CVE-2017-5011 – chromium-browser: unauthorised file access in devtools
https://notcve.org/view.php?id=CVE-2017-5011
Google Chrome prior to 56.0.2924.76 for Windows insufficiently sanitized DevTools URLs, which allowed a remote attacker who convinced a user to install a malicious extension to read filesystem contents via a crafted HTML page. Google Chrome en versiones anteriores a 56.0.2924.76 para Windows desinfecta insuficientemente URLs de DevTools, lo que permitió a un atacante remoto que convenció a un usuario para instalar una extensión maliciosa para leer el contenido del sistema de archivos a través de una página HTML manipulada. • http://rhn.redhat.com/errata/RHSA-2017-0206.html http://www.debian.org/security/2017/dsa-3776 http://www.securityfocus.com/bid/95792 http://www.securitytracker.com/id/1037718 https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html https://crbug.com/662859 https://security.gentoo.org/glsa/201701-66 https://access.redhat.com/security/cve/CVE-2017-5011 https://bugzilla.redhat.com/show_bug.cgi?id=1416661 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2017-5024 – chromium-browser: heap overflow in ffmpeg
https://notcve.org/view.php?id=CVE-2017-5024
FFmpeg in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, failed to perform proper bounds checking, which allowed a remote attacker to potentially exploit heap corruption via a crafted video file. FFmpeg en Google Chrome en versiones anteriores a 56.0.2924.76 para Linux, Windows y Mac, falló en realizar la comprobación de los límites adecuados, lo que permitió a un atacante remoto potencialmente explotar la corrupción de la memoria dinámica a través de un archivo de vídeo manipulado. • http://rhn.redhat.com/errata/RHSA-2017-0206.html http://www.debian.org/security/2017/dsa-3776 http://www.securityfocus.com/bid/95792 http://www.securitytracker.com/id/1037718 https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html https://crbug.com/643951 https://security.gentoo.org/glsa/201701-66 https://security.gentoo.org/glsa/201705-05 https://access.redhat.com/security/cve/CVE-2017-5024 https://bugzilla.redhat.com/show_bug.cgi?id=1416675 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2017-5022 – chromium-browser: bypass of content security policy in blink
https://notcve.org/view.php?id=CVE-2017-5022
Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to properly enforce unsafe-inline content security policy, which allowed a remote attacker to bypass content security policy via a crafted HTML page. Blink en Google Chrome en versiones anteriores a 56.0.2924.76 para Linux, Windows y Mac y 56.0.2924.87 para Android, no pudo aplicar correctamente la política de seguridad de contenido inseguro en línea, lo que permitió a un atacante remoto omitir la política de seguridad de contenido a través de una página HTML. • http://rhn.redhat.com/errata/RHSA-2017-0206.html http://www.debian.org/security/2017/dsa-3776 http://www.securityfocus.com/bid/95792 http://www.securitytracker.com/id/1037718 https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html https://crbug.com/663620 https://security.gentoo.org/glsa/201701-66 https://access.redhat.com/security/cve/CVE-2017-5022 https://bugzilla.redhat.com/show_bug.cgi?id=1416673 •
CVE-2017-5007 – chromium-browser: universal xss in blink
https://notcve.org/view.php?id=CVE-2017-5007
Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, incorrectly handled the sequence of events when closing a page, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page. Blink en Google Chrome en versiones anteriores a 56.0.2924.76 para Linux, Windows y Mac y 56.0.2924.87 para Android, no manejó correctamente la secuencia de eventos mientras cerraba una página, lo que permitió a un atacante remoto inyectar secuencias de comandos o HTML arbitrario (UXSS) a través de una página HTML manipulada. • https://github.com/Ang-YC/CVE-2017-5007 http://rhn.redhat.com/errata/RHSA-2017-0206.html http://www.debian.org/security/2017/dsa-3776 http://www.securityfocus.com/bid/95792 http://www.securitytracker.com/id/1037718 https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html https://crbug.com/671102 https://security.gentoo.org/glsa/201701-66 https://access.redhat.com/security/cve/CVE-2017-5007 https://bugzilla.redhat.com/show_bug.cgi?id=141665 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2017-5025 – chromium-browser: heap overflow in ffmpeg
https://notcve.org/view.php?id=CVE-2017-5025
FFmpeg in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, failed to perform proper bounds checking, which allowed a remote attacker to potentially exploit heap corruption via a crafted video file. FFmpeg en Google Chrome en versiones anteriores a 56.0.2924.76 para Linux, Windows y Mac, falló en realizar la comprobación de los límites adecuados, lo que permitió a un atacante remoto potencialmente explotar la corrupción de la memoria dinámica a través de un archivo de vídeo manipulado. • http://rhn.redhat.com/errata/RHSA-2017-0206.html http://www.debian.org/security/2017/dsa-3776 http://www.securityfocus.com/bid/95792 http://www.securitytracker.com/id/1037718 https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html https://crbug.com/643950 https://security.gentoo.org/glsa/201701-66 https://security.gentoo.org/glsa/201705-05 https://access.redhat.com/security/cve/CVE-2017-5025 https://bugzilla.redhat.com/show_bug.cgi?id=1416676 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •