Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2013.0026 A number of vulnerabilities have been identified in Google Chrome 25 February 2013 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Google Chrome Operating System: Windows Linux variants OS X Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Unauthorised Access -- Remote with User Interaction Reduced Security -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2013-0900 CVE-2013-0899 CVE-2013-0898 CVE-2013-0897 CVE-2013-0896 CVE-2013-0895 CVE-2013-0894 CVE-2013-0893 CVE-2013-0892 CVE-2013-0891 CVE-2013-0890 CVE-2013-0889 CVE-2013-0888 CVE-2013-0887 CVE-2013-0886 CVE-2013-0885 CVE-2013-0884 CVE-2013-0883 CVE-2013-0882 CVE-2013-0881 CVE-2013-0880 CVE-2013-0879 Member content until: Wednesday, March 27 2013 OVERVIEW A number of vulnerabilities have been identified in Google Chrome prior to versions 25.0.1364.97 for Windows and Linux, and 25.0.1364.99 for Mac. [1] IMPACT The vendor has provided the following details regarding these vulnerabilities: "[$1000] [172243] High CVE-2013-0879: Memory corruption with web audio node. Credit to Atte Kettunen of OUSPG. [$1000] [171951] High CVE-2013-0880: Use-after-free in database handling. Credit to Chamal de Silva. [$500] [167069] Medium CVE-2013-0881: Bad read in Matroska handling. Credit to Atte Kettunen of OUSPG. [$500] [165432] High CVE-2013-0882: Bad memory access with excessive SVG parameters. Credit to Renata Hodovan. [$500] [142169] Medium CVE-2013-0883: Bad read in Skia. Credit to Atte Kettunen of OUSPG. [172984] Low CVE-2013-0884: Inappropriate load of NaCl. Credit to Google Chrome Security Team (Chris Evans). [172369] Medium CVE-2013-0885: Too many API permissions granted to web store. [Mac only] [171569] Medium CVE-2013-0886: Incorrect NaCl signal handling. Credit to Mark Seaborn of the Chromium development community. [171065] [170836] Low CVE-2013-0887: Developer tools process has too many permissions and places too much trust in the connected server. [170666] Medium CVE-2013-0888: Out-of-bounds read in Skia. Credit to Google Chrome Security Team (Inferno). [170569] Low CVE-2013-0889: Tighten user gesture check for dangerous file downloads. [169973] [169966] High CVE-2013-0890: Memory safety issues across the IPC layer. Credit to Google Chrome Security Team (Chris Evans). [169685] High CVE-2013-0891: Integer overflow in blob handling. Credit to Google Chrome Security Team (Jri Aedla). [169295] [168710] [166493] [165836] [165747] [164958] [164946] Medium CVE-2013-0892: Lower severity issues across the IPC layer. Credit to Google Chrome Security Team (Chris Evans). [168570] Medium CVE-2013-0893: Race condition in media handling. Credit to Andrew Scherkus of the Chromium development community. [168473] High CVE-2013-0894: Buffer overflow in vorbis decoding. Credit to Google Chrome Security Team (Inferno). [Linux / Mac] [167840] High CVE-2013-0895: Incorrect path handling in file copying. Credit to Google Chrome Security Team (Jri Aedla). [166708] High CVE-2013-0896: Memory management issues in plug-in message handling. Credit to Google Chrome Security Team (Cris Neckar). [165537] Low CVE-2013-0897: Off-by-one read in PDF. Credit to Mateusz Jurczyk, with contributions by Gynvael Coldwind, both from Google Security Team. [164643] High CVE-2013-0898: Use-after-free in URL handling. Credit to Alexander Potapenko of the Chromium development community. [160480] Low CVE-2013-0899: Integer overflow in Opus handling. Credit to Google Chrome Security Team (Jri Aedla). [152442] Medium CVE-2013-0900: Race condition in ICU. Credit to Google Chrome Security Team (Inferno)." [1] MITIGATION The vendor recommends updating to the latest version of Google Chrome to correct these issues. [1] REFERENCES [1] Stable Channel Update http://googlechromereleases.blogspot.com.au/2013/02/stable-channel-update_21.html AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBUSrcm+4yVqjM2NGpAQJKBBAAnriHaS7RT47MN4Zp/BC0oyzlPyDvcXPK wb+ZhetS8OJNHMOzffx7jr634LqB+YS3kknGCCjP+aHzhf2DDhukejBmHAYEkkmn WuW4rou+JW0Y1VSZUU+H8jm6sScUH5d7S9/9oHX35J/bSpwqP3EQQuDPtkfB5/Y4 eoWPfs5vksQRbu3psTlYkM9i6dBZxzIch3VcBCu1bsM6e35NurxPVmKD6F+KG5zz CdfoUIUXZmGaC4xrhX7YlOYut5s8vdo6ni0zZcQRKui48VtKl/QVGz3KowAnFKLq xq++Z2n22Q6fdFLjcWs8IkvKUwuildxvoONrzMqtWRLVuVlOghAyNJb6oTnpYqR+ yupf03Im7rHfVGXtsqiLI5BbDj9Tqpj9109EfWLNNSJuYaC6jAk0Vc6EZaMuqJxo H9oUGFNyyOmgKY+2dFzNTwVKOOlahT0A3WbgVn/QIxfSUIGG+zwk0QpvF8R8wkdC yIwFmBkhuExP8GVBu10QM+wRDxNnUs4ZS0LocYrjteT5Pg+13yd1WAaIH7hRHmMY jFx3u7LCLGMAPa2p7B4WxK0WQKoGZHAPEnNL0GL8oYfEbCs3UEVcwKV5dxUhQk4E mOrNNINg0GUUqC6fbRUc9/7BYNn09h+H6mZrmWkNo0OxYm5nncn0uXZtv7o69Z+L 4MwrFyokWWc= =Uykg -----END PGP SIGNATURE-----