14 November 2011
Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2011.0101 A number of vulnerabilities have been identified in Google Chrome 14 November 2011 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Google Chrome Operating System: UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Reduced Security -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2011-3898 CVE-2011-3897 CVE-2011-3896 CVE-2011-3895 CVE-2011-3894 CVE-2011-3893 CVE-2011-3892 Member content until: Wednesday, December 14 2011 OVERVIEW A number of vulnerabilities have been identified in Google Chrome prior to version 15.0.874.120  IMPACT The vendor has provided the following details regarding these vulnerabilities: "[$500]  High CVE-2011-3892: Double free in Theora decoder. Credit to Aki Helin of OUSPG. [$500]   Medium CVE-2011-3893: Out of bounds reads in MKV and Vorbis media handlers. Credit to Aki Helin of OUSPG.  High CVE-2011-3894: Memory corruption regression in VP8 decoding. Credit to Andrew Scherkus of the Chromium development community. [$1000]  High CVE-2011-3895: Heap overflow in Vorbis decoder. Credit to Aki Helin of OUSPG.  High CVE-2011-3896: Buffer overflow in shader variable mapping. Credit to Ken "strcpy" Russell of the Chromium development community.  High CVE-2011-3897: Use-after-free in editing. Credit to pa_kt reported through ZDI (ZDI-CAN-1416).  Low CVE-2011-3898: Failure to ask for permission to run applets in JRE7. Credit to Google Chrome Security Team (Chris Evans)."  MITIGATION The vendor recommends upgrading to the latest version of Google Chrome to correct these issues.  REFERENCES  Stable Channel Update http://googlechromereleases.blogspot.com/2011/11/stable-channel-update.html AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: email@example.com Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBTsCzy+4yVqjM2NGpAQISmhAAoAbxATOr9RFD/VOqAosujUUkbiaP4Dyb FimEHXFb57N/lpr4vYen78cIj53aZ5rt3mQIR5CmJ2q5VcF//xalehQbfQzARIEX +/TDzLgM2a501181DOU2fev49aiAmhg/xjAYmf2c07e/HN9fUmF3iYRataLo6D94 HEt5YihzKSVJIRaVovCegYpHqv9eYPhOUi+6i2HvaYdc4zDJWYpfgaz9KfasVQj9 7S8zTp/eBlmfpRJpqcS/yNkdS7r/NfdYCoRpk1sHbVsztWSnZPcJ1qcZKs6d/Y1t i68IRCsPpIDbG0kB93pocZsO0IWQs4CyPpEZ48V8g8PIdFG6prQ3IrcsaphCsQFD aAkA9b2Sqyq0VnEgV1PqRTvzq+NIGz7pwgt2zP0/Iyzk0Vl7FEdSaDr6xVjquxAd qK3Sx4oJKqUrUbpW1BOZdnSMtwYmHVHTgIhG2EADx4y1ETPLocRSEWVLa9pq+lu2 OO6jYsiEFdR30EKf0FG7b9CYkAZ4bp3dYBZkT6pK1YpJxX+/mdf8MGxO4Fq1/Nvf 0CPuaBRWpZ5UwszpXBMd9pTmwtno9WIGhJW3UvIEf0LU5rUBhJUuugdIujON99hY iVvKNCDfivuaylkXzQ6AfdeT7TXPwSKylSGogWr09o4cmycPi/KOjLW94nnt0zb6 /i7WV0E6afI= =x1xJ -----END PGP SIGNATURE-----