Lucene search

K
kasperskyKaspersky LabKLA11413
HistoryJan 29, 2019 - 12:00 a.m.

KLA11413 Multiple vulnerabilities in Google Chrome

2019-01-2900:00:00
Kaspersky Lab
threats.kaspersky.com
86

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N

9.3 High

AI Score

Confidence

High

0.149 Low

EPSS

Percentile

95.9%

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. Inappropriate implementation vulnerability in QUIC Networking component can be exploited to execute arbitrary code;
  2. Inappropriate implementation vulnerability in V8 component can be exploited to execute arbitrary code;
  3. Use after free vulnerability in PDFium component can be exploited remotely to execute arbitrary code;
  4. Type Confusion vulnerability in SVG component can be exploited remotely to execute arbitrary code;
  5. Use after free vulnerability in Blink component can be exploited remotely to execute arbitrary code;
  6. Use after free vulnerability in HTML select elements can be exploited remotely to execute arbitrary code;
  7. Use after free vulnerability in WebRTC component can be exploited remotely to execute arbitrary code;
  8. Use after free vulnerability in SwiftShader component can be exploited remotely to execute arbitrary code;
  9. Insufficient validation vulnerability in V8 component can be exploited remotely to execute arbitrary code;
  10. Insufficient policy enforcement vulnerability in browser can be exploited remotely to execute arbitrary code;
  11. Stack buffer overflow vulnerability in Skia component can be exploited remotely to bypass security restrictions;
  12. Insufficient policy enforcement vulnerability in Canvas component can be exploited remotely to execute arbitrary code;
  13. Incorrect security vulnerability of UI in WebAPKs component can be exploited remotely to execute arbitrary code;
  14. Insufficient policy enforcement vulnerability in DevTools component can be exploited remotely to execute arbitrary code;
  15. Insufficient validation of untrusted input vulnerability in Blink component can be exploited remotely to execute arbitrary code;
  16. Heap buffer overflow vulnerability in WebGL component can be exploited remotely to execute arbitrary code;
  17. Heap buffer overflow vulnerability in SwiftShader component can be exploited remotely to execute arbitrary code;
  18. Insufficient data validation vulnerability in IndexedDB component can be exploited remotely to execute arbitrary code;
  19. Insufficient validation of untrusted input vulnerability in SafeBrowsing component can be exploited remotely to execute arbitrary code;
  20. Insufficient policy enforcement vulnerability in Omnibox component can be exploited remotely to execute arbitrary code;
  21. Insufficient policy enforcement vulnerability in Extensions component can be exploited remotely to execute arbitrary code;
  22. Insufficient policy enforcement vulnerability in ServiceWorker component can be exploited remotely to execute arbitrary code;
  23. Insufficient validation of untrusted input vulnerability in DevTools component can be exploited remotely to execute arbitrary code;
  24. Use after free vulnerability in FileAPI component can be exploited remotely to execute arbitrary code.

Original advisories

Stable Channel Update for Desktop

Related products

Google-Chrome

CVE list

CVE-2019-5754 warning

CVE-2019-5782 high

CVE-2019-5755 high

CVE-2019-5756 high

CVE-2019-5757 high

CVE-2019-5758 high

CVE-2019-5759 high

CVE-2019-5760 high

CVE-2019-5761 high

CVE-2019-5762 high

CVE-2019-5763 high

CVE-2019-5764 high

CVE-2019-5765 warning

CVE-2019-5785 warning

CVE-2019-5766 warning

CVE-2019-5767 warning

CVE-2019-5768 warning

CVE-2019-5769 high

CVE-2019-5770 high

CVE-2019-5771 high

CVE-2019-5772 high

CVE-2019-5773 warning

CVE-2019-5774 high

CVE-2019-5775 warning

CVE-2019-5776 warning

CVE-2019-5777 warning

CVE-2019-5778 warning

CVE-2019-5779 warning

CVE-2019-5780 warning

CVE-2019-5783 high

CVE-2019-5781 warning

CVE-2019-13684 warning

CVE-2018-20073 warning

CVE-2019-13768 warning

Solution

Update to the latest version

Google Chrome download page

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Google Chrome earlier than 72.0.3626.81

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N

9.3 High

AI Score

Confidence

High

0.149 Low

EPSS

Percentile

95.9%