-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2013.0026
     A number of vulnerabilities have been identified in Google Chrome
                             25 February 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Google Chrome
Operating System:     Windows
                      Linux variants
                      OS X
Impact/Access:        Execute Arbitrary Code/Commands -- Remote with User Interaction
                      Denial of Service               -- Remote with User Interaction
                      Unauthorised Access             -- Remote with User Interaction
                      Reduced Security                -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2013-0900 CVE-2013-0899 CVE-2013-0898
                      CVE-2013-0897 CVE-2013-0896 CVE-2013-0895
                      CVE-2013-0894 CVE-2013-0893 CVE-2013-0892
                      CVE-2013-0891 CVE-2013-0890 CVE-2013-0889
                      CVE-2013-0888 CVE-2013-0887 CVE-2013-0886
                      CVE-2013-0885 CVE-2013-0884 CVE-2013-0883
                      CVE-2013-0882 CVE-2013-0881 CVE-2013-0880
                      CVE-2013-0879  
Member content until: Wednesday, March 27 2013

OVERVIEW

        A number of vulnerabilities have been identified in Google Chrome prior
        to versions 25.0.1364.97 for Windows and Linux, and 25.0.1364.99 for 
        Mac. [1]


IMPACT

        The vendor has provided the following details regarding these 
        vulnerabilities:
        
        "[$1000] [172243] High CVE-2013-0879: Memory corruption with web audio 
        node. Credit to Atte Kettunen of OUSPG.
        [$1000] [171951] High CVE-2013-0880: Use-after-free in database 
        handling. Credit to Chamal de Silva.
        [$500] [167069] Medium CVE-2013-0881: Bad read in Matroska handling. 
        Credit to Atte Kettunen of OUSPG.
        [$500] [165432] High CVE-2013-0882: Bad memory access with excessive 
        SVG parameters. Credit to Renata Hodovan.
        [$500] [142169] Medium CVE-2013-0883: Bad read in Skia. Credit to Atte 
        Kettunen of OUSPG.
        [172984] Low CVE-2013-0884: Inappropriate load of NaCl. Credit to 
        Google Chrome Security Team (Chris Evans).
        [172369] Medium CVE-2013-0885: Too many API permissions granted to 
        web store.
        [Mac only] [171569] Medium CVE-2013-0886: Incorrect NaCl signal 
        handling. Credit to Mark Seaborn of the Chromium development 
        community.
        [171065] [170836] Low CVE-2013-0887: Developer tools process has too 
        many permissions and places too much trust in the connected server.
        [170666] Medium CVE-2013-0888: Out-of-bounds read in Skia. Credit to 
        Google Chrome Security Team (Inferno).
        [170569] Low CVE-2013-0889: Tighten user gesture check for dangerous 
        file downloads.
        [169973] [169966] High CVE-2013-0890: Memory safety issues across the 
        IPC layer. Credit to Google Chrome Security Team (Chris Evans).
        [169685] High CVE-2013-0891: Integer overflow in blob handling. Credit 
        to Google Chrome Security Team (Jri Aedla).
        [169295] [168710] [166493] [165836] [165747] [164958] [164946] Medium 
        CVE-2013-0892: Lower severity issues across the IPC layer. Credit to 
        Google Chrome Security Team (Chris Evans).
        [168570] Medium CVE-2013-0893: Race condition in media handling. Credit 
        to Andrew Scherkus of the Chromium development community.
        [168473] High CVE-2013-0894: Buffer overflow in vorbis decoding. Credit 
        to Google Chrome Security Team (Inferno).
        [Linux / Mac] [167840] High CVE-2013-0895: Incorrect path handling in 
        file copying. Credit to Google Chrome Security Team (Jri Aedla).
        [166708] High CVE-2013-0896: Memory management issues in plug-in message
        handling. Credit to Google Chrome Security Team (Cris Neckar).
        [165537] Low CVE-2013-0897: Off-by-one read in PDF. Credit to Mateusz
        Jurczyk, with contributions by Gynvael Coldwind, both from Google 
        Security Team.
        [164643] High CVE-2013-0898: Use-after-free in URL handling. Credit to 
        Alexander Potapenko of the Chromium development community.
        [160480] Low CVE-2013-0899: Integer overflow in Opus handling. Credit 
        to Google Chrome Security Team (Jri Aedla).
        [152442] Medium CVE-2013-0900: Race condition in ICU. Credit to Google 
        Chrome Security Team (Inferno)." [1]


MITIGATION

        The vendor recommends updating to the latest version of Google Chrome
        to correct these issues. [1]


REFERENCES

        [1] Stable Channel Update
            http://googlechromereleases.blogspot.com.au/2013/02/stable-channel-update_21.html

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Uykg
-----END PGP SIGNATURE-----