Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2010.0197.2 Google have released an update for Chrome 26 August 2010 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Google Chrome Operating System: Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Denial of Service -- Remote with User Interaction Provide Misleading Information -- Remote with User Interaction Reduced Security -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2010-3111 CVE-2010-3112 CVE-2010-3113 CVE-2010-3114 CVE-2010-3115 CVE-2010-3116 CVE-2010-3117 CVE-2010-3118 CVE-2010-3119 CVE-2010-3120 Member content until: Wednesday, September 22 2010 Revision History: August 26 2010: Added CVE References August 23 2010: Initial Release OVERVIEW Google have released an update for Chrome, correcting several security vulnerabilities. IMPACT The vendor has provided the following information regarding these vulnerabilities [1]: Aside from the listed security bugs fixed in Chromium, we have also deployed a workaround for a critical vulnerability where the root cause lies in an external component. Credit and $1337 to Marc Schoenefeld for enabling us to work around another Windows kernel bug [51070]. * [$1337] [45400] Critical Memory corruption with file dialog. Credit to Sergey Glazunov. * [$500] [49596] High Memory corruption with SVGs. Credit to wushi of team509. * [$500] [49628] High Bad cast with text editing. Credit to wushi of team509. * [$1000] [49964] High Possible address bar spoofing with history bug. Credit to Mike Taylor. * [$2000] [50515] [51835] High Memory corruption in MIME type handling. Credit to Sergey Glazunov. * [$1337] [50553] Critical Crash on shutdown due to notifications bug. Credit to Sergey Glazunov. * [51146] Medium Stop omnibox autosuggest if the user might be about to type a password. Credit to Robert Hansen. * [$1000] [51654] High Memory corruption with Ruby support. Credit to kuzzcc. * [$1000] [51670] High Memory corruption with Geolocation support. Credit to kuzzcc. MITIGATION The latest version of Google Chrome (currently 5.0.375.127) can be downloaded from the vendor's website. [2] The update can also be applied from within Google Chrome using the built in update feature. REFERENCES [1] Stable Channel Update http://googlechromereleases.blogspot.com/2010/08/stable-channel-update_19.html AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iD8DBQFMdbiJ/iFOrG6YcBERAoWyAJ0RKpk+loHuYuscNF2Onl+CqInn7QCePRG/ 0MsWBAeYA6vwc7xRfU5A/T4= =FkfI -----END PGP SIGNATURE-----