-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2015.0064
     A number of vulnerabilities have been identified in Google Chrome
                               23 June 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Google Chrome
Operating System:     Windows
                      OS X
                      Linux variants
Impact/Access:        Execute Arbitrary Code/Commands -- Remote with User Interaction
                      Unauthorised Access             -- Remote with User Interaction
                      Reduced Security                -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2015-1269 CVE-2015-1268 CVE-2015-1267
                      CVE-2015-1266  
Member content until: Thursday, July 23 2015

OVERVIEW

        A number of vulnerabilities have been identified in Google Chrome 
        prior to version 43.0.2357.130 for Windows, Mac, and Linux. [1]


IMPACT

        The vendor had provided the following details regarding the 
        vulnerabilities:
        
        "[$5000][464922] High CVE-2015-1266: Scheme validation error in 
        WebUI. Credit to anonymous.
        
        [TBD][494640] High CVE-2015-1268: Cross-origin bypass in Blink. 
        Credit to Mariusz Mlynski.
        
        [TBD][497507] Medium CVE-2015-1267: Cross-origin bypass in Blink. 
        Credit to anonymous.
        
        [TBD][461481] Medium CVE-2015-1269: Normalization error in HSTS/HPKP
        preload list. Credit to Mike Ruddy." [1]


MITIGATION

        Affected users are advised to upgrade to the latest version. [1]


REFERENCES

        [1] Chrome Stable Update
            http://feedproxy.google.com/~r/blogspot/dbusP/~3/91mO4wENeas/chrome-stable-update.html

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=RIjc
-----END PGP SIGNATURE-----