Lucene search

K
kasperskyKaspersky LabKLA11152
HistoryDec 07, 2017 - 12:00 a.m.

KLA11152 Multiple vulnerabilities in Google Chrome

2017-12-0700:00:00
Kaspersky Lab
threats.kaspersky.com
118

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.028

Percentile

90.7%

Multiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, obtain sensitive information, spoof user interface, bypass security restrictions and possibly to execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. Out of bounds write in QUIC can be exploited remotely possibly to bypass security restrictions;
  2. Heap buffer overflow in PDFium can be exploited remotely possibly to execute arbitrary code;
  3. Out of bounds write in Skia can be exploited remotely possibly to execute arbitrary code;
  4. Use after free in PDFium can be exploited remotely possibly to execute arbitrary code;
  5. Use after free in libXML can be exploited remotely possibly to execute arbitrary code;
  6. Type confusion in WebAssembly can be exploited remotely possibly to bypass security restrictions, execute arbitrary code and obtain sensitive information;
  7. Pointer information disclosure in IPC call can be exploited remotely possibly to obtain sensitive information;
  8. Out of bounds read in Blink can be exploited remotely possibly to obtain sensitive information;
  9. Cross origin information disclosure in Skia can be exploited remotely possibly to obtain sensitive information;
  10. Use of uninitialized value in Skia can be exploited remotely possibly to bypass security restrictions and disclose sensitive information;
  11. Cross origin leak of redirect URL in Blink can be exploited remotely possibly to obtain sensitive information;
  12. URL spoofing in Omniboxcan can be exploited remotely possibly to spoof user interface;
  13. Integer overflow in ICU can be exploited remotely possibly to cause denial of service;
  14. Issue with SPAKE implementation in BoringSSL can be exploited remotely possibly to obtain sensitive information;
  15. Insufficient blocking of JavaScript in Omnibox can be exploited remotely possibly to perform a cross-site scripting (XSS) attack;

Technical details

NB: At this moment Google has just reserved CVE numbers for these vulnerabilities. Information can be changed soon.

Original advisories

Stable Channel Update for Desktop

Related products

Google-Chrome

CVE list

CVE-2017-15422 warning

CVE-2017-15423 warning

CVE-2017-15424 warning

CVE-2017-15425 warning

CVE-2017-15426 warning

CVE-2017-15427 warning

CVE-2017-15407 high

CVE-2017-15408 high

CVE-2017-15409 high

CVE-2017-15410 high

CVE-2017-15411 high

CVE-2017-15412 high

CVE-2017-15413 high

CVE-2017-15415 warning

CVE-2017-15416 warning

CVE-2017-15417 warning

CVE-2017-15418 warning

CVE-2017-15419 warning

CVE-2017-15420 warning

Solution

Update to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk.

Download Google Chrome

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • XSS/CSS

Cross site scripting. Exploitation of vulnerabilities with this impact can lead to partial interception of information transmitted between user and site.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Google Chrome versions earlier thanΒ 63.0.3239.84

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.028

Percentile

90.7%