CVE-2018-6131 – chromium-browser: Incorrect mutability protection in WebAssembly
https://notcve.org/view.php?id=CVE-2018-6131
Object lifecycle issue in WebAssembly in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. El problema del lifecycle del objeto en WebAssembly en Google Chrome antes de 67.0.3396.62 permitía a un atacante remoto explotar potencialmente la corrupción del montón a través de una página HTML diseñada. • https://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop_58.html https://crbug.com/826434 https://access.redhat.com/security/cve/CVE-2018-6131 https://bugzilla.redhat.com/show_bug.cgi?id=1584042 • CWE-787: Out-of-bounds Write •
CVE-2018-6132 – chromium-browser: Use of uninitialized memory in WebRTC
https://notcve.org/view.php?id=CVE-2018-6132
Uninitialized data in WebRTC in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted video file. Los datos no inicializados en WebRTC en Google Chrome antes de 67.0.3396.62 permitieron a un atacante remoto obtener información potencialmente sensible de la memoria de proceso a través de un archivo de video creado. • https://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop_58.html https://crbug.com/839960 https://access.redhat.com/security/cve/CVE-2018-6132 https://bugzilla.redhat.com/show_bug.cgi?id=1584043 • CWE-908: Use of Uninitialized Resource •
CVE-2018-6133 – chromium-browser: URL spoof in Omnibox
https://notcve.org/view.php?id=CVE-2018-6133
Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name. Aplicación insuficiente de caracteres confundibles en URL Formatter en Google Chrome, en versiones anteriores a la 67.0.3396.62, permitía que un atacante remoto suplantase dominios mediante homogramas IDN mediante un nombre de dominio manipulado. • http://www.securityfocus.com/bid/104309 http://www.securitytracker.com/id/1041014 https://access.redhat.com/errata/RHSA-2018:1815 https://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop_58.html https://crbug.com/817247 https://www.debian.org/security/2018/dsa-4237 https://access.redhat.com/security/cve/CVE-2018-6133 https://bugzilla.redhat.com/show_bug.cgi?id=1584044 • CWE-19: Data Processing Errors •
CVE-2018-6134 – chromium-browser: Referrer Policy bypass in Blink
https://notcve.org/view.php?id=CVE-2018-6134
Information leak in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to bypass no-referrer policy via a crafted HTML page. La filtración de información en Blink en Google Chrome antes de 67.0.3396.62 permitió a un atacante remoto eludir la política sin referencia a través de una página HTML diseñada. • https://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop_58.html https://crbug.com/797465 https://access.redhat.com/security/cve/CVE-2018-6134 https://bugzilla.redhat.com/show_bug.cgi?id=1584045 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2018-6135 – chromium-browser: UI spoofing in Blink
https://notcve.org/view.php?id=CVE-2018-6135
Lack of clearing the previous site before loading alerts from a new one in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform domain spoofing via a crafted HTML page. La falta de limpieza del sitio anterior antes de cargar alertas de otro nuevo en Blink en Google Chrome, en versiones anteriores a la 67.0.3396.62, permitía que un atacante remoto realizase la suplantación de dominios mediante una página HTML manipulada. • http://www.securityfocus.com/bid/104309 http://www.securitytracker.com/id/1041014 https://access.redhat.com/errata/RHSA-2018:1815 https://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop_58.html https://crbug.com/823353 https://www.debian.org/security/2018/dsa-4237 https://access.redhat.com/security/cve/CVE-2018-6135 https://bugzilla.redhat.com/show_bug.cgi?id=1584046 •