SB2014082702 - Multiple vulnerabilities in Techland Chrome
Published: August 27, 2014 Updated: August 10, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 8 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2014-3175)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Multiple unspecified vulnerabilities in Google Chrome before 37.0.2062.94 allow attackers to cause a denial of service or possibly have other impact via unknown vectors, related to the load_truetype_glyph function in truetype/ttgload.c in FreeType and other functions in other components.
2) Code Injection (CVE-ID: CVE-2014-3176)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Google Chrome before 37.0.2062.94 does not properly handle the interaction of extensions, IPC, the sync API, and Google V8, which allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-3177.
3) Code Injection (CVE-ID: CVE-2014-3177)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Google Chrome before 37.0.2062.94 does not properly handle the interaction of extensions, IPC, the sync API, and Google V8, which allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-3176.
4) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2014-3170)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
extensions/common/url_pattern.cc in Google Chrome before 37.0.2062.94 does not prevent use of a '