Lucene search

K
kasperskyKaspersky LabKLA10846
HistoryJul 20, 2016 - 12:00 a.m.

KLA10846 Multiple vulnerabilities in Google Chrome

2016-07-2000:00:00
Kaspersky Lab
threats.kaspersky.com
41

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

9.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.106

Percentile

95.0%

Multiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, spoof user interface, bypass security restrictions, execute arbitrary code or obtain sensitive information.

Below is a complete list of vulnerabilities

  1. An improper content security policies implementation at Blink can be exploited remotely via CSP reports reading to obtain sensitive information;
  2. Use-after-free vulnerability at Extensions can be exploited remotely via vectors related to script deletion to cause denial of service or possibly have another unspecified impact;
  3. Lack of security restrictions at Blink can be exploited remotely via a specially designed web site to bypass security restrictions;
  4. Lack of security restrictions at Proxy Auto-Config can be exploited remotely via a specially designed PAC script to obtain sensitive information;
  5. An improper origin information handling during proxy authentication can be exploited remotely via man-in-the-middle attack to spoof user interface or modify client-server data stream;
  6. An improper Secure Context implementation at Service Workers can be exploited remotely via specially designed data to bypass security restrictions;
  7. Use-after-free vulnerability in libxml2 can be exploited remotely via vectors related to XPointer to cause denial of service or possibly have another unspecified impact;
  8. Lack of restrictions can be exploited remotely via a specially designed website to spoof URL display;
  9. An improper objects processing at V8 can be exploited remotely via a specially designed JavaScript code to cause denial of service or possibly have another unspecified impact;
  10. Lack of restrictions at V8 can be exploited remotely via a specially designed web site to bypass security restrictions;
  11. Use-after-free vulnerability at Blink can be exploited remotely via a specially designed JavaScript code to cause denial of service or possibly have another unspecified impact;
  12. Lack of restrictions at Blink can be exploited remotely via a specially designed web site to bypass security restrictions;
  13. Heap buffer overflow at sfntly can be exploited remotely via a specially designed SFNT font to cause denial of service or have another unspecified impact;
  14. Lack of restrictions at Extensions can be exploited remotely via a specially designed web site to cause denial of service or possibly have another unspecified impact;
  15. Lack of restrictions can be exploited remotely via a specially designed web site to spoof user interface; (iOS)
  16. An improper messages validation at PPAPI implementation can be exploited via a specially designed messages to bypass security restrictions;
  17. Multiple unspecified vulnerabilities can be exploited remotely to cause denial of service or possibly have another unknown impact;

Technical details

Vulnerability (1) related to CSPSource::schemeMatches function in WebKit/Source/core/frame/csp/CSPSource.cpp in the Content Security Policy (CSP) implementation which does not apply http policies to https urls and does not apply ws policies to wss urls which makes it easier to determine whether a specific HSTS web site has been visited.

Vulnerability (2) related to extensions/renderer/user_script_injector.cc.

Vulnerability (3) related to WebKit/Source/core/html/parser/HTMLPreloadScanner.cpp which does not consider referrer-policy information inside an HTML document during a preload request. This vulnerability can be exploited to bypass CSP protection.

Vulnerability (4) related to net/proxy/proxy_service.cc which does not ensure that URL information is restricted to a scheme, host, and port . Exploitation of this vulnerability can allow to discover credentials.

Vulnerability (5) can be exploited via proxy authentication login prompt.

Vulnerability (6) can be exploited via https IFRAME element inside an http IFRAME element.

Vulnerability (7) related to the XPointer range-to function.

Vulnerability (8) related to content/renderer/history_controller.cc which does not restrict multiple uses of a JavaScript forward method.

Vulnerability (9) related to improper handling of left-trimmed objects.

Vulnerability (10) related to objects.cc which does not prevent API interceptors from modifying a store target without setting a property.

Vulnerability (11) related to WebKit/Source/core/editing/VisibleUnits.cpp and can be triggered via JavaScript code involving an @import at-rule in a Cascading Style Sheets (CSS) token sequence in conjunction with a rel=import attribute of a LINK element.

Vulnerability (12) related to ChromeClientImpl::createWindow method in WebKit/Source/web/ChromeClientImpl.cpp which does not prevent window creation by a deferred frame.

Vulnerability (13) related to ByteArray::Get method in data/byte_array.cc.

Vulnerability (14) related to inline-installation implementation which does not properly consider lifetime.

Vulnerability (15) related to ios/web/web_state/ui/crw_web_controller.mm which does not ensure that invalid URL is replaced with the about:blank URL.

Vulnerability (16) caused by lack of validation the origin of IPC messages to the plugin broker process that should have come from the browser process. This vulnerability related to broker_process_dispatcher.cc, ppapi_plugin_process_host.cc, ppapi_thread.cc, and render_frame_message_filter.cc.

Original advisories

Google Chrome realases blog

Related products

Google-Chrome

CVE list

CVE-2016-5137 warning

CVE-2016-5136 high

CVE-2016-5135 warning

CVE-2016-5134 warning

CVE-2016-5133 warning

CVE-2016-5132 high

CVE-2016-5131 high

CVE-2016-5130 warning

CVE-2016-5129 high

CVE-2016-5128 high

CVE-2016-5127 high

CVE-2016-1711 high

CVE-2016-1710 high

CVE-2016-1709 high

CVE-2016-1708 high

CVE-2016-1707 warning

CVE-2016-1706 critical

CVE-2016-1705 high

Solution

Update to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk.

Get Google Chrome

Impacts

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Google Chrome versions earlier than 52.0.2743.82 (All branches)

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

9.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.106

Percentile

95.0%