-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2014.0067
     A number of vulnerabilities have been identified in Google Chrome
                               11 June 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Google Chrome
Operating System:     Windows
                      OS X
                      Linux variants
Impact/Access:        Execute Arbitrary Code/Commands -- Remote with User Interaction
                      Denial of Service               -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2014-3157 CVE-2014-3156 CVE-2014-3155
                      CVE-2014-3154  
Member content until: Friday, July 11 2014

OVERVIEW

        A number of vulnerabilities have been identified in Google Chrome
        prior to version 35.0.1916.153 for Mac and Windows and for Linux.


IMPACT

        The vendor has provided the following details regarding these 
        vulnerabilities:
        
        "[$1000][369525] High CVE-2014-3154: Use-after-free in filesystem 
        api. Credit to Collin Payne.
        
        [$1000][369539] High CVE-2014-3155: Out-of-bounds read in SPDY. 
        Credit to James March, Daniel Sommermann and Alan Frindell of 
        Facebook.
        
        [$500][369621] Medium CVE-2014-3156: Buffer overflow in clipboard. 
        Credit to Atte Kettunen of OUSPG.
        
        As usual, our ongoing internal security work was responsible for the
        following fix:
        
        [368980] CVE-2014-3157: Heap overflow in media." [1]


MITIGATION

        The vendor recommends updating to the latest version of Google 
        Chrome to correct these issues. [1]


REFERENCES

        [1] Stable Channel Update
            http://googlechromereleases.blogspot.com.au/2014/06/stable-channel-update.html

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=LLBa
-----END PGP SIGNATURE-----