SB2014082702 - Multiple vulnerabilities in Techland Chrome



SB2014082702 - Multiple vulnerabilities in Techland Chrome

Published: August 27, 2014 Updated: August 10, 2020

Security Bulletin ID SB2014082702
Severity
High
Patch available
YES
Number of vulnerabilities 8
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 38% Medium 63%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 8 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2014-3175)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Multiple unspecified vulnerabilities in Google Chrome before 37.0.2062.94 allow attackers to cause a denial of service or possibly have other impact via unknown vectors, related to the load_truetype_glyph function in truetype/ttgload.c in FreeType and other functions in other components.


2) Code Injection (CVE-ID: CVE-2014-3176)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Google Chrome before 37.0.2062.94 does not properly handle the interaction of extensions, IPC, the sync API, and Google V8, which allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-3177.


3) Code Injection (CVE-ID: CVE-2014-3177)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Google Chrome before 37.0.2062.94 does not properly handle the interaction of extensions, IPC, the sync API, and Google V8, which allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-3176.


4) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2014-3170)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

extensions/common/url_pattern.cc in Google Chrome before 37.0.2062.94 does not prevent use of a '' character in a host name, which allows remote attackers to spoof the extension permission dialog by relying on truncation after this character.


5) Input validation error (CVE-ID: CVE-2014-3171)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

Use-after-free vulnerability in the V8 bindings in Blink, as used in Google Chrome before 37.0.2062.94, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper use of HashMap add operations instead of HashMap set operations, related to bindings/core/v8/DOMWrapperMap.h and bindings/core/v8/SerializedScriptValue.cpp. <a href="http://cwe.mitre.org/data/definitions/416.html" target="_blank">CWE-416: Use After Free</a>


6) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2014-3172)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

The Debugger extension API in browser/extensions/api/debugger/debugger_api.cc in Google Chrome before 37.0.2062.94 does not validate a tab's URL before an attach operation, which allows remote attackers to bypass intended access limitations via an extension that uses a restricted URL, as demonstrated by a chrome:// URL.


7) Buffer overflow (CVE-ID: CVE-2014-3173)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The WebGL implementation in Google Chrome before 37.0.2062.94 does not ensure that clear calls interact properly with the state of a draw buffer, which allows remote attackers to cause a denial of service (read of uninitialized memory) via a crafted CANVAS element, related to gpu/command_buffer/service/framebuffer_manager.cc and gpu/command_buffer/service/gles2_cmd_decoder.cc.


8) Buffer overflow (CVE-ID: CVE-2014-3174)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

modules/webaudio/BiquadDSPKernel.cpp in the Web Audio API implementation in Blink, as used in Google Chrome before 37.0.2062.94, does not properly consider concurrent threads during attempts to update biquad filter coefficients, which allows remote attackers to cause a denial of service (read of uninitialized memory) via crafted API calls.


Remediation

Install update from vendor's website.

References