-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                              ASB-2015.0021.2
     A number of vulnerabilities have been identified in Google Chrome
                               10 March 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Google Chrome
Operating System:     Windows
                      OS X
                      Linux variants
Impact/Access:        Execute Arbitrary Code/Commands -- Remote with User Interaction
                      Modify Arbitrary Files          -- Remote with User Interaction
                      Delete Arbitrary Files          -- Remote with User Interaction
                      Denial of Service               -- Remote with User Interaction
                      Provide Misleading Information  -- Remote with User Interaction
                      Access Confidential Data        -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2015-2239 CVE-2015-1232 CVE-2015-1231
                      CVE-2015-1230 CVE-2015-1229 CVE-2015-1228
                      CVE-2015-1227 CVE-2015-1226 CVE-2015-1225
                      CVE-2015-1224 CVE-2015-1223 CVE-2015-1222
                      CVE-2015-1221 CVE-2015-1220 CVE-2015-1219
                      CVE-2015-1218 CVE-2015-1217 CVE-2015-1216
                      CVE-2015-1215 CVE-2015-1214 CVE-2015-1213
                      CVE-2014-9689 CVE-2011-5319 
Member content until: Saturday, April  4 2015

Revision History:     March 10 2015: Added CVEs relating to denial of service 
                                     and disclosure of information gathered 
                                     from physical environment
                      March  5 2015: Initial Release

OVERVIEW

        A number of vulnerabilities have been identified in Google Chrome 
        prior to version 41.0.2272.76. [1]


IMPACT

        This update includes fixes for 51 security issues. The vendor has 
        provided the following details regarding a number of these issues:
        
        "[$7500][456516] High CVE-2015-1232: Out-of-bounds write in media. 
        Credit to anonymous.
        
        [$5000][448423] High CVE-2015-1213: Out-of-bounds write in skia 
        filters. Credit to cloudfuzzer.
        
        [$5000][445810] High CVE-2015-1214: Out-of-bounds write in skia 
        filters. Credit to cloudfuzzer.
        
        [$5000][445809] High CVE-2015-1215: Out-of-bounds write in skia 
        filters. Credit to cloudfuzzer.
        
        [$4000][454954] High CVE-2015-1216: Use-after-free in v8 bindings. 
        Credit to anonymous.
        
        [$3000][456192] High CVE-2015-1217: Type confusion in v8 bindings. 
        Credit to anonymous." [1]
        
        [$3000][456059] High CVE-2015-1218: Use-after-free in dom. Credit to
        cloudfuzzer.
        
        [$3000][446164] High CVE-2015-1219: Integer overflow in webgl. 
        Credit to Chen Zhang (demi6od) of NSFOCUS Security Team.
        
        [$3000][437651] High CVE-2015-1220: Use-after-free in gif decoder. 
        Credit to Aki Helin of OUSPG.
        
        [$2500][455368] High CVE-2015-1221: Use-after-free in web databases.
        Credit to Collin Payne.
        
        [$2500][448082] High CVE-2015-1222: Use-after-free in service 
        workers. Credit to Collin Payne.
        
        [$2000][454231] High CVE-2015-1223: Use-after-free in dom. Credit to
        Maksymillian Motyl.
        
        [449610] High CVE-2015-1230: Type confusion in v8. Credit to 
        Skylined working with HP's Zero Day Initiative.
        
        [$2000][449958] Medium CVE-2015-1224: Out-of-bounds read in 
        vpxdecoder. Credit to Aki Helin of OUSPG.
        
        [$1000][446033] Medium CVE-2015-1225: Out-of-bounds read in pdfium.
        Credit to cloudfuzzer.
        
        [$1000][456841] Medium CVE-2015-1226: Validation issue in debugger.
        Credit to Rob Wu.
        
        [$1000][450389] Medium CVE-2015-1227: Uninitialized value in blink.
        Credit to Christoph Diehl.
        
        [$1000][444707] Medium CVE-2015-1228: Uninitialized value in 
        rendering. Credit to miaubiz.
        
        [$500][431504] Medium CVE-2015-1229: Cookie injection via proxies. 
        Credit to iliwoy." [1]


MITIGATION

        The vendor recommends updating Google Chrome to correct these 
        issues. [1]


REFERENCES

        [1] Stable Channel Update
            http://googlechromereleases.blogspot.com.au/2015/03/stable-channel-update.html

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=PUs8
-----END PGP SIGNATURE-----