-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2014.0025
     A number of vulnerabilities have been identified in Google Chrome
                               12 March 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Google Chrome
Operating System:     Windows
                      OS X
                      Linux variants
Impact/Access:        Execute Arbitrary Code/Commands -- Remote with User Interaction
                      Cross-site Scripting            -- Remote with User Interaction
                      Denial of Service               -- Remote with User Interaction
                      Reduced Security                -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2014-1704 CVE-2014-1703 CVE-2014-1702
                      CVE-2014-1701 CVE-2014-1700 
Member content until: Friday, April 11 2014

OVERVIEW

        A number of vulnerabilities have been identified Google Chrome prior
        to version 33.0.1750.149 for Windows, Mac and Linux.


IMPACT

        The vendor has provided the following details regarding these
        vulnerabilities:
        
        "[$4000][344881] High CVE-2014-1700: Use-after-free in speech. Credit 
        to Chamal de Silva.
        [$3000][342618] High CVE-2014-1701: UXSS in events. Credit to aidanhs.
        [$1000][333058] High CVE-2014-1702: Use-after-free in web database. 
        Credit to Collin Payne.
        
        As usual, our ongoing internal security work responsible for a wide 
        range of fixes:
        
        [338354] High CVE-2014-1703: Potential sandbox escape due to a 
        use-after-free in web sockets.
        [328202, 349079, 345715] CVE-2014-1704: Multiple vulnerabilities in V8 
        fixed in version 3.23.17.18.
        
        Many of the above bugs were detected using AddressSanitizer." [1]


MITIGATION

        The vendor recommends updating to the latest version of
        Google Chrome to correct these issues. [1]


REFERENCES

        [1] Stable Channel Update
            http://googlechromereleases.blogspot.dk/2014/03/stable-channel-update_11.html

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=EmTL
-----END PGP SIGNATURE-----