Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2013.0009 A number of vulnerabilities have been identified in Google Chrome 24 January 2013 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Google Chrome Operating System: Windows Linux variants OS X Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Reduced Security -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2013-0843 CVE-2013-0842 CVE-2013-0841 CVE-2013-0840 CVE-2013-0839 Member content until: Saturday, February 23 2013 OVERVIEW A number of vulnerabilities have been identified in Google Chrome prior to version 24.0.1312.56. IMPACT The vendor has provided the following details regarding these issues: "[$1000] [151008] High CVE-2013-0839: Use-after-free in canvas font handling. Credit to Atte Kettunen of OUSPG. [170532] Medium CVE-2013-0840: Missing URL validation when opening new windows. [169770] High CVE-2013-0841: Unchecked array index in content blocking. Credit to Google Chrome Security Team (Chris Evans). [166867] Medium CVE-2013-0842: Problems with NULL characters embedded in paths. Credit to Google Chrome Security Team (Jri Aedla). [Mac only] [166523] High CVE-2013-0843: Crash with unsupported RTC sampling rate. Credit to Ted Nakamura of the Chromium development community." [1] MITIGATION The vendor recommends updating to the latest version of Google Chrome to correct these vulnerabilities. [1] REFERENCES [1] Stable Channel Update http://googlechromereleases.blogspot.nl/search/label/Stable%20updates AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBUQB7/O4yVqjM2NGpAQKxvA/+NoXMRujunDaGPiqC8MgNFkqcrcOd13UF Y+woezND6ew8Eofh7kxXvOuj/f2Xy0VKS5i5splBBWpdTGWPlbkVtN5O3hD8OGTr 9ghJppcMjdZrB9pswQuB68LdvCQedo33AOHR/IRD5HqoOVgI+A/1iB+RiJbNk4bu 2FjGuidh68yJ6Jh4LhHeCv+XMuBxH3hklcVS6jSVAhXdVomgVEkVLbKVxQtcM3Bz +Mfe3HE2krkUeCSw3BoVFHJW7rmoze2mtTD16O6aZEwHCLeBcpUhfBv8Bvr3gaP4 x7PsPHtpvJ7ZRjSJVxe+LuRhqIZrwOpqUu8wZ8577buOtp5OzmbiZW9jXx/KLt/L X7myyu/iPYXaWJKzT69vOl4HQYa94dNX1QTJntK/m9G7HleFcjrXU0QEa41cN3mz Y7wUQi3i3fd/SfZKXfZ33jR3P36/z8Q1XjNQTGrG+b3308v/T90TtbQLo083b5FZ MbUdGS61Mi4/wdtwjj0UYr0aqmVqgeIr+c/Z7gebDaSPudifis4TdWbszslSBfrK wTRYRK7rAY7iDTLBbRS7/qcCg2uxiJwR9bGQN+jOmJyIT78PZtXLM0jaSR8mizzb akRcaGsrhoHisNI3OL+1vpjEkZ8QdNDoTTC6JuvDuZDR7AU9G9mpoQ4/pLuRozyq gd5Lg2O1Oeg= =3Nnf -----END PGP SIGNATURE-----