Lucene search

K
kasperskyKaspersky LabKLA11298
HistoryJul 24, 2018 - 12:00 a.m.

KLA11298 Multiple vulnerabilities in Google Chrome

2018-07-2400:00:00
Kaspersky Lab
threats.kaspersky.com
186

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.096 Low

EPSS

Percentile

94.8%

Multiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions, spoof user interface, gain privileges, write local files and obtain sensitive information. Below is a complete list of vulnerabilities:

A stack buffer overflow vulnerability in Skia can be exploited remotely to execute arbitrary code and cause denial of service;Multiple heap buffer overflow vulnerabilities in WebGL can be exploited remotely to execute arbitrary code and cause denial of service;A use after free vulnerability in WebRTC can be exploited remotely to execute arbitrary code;A heap buffer overflow vulnerability in WebRTC can be exploited remotely to execute arbitrary code and cause denial of service;A use after free vulnerability in Blink can be exploited remotely to execute arbitrary code;Multiple same origin policy bypass vulnerabilities in ServiceWorker can be exploited remotely to bypass security restrictions;A same origin policy bypass vulnerability in WebAudio can be exploited remotely to bypass security restrictions;Multiple URL spoof vulnerabilities in Omnibox can be exploited remotely to spoof user interface;A CORS bypass vulnerabilities in Blink can be exploited remotely to bypass security restrictions;A permission bypass vulnerability in extension installation can be exploited remotely to bypass security restrictions;A type confusion vulnerability in PDFium can be exploited remotely to execute arbitrary code;A use after free vulnerability in WebBluetooth can be exploited remotely to execute arbitrary code;A integer overflow vulnerability in SwiftShader can be exploited remotely to cause denial of service;An unspecified vulnerability in Extensions can be exploited remotely to gain privileges;Multiple cross origin information leak vulnerabilities in Blink can be exploited remotely to obtain sensitive information;A UI spoof vulnerability in Extensions can be exploited remotely to spoof user interface;A local file information leak vulnerability in Extensions can be exploited remotely to obtain sensitive information;A request privilege escalation vulnerability in Extensions can be exploited remotely to gain privileges;A cross origin information disclosure in Service Workers can be exploited remotely to obtain sensitive information;A local file write in DevTools can be exploited locally to write local files.

Original advisories

Stable Channel Update for Desktop

Related products

Google-Chrome

CVE list

CVE-2018-4117 warning

CVE-2018-6169 warning

CVE-2018-6170 high

CVE-2018-6171 warning

CVE-2018-6172 warning

CVE-2018-6173 warning

CVE-2018-6174 high

CVE-2018-6175 warning

CVE-2018-6176 warning

CVE-2018-6177 warning

CVE-2018-6178 warning

CVE-2018-6179 warning

CVE-2018-6044 warning

CVE-2018-6150 warning

CVE-2018-6151 high

CVE-2018-6152 high

CVE-2018-6153 high

CVE-2018-6154 high

CVE-2018-6155 warning

CVE-2018-6156 high

CVE-2018-6157 high

CVE-2018-6158 high

CVE-2018-6159 warning

CVE-2018-6161 high

CVE-2018-6162 high

CVE-2018-6163 warning

CVE-2018-6164 warning

CVE-2018-6165 warning

CVE-2018-6166 warning

CVE-2018-6167 warning

CVE-2018-6168 warning

CVE-2018-6160 warning

CVE-2018-17460 warning

CVE-2018-17461 high

Solution

Update to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk.

Google Chrome download page

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • WLF

Write Local Files. Exploitation of vulnerabilities with this impact can lead to writing into some inaccessible files. Files that can be read depends on concrete program errors.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Goggle Chrome versions earlier than 68

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.096 Low

EPSS

Percentile

94.8%