-----BEGIN PGP SIGNED MESSAGE-----
AUSCERT Security Bulletin
A number of vulnerabilities have been identified Google Chrome
24 February 2014
AusCERT Security Bulletin Summary
Product: Google Chrome
Operating System: Windows
Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Denial of Service -- Remote/Unauthenticated
Access Confidential Data -- Unknown/Unspecified
Reduced Security -- Unknown/Unspecified
CVE Names: CVE-2013-6661 CVE-2013-6660 CVE-2013-6659
CVE-2013-6658 CVE-2013-6657 CVE-2013-6656
CVE-2013-6655 CVE-2013-6654 CVE-2013-6653
Member content until: Wednesday, March 26 2014
A number of vulnerabilities have been identified Google Chrome prior
to version 33.0.1750.117 for Windows, Mac and Linux.
The vendor has provided the following details regarding these
"This update includes 28 security fixes. Below, we highlight fixes
that were either contributed by external researchers or particularly
interesting. Please see the Chromium security page for more
[$2000] High CVE-2013-6652: Issue with relative paths in
Windows sandbox named pipe policy. Credit to tyranid.
[$1000] High CVE-2013-6653: Use-after-free related to web
contents. Credit to Khalil Zhani.
[$3000] High CVE-2013-6654: Bad cast in SVG. Credit to
[$3000] High CVE-2013-6655: Use-after-free in layout. Credit
[$500] High CVE-2013-6656: Information leak in XSS auditor.
Credit to NeexEmil.
[$1000] Medium CVE-2013-6657: Information leak in XSS
auditor. Credit to NeexEmil.
[$2000] Medium CVE-2013-6658: Use-after-free in layout.
Credit to cloudfuzzer.
[$1000] Medium CVE-2013-6659: Issue with certificates
validation in TLS handshake. Credit to Antoine Delignat-Lavaud and
Karthikeyan Bhargavan from Prosecco, Inria Paris.
 Low CVE-2013-6660: Information leak in drag and drop. Credit
As usual, our ongoing internal security work responsible for a wide
range of fixes:
 Low-High CVE-2013-6661: Various fixes from internal audits,
fuzzing and other initiatives. Of these, seven are fixes for issues
that could have allowed for sandbox escapes from compromised
Many of the above bugs were detected using AddressSanitizer."
The vendor recommends updating to the latest version of
Google Chrome to correct these issues. 
 Stable Channel Update
AusCERT has made every effort to ensure that the information contained
in this document is accurate. However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.
Australian Computer Emergency Response Team
The University of Queensland
Internet Email: firstname.lastname@example.org
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----