Multiple vulnerabilities in Chrome



| Updated: 2023-02-08
Risk Medium
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2014-3154
CVE-2014-3155
CVE-2014-3156
CVE-2014-3157
CWE-ID CWE-20
CWE-119
Exploitation vector Network
Public exploit N/A
Vulnerable software
Google Chrome
Client/Desktop applications / Web browsers

Vendor Google

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Input validation error

EUVDB-ID: #VU41557

Risk: Medium

CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2014-3154

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows remote attackers to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service or possibly have unspecified other impact via vectors related to a Blink shutdown.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Google Chrome: 35.0.1916.0 - 35.0.1916.151

CPE2.3 External links

https://googlechromereleases.blogspot.com/2014/06/stable-channel-update.html
https://secunia.com/advisories/58585
https://secunia.com/advisories/59090
https://secunia.com/advisories/60061
https://secunia.com/advisories/60372
https://security.gentoo.org/glsa/glsa-201408-16.xml
https://www.debian.org/security/2014/dsa-2959
https://www.securityfocus.com/bid/67977
https://code.google.com/p/chromium/issues/detail?id=369525
https://src.chromium.org/viewvc/blink?revision=173620&view=revision
https://src.chromium.org/viewvc/chrome?revision=269345&view=revision


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Input validation error

EUVDB-ID: #VU41558

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2014-3155

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

net/spdy/spdy_write_queue.cc in the SPDY implementation in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service (out-of-bounds read) by leveraging incorrect queue maintenance. Per http://cwe.mitre.org/data/definitions/125.html: "CWE-125: Out-of-bounds Read"

Mitigation

Install update from vendor's website.

Vulnerable software versions

Google Chrome: 35.0.1916.0 - 35.0.1916.151

CPE2.3 External links

https://googlechromereleases.blogspot.com/2014/06/stable-channel-update.html
https://secunia.com/advisories/58585
https://secunia.com/advisories/59090
https://secunia.com/advisories/60061
https://secunia.com/advisories/60372
https://security.gentoo.org/glsa/glsa-201408-16.xml
https://www.debian.org/security/2014/dsa-2959
https://www.securityfocus.com/bid/67980
https://code.google.com/p/chromium/issues/detail?id=369539
https://src.chromium.org/viewvc/chrome?revision=267984&view=revision
https://src.chromium.org/viewvc/chrome?revision=268730&view=revision
https://src.chromium.org/viewvc/chrome?revision=269246&view=revision


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Buffer overflow

EUVDB-ID: #VU41560

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2014-3156

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

Buffer overflow in the clipboard implementation in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger unexpected bitmap data, related to content/renderer/renderer_clipboard_client.cc and content/renderer/webclipboard_impl.cc.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Google Chrome: 35.0.1916.0 - 35.0.1916.151

CPE2.3 External links

https://googlechromereleases.blogspot.com/2014/06/stable-channel-update.html
https://secunia.com/advisories/58585
https://secunia.com/advisories/59090
https://secunia.com/advisories/60061
https://security.gentoo.org/glsa/glsa-201408-16.xml
https://www.debian.org/security/2014/dsa-2959
https://www.securityfocus.com/bid/67981
https://code.google.com/p/chromium/issues/detail?id=369621
https://src.chromium.org/viewvc/chrome?revision=271730&view=revision


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Buffer overflow

EUVDB-ID: #VU41561

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2014-3157

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

Heap-based buffer overflow in the FFmpegVideoDecoder::GetVideoBuffer function in media/filters/ffmpeg_video_decoder.cc in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging VideoFrame data structures that are too small for proper interaction with an underlying FFmpeg library.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Google Chrome: 35.0.1916.0 - 35.0.1916.151

CPE2.3 External links

https://googlechromereleases.blogspot.com/2014/06/stable-channel-update.html
https://secunia.com/advisories/58585
https://secunia.com/advisories/59090
https://secunia.com/advisories/60061
https://secunia.com/advisories/60372
https://security.gentoo.org/glsa/glsa-201408-16.xml
https://www.debian.org/security/2014/dsa-2959
https://www.securityfocus.com/bid/67972
https://code.google.com/p/chromium/issues/detail?id=368980
https://src.chromium.org/viewvc/chrome?revision=268831&view=revision


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###