FreeBSD has released a VuXML document and updated ports collection to address vulnerabilities in Google Chrome.
Google Chrome versions prior to 20.0.1132.43 contain multiple vulnerabilities that could allow an unauthenticated, remote attacker to gain unauthorized access to sensitive information, gain elevated privileges, or cause a denial of service (DoS) condition on a targeted system.
The Google Chrome Stable Channel Update remediates 20 memory corruption vulnerabilities, including seven use-after-free conditions. These conditons are associated with counter layout; first-letter handling; table section handling; Mac OS X user interface; SVG painting; SVG reference handling; and SVG resource handling. In addition, the update mitigates two out-of-bounds conditions due to SVG filter handling and texture conversions.
The update introduced additional performance and stability fixes associated with the following: leak of iframe fragment id; autofill display problem; wild pointer in array value settings; unqualified load of metro DLL; uninitialized pointer in PDF image codec; and sandboxed processes handling. The update mitigates issues that could lead to buffer overflows, resulting in a DoS condition, or allow a local user to gain elevated privileges or access sensitive information.
An unauthenticated, remote attacker could exploit these vulnerabilities by convincing a user to visit a malicious web page. Successful exploitation could allow the attacker to gain unauthorized access to sensitive information, gain elevated privileges, or cause a DoS condition on a targeted system.
Users are advised not to open e-mail messages from suspicious or unrecognized sources. If users cannot verify that the links or attachments included in e-mail messages are safe, they are advised not to open them.
Administrators are advised to apply the appropriate updates.
Version 1, June 27, 2012, 2:24 PM: Google Chrome contains multiple vulnerabilities that could allow an unauthenticated, remote attacker to gain unauthorized access to sensitive information, gain elevated privileges, or cause a denial of service condition on a targeted system. Updates are available.
LEGAL DISCLAIMER The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.