963.0 - 17.0.963.82

CPE2.3 External links

https://code.google.com/p/chromium/issues/detail?id=116162
https://googlechromereleases.blogspot.com/2012/03/stable-channel-update_21.html
https://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=commit;h=a8c319a2b281af68f7ca0e2f9a28ca57b44ceb2b
https://lists.fedoraproject.org/pipermail/package-announce/2012-March/075424.html
https://lists.fedoraproject.org/pipermail/package-announce/2012-March/075619.html
https://lists.fedoraproject.org/pipermail/package-announce/2012-March/075981.html
https://lists.fedoraproject.org/pipermail/package-announce/2012-March/075987.html
https://lists.fedoraproject.org/pipermail/package-announce/2012-March/076461.html
https://lists.fedoraproject.org/pipermail/package-announce/2012-March/076731.html
https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00000.html
https://lists.opensuse.org/opensuse-updates/2012-03/msg00051.html
https://rhn.redhat.com/errata/RHSA-2012-0407.html
https://rhn.redhat.com/errata/RHSA-2012-0488.html
https://secunia.com/advisories/48320
https://secunia.com/advisories/48485
https://secunia.com/advisories/48512
https://secunia.com/advisories/48554
https://secunia.com/advisories/49660
https://security.gentoo.org/glsa/glsa-201206-15.xml
https://src.chromium.org/viewvc/chrome?view=rev&revision=125311
https://www.debian.org/security/2012/dsa-2439
https://www.mandriva.com/security/advisories?name=MDVSA-2012:033
https://www.securitytracker.com/id?1026823
https://bugzilla.redhat.com/show_bug.cgi?id=799000
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14763


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Use-after-free

EUVDB-ID: #VU44187

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2011-3050

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing vectors related to the :first-letter pseudo-element. A remote attackers can cause a denial of service or possibly have unspecified other impact.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to version 17.0.963.83.

Vulnerable software versions

Google Chrome: 17.0.963.0 - 17.0.963.82

CPE2.3 External links

https://code.google.com/p/chromium/issues/detail?id=113902
https://googlechromereleases.blogspot.com/2012/03/stable-channel-update_21.html
https://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html
https://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html
https://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00000.html
https://osvdb.org/80288
https://secunia.com/advisories/48512
https://secunia.com/advisories/48527
https://security.gentoo.org/glsa/glsa-201203-19.xml
https://support.apple.com/kb/HT5400
https://support.apple.com/kb/HT5485
https://support.apple.com/kb/HT5503
https://www.securityfocus.com/bid/52674
https://www.securitytracker.com/id?1026841
https://exchange.xforce.ibmcloud.com/vulnerabilities/74210
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14414


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Use-after-free

EUVDB-ID: #VU44188

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2011-3051

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing vectors related to the cross-fade function. A remote attackers can cause a denial of service or possibly have unspecified other impact.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to version 17.0.963.83.

Vulnerable software versions

Google Chrome: 17.0.963.0 - 17.0.963.82

CPE2.3 External links

https://code.google.com/p/chromium/issues/detail?id=116461
https://googlechromereleases.blogspot.com/2012/03/stable-channel-update_21.html
https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00000.html
https://osvdb.org/80289
https://secunia.com/advisories/48512
https://secunia.com/advisories/48527
https://security.gentoo.org/glsa/glsa-201203-19.xml
https://www.securityfocus.com/bid/52674
https://www.securitytracker.com/id?1026841
https://exchange.xforce.ibmcloud.com/vulnerabilities/74211
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15016


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Use-after-free

EUVDB-ID: #VU44190

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2011-3053

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing vectors related to block splitting. A remote attackers can cause a denial of service or possibly have unspecified other impact.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to version 17.0.963.83.

Vulnerable software versions

Google Chrome: 17.0.963.0 - 17.0.963.82

CPE2.3 External links

https://code.google.com/p/chromium/issues/detail?id=116746
https://googlechromereleases.blogspot.com/2012/03/stable-channel-update_21.html
https://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html
https://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html
https://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00000.html
https://osvdb.org/80291
https://secunia.com/advisories/48512
https://secunia.com/advisories/48527
https://security.gentoo.org/glsa/glsa-201203-19.xml
https://support.apple.com/kb/HT5400
https://support.apple.com/kb/HT5485
https://support.apple.com/kb/HT5503
https://www.securityfocus.com/bid/52674
https://www.securitytracker.com/id?1026841
https://exchange.xforce.ibmcloud.com/vulnerabilities/74213
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14658


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Improper Privilege Management

EUVDB-ID: #VU44191

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2011-3054

CWE-ID: CWE-269 - Improper Privilege Management

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to manipulate data.

