Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2014.0025 A number of vulnerabilities have been identified in Google Chrome 12 March 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Google Chrome Operating System: Windows OS X Linux variants Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Cross-site Scripting -- Remote with User Interaction Denial of Service -- Remote with User Interaction Reduced Security -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2014-1704 CVE-2014-1703 CVE-2014-1702 CVE-2014-1701 CVE-2014-1700 Member content until: Friday, April 11 2014 OVERVIEW A number of vulnerabilities have been identified Google Chrome prior to version 33.0.1750.149 for Windows, Mac and Linux. IMPACT The vendor has provided the following details regarding these vulnerabilities: "[$4000][344881] High CVE-2014-1700: Use-after-free in speech. Credit to Chamal de Silva. [$3000][342618] High CVE-2014-1701: UXSS in events. Credit to aidanhs. [$1000][333058] High CVE-2014-1702: Use-after-free in web database. Credit to Collin Payne. As usual, our ongoing internal security work responsible for a wide range of fixes: [338354] High CVE-2014-1703: Potential sandbox escape due to a use-after-free in web sockets. [328202, 349079, 345715] CVE-2014-1704: Multiple vulnerabilities in V8 fixed in version 3.23.17.18. Many of the above bugs were detected using AddressSanitizer." [1] MITIGATION The vendor recommends updating to the latest version of Google Chrome to correct these issues. [1] REFERENCES [1] Stable Channel Update http://googlechromereleases.blogspot.dk/2014/03/stable-channel-update_11.html AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBUx/FrxLndAQH1ShLAQL7LA/9E7hluqbIL9g5T2ASSLniBZTQwx0ApTTM R6J1XXTIpPpNXDKNDk9oWMMGKBDL09PUj3F3HCCH5mIBHwlTrbMuva+jbZ21qxD3 RZhKT4mIe68+NNBARSN3poJRB1QwWsDyun7wiekVGqSrpaYE2ghrI54YkTQ2bWUX uIf++CknF2yvFkv8i8QF2MiE/traCxVUZWhTIHgr444cYrBM6sprkYcmrzgeVo2m GT0DjJNL+srVoK7nlXUykASk3vjtn2kPdNmPfJxbOsYlk4CCnC+kS7L5Y+eL23Vr 3m+dSr0lZgiUhVqOQ73vpFCQ/SYI4KTgyns7U311sU7dAmEwKp695yDT5uX93vg/ P7Bwkh7KoNnSb3/4wRN6ynNbIGgbLKpyZDl3U6jrOCJo7TV45FtSBjZHo63YIlBa qnnkDoIKhBjrtcSAlj0ZtgITtakZdiMuCxtKTxSTPSL6vLZdET0qEys0aAHEpQaJ j0gJKnCKt6VccO1TNAQW7qq6gnMvrooBQMJYpWsX1HRS97GU7ErnxWwh68URrQsh FW8qVW/PZVcSfJVxdF52YKeqSFCkmJwYEsKaYQMXQ9K1gozcnk34/mtrCaRxZ939 51ml+5WZM9PrCAI21S2HVf9jrrfNkbKqbKFPzK4U8PA0jXw5FCpcyDvmQXfsSKt0 M3C/PLs/orA= =EmTL -----END PGP SIGNATURE-----