[PCWorks] Google Chrome Multiple Vulnerabilities

  • From: "Clint Hamilton-PCWorks Admin" <PCWorks@xxxxxxxxxxxxxxxxxxxxxxxx>
  • To: "PCWorks@xxxxxxxxxxxxx" <pcworks@xxxxxxxxxxxxx>
  • Date: Sat, 7 Jan 2012 06:08:35 -0600

TITLE:
Google Chrome Multiple Vulnerabilities

Criticality level:  Highly critical
Impact:  System access
Where:  From remote

Software:  Google Chrome 16.x

SECUNIA ADVISORY ID:
http://secunia.com/advisories/47449/

DESCRIPTION:
Some vulnerabilities have been reported in Google Chrome, which
potentially can be exploited by malicious people to compromise 
a
user's system.

1) A use-after-free error exists within the handling of 
animation
frames.

2) A boundary error within the "xmlStringLenDecodeEntities()"
function (parser.c) of libxml2 can be exploited to cause a 
heap-based
buffer overflow.

3) An error within the glyph handling can be exploited to cause 
a
stack-based buffer overflow.

SOLUTION:
Update to version 16.0.912.75.

ORIGINAL ADVISORY:
http://googlechromereleases.blogspot.com/2012/01/stable-channel-update.html


=========================
The list's FAQ's can be seen by sending an email to 
PCWorks-request@xxxxxxxxxxxxx with FAQ in the subject line.

To unsubscribe, subscribe, set Digest or Vacation to on or off, go to 
//www.freelists.org/list/pcworks .  You can also send an email to 
PCWorks-request@xxxxxxxxxxxxx with Unsubscribe in the subject line.  Your 
member list settings can be found at 
//www.freelists.org/cgi-bin/lsg2.cgi/l=pcworks .  Once logged in, you have 
access to numerous other email options.  

The list archives are located at //www.freelists.org/archives/pcworks/ .  
All email posted to the list will be placed there in the event anyone needs to 
look for previous posts.
-zxdjhu-

Other related posts: