-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2015.0052
     A number of vulnerabilities have been identified in Google Chrome
                                20 May 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Google Chrome
Operating System:     UNIX variants (UNIX, Linux, OSX)
                      Windows
Impact/Access:        Denial of Service               -- Remote with User Interaction
                      Execute Arbitrary Code/Commands -- Remote with User Interaction
                      Provide Misleading Information  -- Remote with User Interaction
                      Unauthorised Access             -- Remote with User Interaction
                      Cross-site Scripting            -- Remote with User Interaction
                      Reduced Security                -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2015-1264 CVE-2015-1263 CVE-2015-1262
                      CVE-2015-1261 CVE-2015-1260 CVE-2015-1259
                      CVE-2015-1258 CVE-2015-1257 CVE-2015-1256
                      CVE-2015-1255 CVE-2015-1254 CVE-2015-1253
                      CVE-2015-1252 CVE-2015-1251 
Member content until: Friday, June 19 2015

OVERVIEW

        A number of vulnerabilities have been identified in Google Chrome 
        prior to version 42.0.2311.135 for Windows, Mac and Linux. [1]


IMPACT

        The vendor has provided the following details regarding the 
        vulnerabilities:
        
        "This update includes 37 security fixes. Below, we highlight fixes 
        that were contributed by external researchers. Please see the 
        Chromium security page for more information.
        
        [$16337][474029] High CVE-2015-1252: Sandbox escape in Chrome. 
        Credit to anonymous.
        
        [$7500][464552] High CVE-2015-1253: Cross-origin bypass in DOM. 
        Credit to anonymous.
        
        [$3000][444927] High CVE-2015-1254: Cross-origin bypass in Editing.
        Credit to armin@rawsec.net.
        
        [$3000][473253] High CVE-2015-1255: Use-after-free in WebAudio. 
        Credit to Khalil Zhani.
        
        [$2000][478549] High CVE-2015-1256: Use-after-free in SVG. Credit to
        Atte Kettunen of OUSPG.
        
        [481015] High CVE-2015-1251: Use-after-free in Speech. Credit to 
        SkyLined working with HP's Zero Day Initiative
        
        [$1500][468519] Medium CVE-2015-1257: Container-overflow in SVG. 
        Credit to miaubiz.
        
        [$1000][450939] Medium CVE-2015-1258: Negative-size parameter in 
        Libvpx. Credit to cloudfuzzer
        
        [$1000][468167] Medium CVE-2015-1259: Uninitialized value in PDFium.
        Credit to Atte Kettunen of OUSPG
        
        [$1000][474370] Medium CVE-2015-1260: Use-after-free in WebRTC. 
        Credit to Khalil Zhani.
        
        [$500][466351] Medium CVE-2015-1261: URL bar spoofing. Credit to 
        Juho Nurminen.
        
        [$500][476647] Medium CVE-2015-1262: Uninitialized value in Blink. 
        Credit to miaubiz.
        
        [$500][479162] Low CVE-2015-1263: Insecure download of spellcheck 
        dictionary. Credit to Mike Ruddy.
        
        [$500][481015] Low CVE-2015-1264: Cross-site scripting in bookmarks.
        Credit to K0r3Ph1L." [1]


MITIGATION

        Affected users are advised to upgrade to the latest version. [1]


REFERENCES

        [1] Stable Channel Update
            http://googlechromereleases.blogspot.com.au/2015/05/stable-channel-update_19.html

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=ug/o
-----END PGP SIGNATURE-----