The WebUI privilege implementation in Google Chrome before 17.0.963.83 does not properly perform isolation, which allows remote attackers to bypass intended access restrictions via unspecified vectors.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Google Chrome: 17.0.963.0 - 17.0.963.82

CPE2.3 External links

https://code.google.com/p/chromium/issues/detail?id=117418
https://googlechromereleases.blogspot.com/2012/03/stable-channel-update_21.html
https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00000.html
https://osvdb.org/80292
https://secunia.com/advisories/48512
https://secunia.com/advisories/48527
https://security.gentoo.org/glsa/glsa-201203-19.xml
https://www.securityfocus.com/bid/52674
https://www.securitytracker.com/id?1026841
https://exchange.xforce.ibmcloud.com/vulnerabilities/74214
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15028


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Missing Authentication for Critical Function

EUVDB-ID: #VU44192

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2011-3055

CWE-ID: CWE-306 - Missing Authentication for Critical Function

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to manipulate data.

The browser native UI in Google Chrome before 17.0.963.83 does not require user confirmation before an unpacked extension installation, which allows user-assisted remote attackers to have an unspecified impact via a crafted extension.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Google Chrome: 17.0.963.0 - 17.0.963.82

CPE2.3 External links

https://code.google.com/p/chromium/issues/detail?id=117736
https://googlechromereleases.blogspot.com/2012/03/stable-channel-update_21.html
https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00000.html
https://secunia.com/advisories/48512
https://secunia.com/advisories/48527
https://security.gentoo.org/glsa/glsa-201203-19.xml
https://www.securityfocus.com/bid/52674
https://www.securitytracker.com/id?1026841
https://exchange.xforce.ibmcloud.com/vulnerabilities/74215
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15033


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Origin validation error

EUVDB-ID: #VU44193

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2011-3056

CWE-ID: CWE-346 - Origin Validation Error

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

Google Chrome before 17.0.963.83 allows remote attackers to bypass the Same Origin Policy via vectors involving a "magic iframe."

Mitigation

Install update from vendor's website.

Vulnerable software versions

Google Chrome: 17.0.963.0 - 17.0.963.82

CPE2.3 External links

https://code.google.com/p/chromium/issues/detail?id=117550
https://googlechromereleases.blogspot.com/2012/03/stable-channel-update_21.html
https://lists.apple.com/archives/security-announce/2012/May/msg00000.html
https://lists.apple.com/archives/security-announce/2012/May/msg00002.html
https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00000.html
https://osvdb.org/80294
https://osvdb.org/81794
https://secunia.com/advisories/47292
https://secunia.com/advisories/48512
https://secunia.com/advisories/48527
https://security.gentoo.org/glsa/glsa-201203-19.xml
https://support.apple.com/kb/HT5282
https://www.securityfocus.com/bid/52674
https://www.securitytracker.com/id?1026841
https://exchange.xforce.ibmcloud.com/vulnerabilities/74216
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14962


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Out-of-bounds read

EUVDB-ID: #VU44194

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2011-3057

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

Google V8, as used in Google Chrome before 17.0.963.83, allows remote attackers to cause a denial of service via vectors that trigger an invalid read operation.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Google Chrome: 17.0.963.0 - 17.0.963.82

CPE2.3 External links

https://code.google.com/p/chromium/issues/detail?id=117794
https://googlechromereleases.blogspot.com/2012/03/stable-channel-update_21.html
https://secunia.com/advisories/48512
https://secunia.com/advisories/48527
https://secunia.com/advisories/48618
https://secunia.com/advisories/48691
https://secunia.com/advisories/48763
https://security.gentoo.org/glsa/glsa-201203-19.xml
https://www.securityfocus.com/bid/52674
https://www.securitytracker.com/id?1026877
https://exchange.xforce.ibmcloud.com/vulnerabilities/74217
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14385


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###