TITLE: Google Chrome Multiple Vulnerabilities Criticality level: Highly critical Impact: System access Where: From remote Software: Google Chrome 16.x SECUNIA ADVISORY ID: http://secunia.com/advisories/47449/ DESCRIPTION: Some vulnerabilities have been reported in Google Chrome, which potentially can be exploited by malicious people to compromise a user's system. 1) A use-after-free error exists within the handling of animation frames. 2) A boundary error within the "xmlStringLenDecodeEntities()" function (parser.c) of libxml2 can be exploited to cause a heap-based buffer overflow. 3) An error within the glyph handling can be exploited to cause a stack-based buffer overflow. SOLUTION: Update to version 16.0.912.75. ORIGINAL ADVISORY: http://googlechromereleases.blogspot.com/2012/01/stable-channel-update.html ========================= The list's FAQ's can be seen by sending an email to PCWorks-request@xxxxxxxxxxxxx with FAQ in the subject line. To unsubscribe, subscribe, set Digest or Vacation to on or off, go to //www.freelists.org/list/pcworks . You can also send an email to PCWorks-request@xxxxxxxxxxxxx with Unsubscribe in the subject line. Your member list settings can be found at //www.freelists.org/cgi-bin/lsg2.cgi/l=pcworks . Once logged in, you have access to numerous other email options. The list archives are located at //www.freelists.org/archives/pcworks/ . All email posted to the list will be placed there in the event anyone needs to look for previous posts. -zxdjhu-