-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2016.0077
      Multiple vulnerabilities have been identified in Google Chrome
                               21 July 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Google Chrome
Operating System:     Windows
                      OS X
                      Linux variants
                      Mobile Device
Impact/Access:        Execute Arbitrary Code/Commands -- Remote with User Interaction
                      Denial of Service               -- Remote with User Interaction
                      Provide Misleading Information  -- Remote with User Interaction
                      Access Confidential Data        -- Remote with User Interaction
                      Reduced Security                -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2016-5137 CVE-2016-5136 CVE-2016-5135
                      CVE-2016-5134 CVE-2016-5133 CVE-2016-5132
                      CVE-2016-5131 CVE-2016-5130 CVE-2016-5129
                      CVE-2016-5128 CVE-2016-5127 CVE-2016-1711
                      CVE-2016-1710 CVE-2016-1709 CVE-2016-1708
                      CVE-2016-1707 CVE-2016-1706 CVE-2016-1705
Member content until: Saturday, August 20 2016

OVERVIEW

        Multiple vulnerabilities have been identified in Google Chrome prior
        to version 52.0.2743.82. [1]


IMPACT

        The vendor has provided the following information about the
        vulnerabilities:
        
        "This update includes 48 security fixes. Below, we highlight fixes that
        were contributed by external researchers. Please see the Chromium 
        security page for more information.
        
        [$15000][610600] High CVE-2016-1706: Sandbox escape in PPAPI. Credit to 
        Pinkie Pie
        
        [$3000][622183] High CVE-2016-1707: URL spoofing on iOS. Credit to 
        xisigr of Tencent's Xuanwu Lab
        
        [$TBD][613949] High CVE-2016-1708: Use-after-free in Extensions. 
        Credit to Adam Varsan
        
        [$TBD][614934] High CVE-2016-1709: Heap-buffer-overflow in sfntly. 
        Credit to ChenQin of Topsec Security Team
        
        [$TBD][616907] High CVE-2016-1710: Same-origin bypass in Blink. Credit
        to Mariusz Mlynski
        
        [$TBD][617495] High CVE-2016-1711: Same-origin bypass in Blink. Credit
        to Mariusz Mlynski
        
        [$TBD][618237] High CVE-2016-5127: Use-after-free in Blink. Credit to
        cloudfuzzer
        
        [$TBD][619166] High CVE-2016-5128: Same-origin bypass in V8. Credit to
        Anonymous
        
        [$TBD][620553] High CVE-2016-5129: Memory corruption in V8. Credit to 
        Jeonghoon Shin
        
        [$TBD][623319] High CVE-2016-5130: URL spoofing. Credit to Wadih Matar
        
        [$TBD][623378] High CVE-2016-5131: Use-after-free in libxml. Credit to 
        Nick Wellnhofer
        
        [$1000][607543] Medium CVE-2016-5132: Limited same-origin bypass in 
        Service Workers. Credit to Ben Kelly
        
        [$1000][613626] Medium CVE-2016-5133: Origin confusion in proxy 
        authentication. Credit to Patch Eudor
        
        [$500][593759] Medium CVE-2016-5134: URL leakage via PAC script. Credit
        to Paul Stone
        
        [$500][605451] Medium CVE-2016-5135: Content-Security-Policy bypass. 
        Credit to kingxwy
        
        [$TBD][625393] Medium CVE-2016-5136: Use after free in extensions. 
        Credit to Rob Wu
        
        [$TBD][625945] Medium CVE-2016-5137: History sniffing with HSTS and 
        CSP. Credit to Xiaoyin Liu
        
        We would also like to thank all security researchers that worked with
        us during the development cycle to prevent security bugs from ever 
        reaching the stable channel.
        
        As usual, our ongoing internal security work was responsible for a
        wide range of fixes:
        
        [629852] CVE-2016-1705: Various fixes from internal audits, fuzzing 
        and other initiatives." [1]


MITIGATION

        The vendor recommends updating to the latest version to correct 
        these issues. [1]


REFERENCES

        [1] Stable Channel Update
            http://googlechromereleases.blogspot.com.au/2016/07/stable-channel-update.html

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Lt0s
-----END PGP SIGNATURE-----