CVE-2017-5021 – chromium-browser: use after free in extensions
https://notcve.org/view.php?id=CVE-2017-5021
A use after free in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. Un uso después de liberación de memoria en Google Chrome en versiones anteriores a 56.0.2924.76 para Linux, Windows y Mac y 56.0.2924.87 para Android, permitió a un atacante remoto realizar una lectura de memoria fuera de límites a través de una página HTML manipulada. • http://rhn.redhat.com/errata/RHSA-2017-0206.html http://www.debian.org/security/2017/dsa-3776 http://www.securityfocus.com/bid/95792 http://www.securitytracker.com/id/1037718 https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html https://crbug.com/663726 https://security.gentoo.org/glsa/201701-66 https://access.redhat.com/security/cve/CVE-2017-5021 https://bugzilla.redhat.com/show_bug.cgi?id=1416672 • CWE-416: Use After Free •
CVE-2017-5013 – chromium-browser: address spoofing in omnibox
https://notcve.org/view.php?id=CVE-2017-5013
Google Chrome prior to 56.0.2924.76 for Linux incorrectly handled new tab page navigations in non-selected tabs, which allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. Google Chrome en versiones anteriores a 56.0.2924.76 para Linux manejaba incorrectamente navegaciones de páginas en pestañas nuevas en pestañas no seleccionadas, lo que permitía a un atacante remoto suplantar los contenidos del Omnibox (barra URL) a través de una página HTML manipulada. • http://rhn.redhat.com/errata/RHSA-2017-0206.html http://www.debian.org/security/2017/dsa-3776 http://www.securityfocus.com/bid/95792 http://www.securitytracker.com/id/1037718 https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html https://crbug.com/677716 https://security.gentoo.org/glsa/201701-66 https://access.redhat.com/security/cve/CVE-2017-5013 https://bugzilla.redhat.com/show_bug.cgi?id=1416664 •
CVE-2017-5018 – chromium-browser: universal xss in chrome://apps
https://notcve.org/view.php?id=CVE-2017-5018
Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, had an insufficiently strict content security policy on the Chrome app launcher page, which allowed a remote attacker to inject scripts or HTML into a privileged page via a crafted HTML page. Google Chrome en versiones anteriores a 56.0.2924.76 para Linux, Windows y Mac y 56.0.2924.87 para Android tenía una política de seguridad del contenido insuficientemente estricta en la página de lanzamiento de aplicaciones de Chrome, lo que permitía a un atacante remoto inyectar secuencias de comandos o HTML en una página privilegiada a través de una página HTML manipulada. • http://rhn.redhat.com/errata/RHSA-2017-0206.html http://www.debian.org/security/2017/dsa-3776 http://www.securityfocus.com/bid/95792 http://www.securitytracker.com/id/1037718 https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html https://crbug.com/668665 https://security.gentoo.org/glsa/201701-66 https://access.redhat.com/security/cve/CVE-2017-5018 https://bugzilla.redhat.com/show_bug.cgi?id=1416670 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2017-5012 – chromium-browser: heap overflow in v8
https://notcve.org/view.php?id=CVE-2017-5012
A heap buffer overflow in V8 in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Un desbordamiento de búfer de memoria dinámica en V8 en Google Chrome en versiones anteriores a 56.0.2924.76 para Linux, Windows y Mac y 56.0.2924.87 para Android, permitió a un atacante remoto explotar potencialmente la corrupción de memoria dinámica mediante una página HTML manipulada. • http://rhn.redhat.com/errata/RHSA-2017-0206.html http://www.debian.org/security/2017/dsa-3776 http://www.securityfocus.com/bid/95792 http://www.securitytracker.com/id/1037718 https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html https://crbug.com/681843 https://security.gentoo.org/glsa/201701-66 https://access.redhat.com/security/cve/CVE-2017-5012 https://bugzilla.redhat.com/show_bug.cgi?id=1416663 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2017-5010 – chromium-browser: universal xss in blink
https://notcve.org/view.php?id=CVE-2017-5010
Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, resolved promises in an inappropriate context, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page. Blink en Google Chrome en versiones anteriores a 56.0.2924.76 para Linux, Windows y Mac y 56.0.2924.87 para Android, resolvió las promesas en un contexto inadecuado, lo que permitió a un atacante remoto inyectar secuencias de comandos o HTML arbitrarias (UXSS) a través de una página HTML manipulada. • http://rhn.redhat.com/errata/RHSA-2017-0206.html http://www.debian.org/security/2017/dsa-3776 http://www.securityfocus.com/bid/95792 http://www.securitytracker.com/id/1037718 https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html https://crbug.com/663476 https://security.gentoo.org/glsa/201701-66 https://access.redhat.com/security/cve/CVE-2017-5010 https://bugzilla.redhat.com/show_bug.cgi?id=1416660 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •