-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2009.1102
                   Google Chrome: Execute Arbitrary Code
                              2 October 2009

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Google Chrome
Operating System:     Windows
Impact/Access:        Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Resolution:           Patch/Upgrade
CVE Names:            CVE-2009-0689  
Member content until: Sunday, November  1 2009

OVERVIEW

        Google have released an update for Chrome, correcting a security
        vulnerability.


IMPACT

        The vendor has provided the following information regarding this
        vulnerability:
        
        "CVE-2009-0689 dtoa() error parsing long floating point numbers
        
        The v8 engine uses a common dtoa() implementation to parse strings 
        into floating point numbers. We have applied a patch to fix a recent 
        bug in this component.
        
        Severity: High. An attacker might be able to run arbitrary code 
        within the Google Chrome sandbox." [1]


MITIGATION

        The latest version of Google Chrome can be downloaded from the vendor's
        website. [2]


REFERENCES

        [1] Google Chrome Releases
            http://googlechromereleases.blogspot.com/2009/09/stable-channel-update_30.html

        [2] Google Chrome
            http://www.google.com/chrome

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFKxVHvNVH5XJJInbgRAn9YAJoCl/a5dQ6PKL64u66/nUWIz5m9SwCfbkQQ
vvte5NYCqH9BjOV1h01UUTg=
=KN+h
-----END PGP SIGNATURE-----