Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2014.0067 A number of vulnerabilities have been identified in Google Chrome 11 June 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Google Chrome Operating System: Windows OS X Linux variants Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2014-3157 CVE-2014-3156 CVE-2014-3155 CVE-2014-3154 Member content until: Friday, July 11 2014 OVERVIEW A number of vulnerabilities have been identified in Google Chrome prior to version 35.0.1916.153 for Mac and Windows and for Linux. IMPACT The vendor has provided the following details regarding these vulnerabilities: "[$1000][369525] High CVE-2014-3154: Use-after-free in filesystem api. Credit to Collin Payne. [$1000][369539] High CVE-2014-3155: Out-of-bounds read in SPDY. Credit to James March, Daniel Sommermann and Alan Frindell of Facebook. [$500][369621] Medium CVE-2014-3156: Buffer overflow in clipboard. Credit to Atte Kettunen of OUSPG. As usual, our ongoing internal security work was responsible for the following fix: [368980] CVE-2014-3157: Heap overflow in media." [1] MITIGATION The vendor recommends updating to the latest version of Google Chrome to correct these issues. [1] REFERENCES [1] Stable Channel Update http://googlechromereleases.blogspot.com.au/2014/06/stable-channel-update.html AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBU5e2bBLndAQH1ShLAQKceg/9HBKBHN/xRU7eoeqwiq0/f9+nZKjz5FQe UhDdZu3v2YL2uXb7uZobM2mDvA9kzyJsMchHlp3nJekEZ3ISeFSa/n5B7qSA3ZLQ Dvg8Nnh+Sd6B4xcufhMOPFwItakA/sksnUFMohItGHeDVFh1QcxsePNNkjNe5PZ/ z6hAGTL58/RRQenVqL9XaiWc5I7IC8oRnq2uiKLT+Gezeezk8NtIw6aTPoUUvqI9 3cJA63w95AAP1GuRiNnH8iyJM1jc+wp1YS2GLk5WpGTq8He6ys8mQUQvon+ZVTz1 kqttqa2ADKPX9QqN3ltzI4XZlclsT5YSKvvaTaNBmo1YqsScsKb5UTp0pnxvijtJ 5GdqCQM++PNYQg9zm7NWb4IFHfiJS1LxpZe4P2fJQivi2aY7P8f/iJI1SYF/vn7m bXK4OZXH9YYXk4i1Pz7b2+35ASI7jVHqLmQdb/19tI0lJsD3Zqdc1ee0gKLQs9TY pMDb0sHqF/8fj8n7UcvKYTT7YIwJ3jiv2UIl72fnMDdgtoeAcnGEo8GBQov+xpc5 KgA5ys5/FURLua9ozml+QUJE73zL+AQ+7dyQa4B0/vPpt+M1XzsSFLfLwFoORlz0 v4w17SuEYZF35AtfFTCPyzXIaLwucYK2giI1GTReU93l+lMpnlrOTeRB0IEzIs6p +HxbDKhI7Vw= =LLBa -----END PGP SIGNATURE-----