Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2015.0021.2 A number of vulnerabilities have been identified in Google Chrome 10 March 2015 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Google Chrome Operating System: Windows OS X Linux variants Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Modify Arbitrary Files -- Remote with User Interaction Delete Arbitrary Files -- Remote with User Interaction Denial of Service -- Remote with User Interaction Provide Misleading Information -- Remote with User Interaction Access Confidential Data -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2015-2239 CVE-2015-1232 CVE-2015-1231 CVE-2015-1230 CVE-2015-1229 CVE-2015-1228 CVE-2015-1227 CVE-2015-1226 CVE-2015-1225 CVE-2015-1224 CVE-2015-1223 CVE-2015-1222 CVE-2015-1221 CVE-2015-1220 CVE-2015-1219 CVE-2015-1218 CVE-2015-1217 CVE-2015-1216 CVE-2015-1215 CVE-2015-1214 CVE-2015-1213 CVE-2014-9689 CVE-2011-5319 Member content until: Saturday, April 4 2015 Revision History: March 10 2015: Added CVEs relating to denial of service and disclosure of information gathered from physical environment March 5 2015: Initial Release OVERVIEW A number of vulnerabilities have been identified in Google Chrome prior to version 41.0.2272.76. [1] IMPACT This update includes fixes for 51 security issues. The vendor has provided the following details regarding a number of these issues: "[$7500][456516] High CVE-2015-1232: Out-of-bounds write in media. Credit to anonymous. [$5000][448423] High CVE-2015-1213: Out-of-bounds write in skia filters. Credit to cloudfuzzer. [$5000][445810] High CVE-2015-1214: Out-of-bounds write in skia filters. Credit to cloudfuzzer. [$5000][445809] High CVE-2015-1215: Out-of-bounds write in skia filters. Credit to cloudfuzzer. [$4000][454954] High CVE-2015-1216: Use-after-free in v8 bindings. Credit to anonymous. [$3000][456192] High CVE-2015-1217: Type confusion in v8 bindings. Credit to anonymous." [1] [$3000][456059] High CVE-2015-1218: Use-after-free in dom. Credit to cloudfuzzer. [$3000][446164] High CVE-2015-1219: Integer overflow in webgl. Credit to Chen Zhang (demi6od) of NSFOCUS Security Team. [$3000][437651] High CVE-2015-1220: Use-after-free in gif decoder. Credit to Aki Helin of OUSPG. [$2500][455368] High CVE-2015-1221: Use-after-free in web databases. Credit to Collin Payne. [$2500][448082] High CVE-2015-1222: Use-after-free in service workers. Credit to Collin Payne. [$2000][454231] High CVE-2015-1223: Use-after-free in dom. Credit to Maksymillian Motyl. [449610] High CVE-2015-1230: Type confusion in v8. Credit to Skylined working with HP's Zero Day Initiative. [$2000][449958] Medium CVE-2015-1224: Out-of-bounds read in vpxdecoder. Credit to Aki Helin of OUSPG. [$1000][446033] Medium CVE-2015-1225: Out-of-bounds read in pdfium. Credit to cloudfuzzer. [$1000][456841] Medium CVE-2015-1226: Validation issue in debugger. Credit to Rob Wu. [$1000][450389] Medium CVE-2015-1227: Uninitialized value in blink. Credit to Christoph Diehl. [$1000][444707] Medium CVE-2015-1228: Uninitialized value in rendering. Credit to miaubiz. [$500][431504] Medium CVE-2015-1229: Cookie injection via proxies. Credit to iliwoy." [1] MITIGATION The vendor recommends updating Google Chrome to correct these issues. [1] REFERENCES [1] Stable Channel Update http://googlechromereleases.blogspot.com.au/2015/03/stable-channel-update.html AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVP6GqRLndAQH1ShLAQKd0BAAopgRfG7lKIwW28PNi0rSRrvWVNGBTe3p P3IY0BhQ1ds71wzCYc+ek/rz8b6ZqbDhrejSk05bOTQbjaq4UbgLs9sFdcXPip6H y7cAz1E1otOvmF2dxgh/VGvUE2MDtFaijL9qvCDxDVVJapRBrntKjqIlPz4hiJnS hIWMM1YRO77O1ngI2dmJe9H/fY8UCLX/TN2HR6bFLRwYzAXvcv5pvFUIXd+k2P/I 0uy/qfPbMA4Gxf9DyOqz1drc2cx/Rzc4p/dNDHLIXsL8mYWXvkseaBSlW/PSA2mP R4OXpcJK0MC12smXJDqlGmUrQVSIUPAWL5pGEZkukrCi0YpiQ5SKcHNI+7b7qoPk tNohe49gZ9YupcKJ0v9/O0gdii+WpXFeEY6473PjuSSAJ3Q9JmkKkfOWLGMKuR5c 8sDT51Jy+4cXirvJfcez2D/j+1InPu+DAhIMUnGBorMEuk00Cq712BSdtjKwAX+Z ZqptowTX2OJNC4rZ+OuL1cisyi9QmFbazHBZoUlwieHfsing8rwsnmYuFXlf/lvg 9nQ/BaSfgCmOPEnqGmR9C6hPFEFZVBR7mmRh8djMLlWDLkKZROosZ2tgC+Nx0bM3 Vxvm15y4kugjHGkEqmvf5OCeR6UqPOddKhEavBpsZvUlh6VKEYXGAnowzbUsCnEl Mtce5k/fEK8= =PUs8 -----END PGP SIGNATURE-----