Lucene search

K
kasperskyKaspersky LabKLA10585
HistoryMay 19, 2015 - 12:00 a.m.

KLA10585 Multiple vulnerabilities in Google Chrome

2015-05-1900:00:00
Kaspersky Lab
threats.kaspersky.com
43

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

10 High

AI Score

Confidence

High

0.067 Low

EPSS

Percentile

93.9%

Multiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to bypass security restrictions, spoof user interface, conduct cross-scripting attack, cause denial of service or execute arbitrary code.

Below is a complete list of vulnerabilities

  1. An unknown vulnerability can be exploited remotely via vectors related to sandbox, DOM, Editing, URL bar;
  2. Use-after-free vulnerability can be exploited remotely via vectors related to WebAudio, SVG, WebRTC and Speech;
  3. Container-overflow can be exploited remotely via vectors related to SVG;
  4. Negative-size parameter can be exploited remotely via vectors related to Libvpx;
  5. Uninitialized value can be exploited remotely via vectors related to PDFium and Blink;
  6. Insecure download can be exploited remotely via vectors related to spellcheck dictionary;
  7. XSS vulnerability can be exploited remotely via vectors related to bookmarks.

Original advisories

Google blog

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

Google-Chrome

CVE list

CVE-2015-1258 critical

CVE-2015-1259 critical

CVE-2015-1265 critical

CVE-2015-1251 high

CVE-2015-1262 critical

CVE-2015-1264 warning

CVE-2015-1252 critical

CVE-2015-3910 critical

CVE-2015-1263 warning

CVE-2015-1260 critical

CVE-2015-1261 warning

CVE-2015-1255 high

CVE-2015-1257 critical

CVE-2015-1256 critical

CVE-2015-1254 warning

CVE-2015-1253 critical

Solution

Update to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk.

Get Google Chrome

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • XSS/CSS

Cross site scripting. Exploitation of vulnerabilities with this impact can lead to partial interception of information transmitted between user and site.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Google Chrome versions earlier than 43.0.2357.65

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

10 High

AI Score

Confidence

High

0.067 Low

EPSS

Percentile

93.9%