Last Updated: 2013-01-11 16:42:18 UTC
by Stephen Hall (Version: 1)
The Chrome team over at Google have been busy, and V24 of their Chrome browser has been released.
V24 brings both new functionality with the introduction of Math ML and an update to the flash version but also more importantly a significant number of bug fixes.
|162494||High||CVE-2012-5145||Use-after-free in SVG layout.|
|165622||High||CVE-2012-5146||Same origin policy bypass with malformed URL|
|165864||High||CVE-2012-5147||Use-after-free in DOM handling|
|167122||Medium||CVE-2012-5148||Missing filename sanitization in hyphenation support|
|166795||High||CVE-2012-5149||Integer overflow in audio IPC handling|
|165601||High||CVE-2012-5150||Use-after-free when seeking video|
|165430||Medium||CVE-2012-5152||Out-of-bounds read when seeking video|
|164565||High||CVE-2012-5153||Out-of-bounds stack access in v8|
|164490||Low||CVE-2012-5154||Integer overflow in shared memory allocation|
|163208||Medium||CVE-2012-5155||Missing Mac sandbox for worker processes|
|162778||High||CVE-2012-5156||Use-after-free in PDF fields|
162776 / 162156
|Medium||CVE-2012-5157||Out-of-bounds reads in PDF image handling|
|162153||High||CVE-2013-0828||Bad cast in PDF root handling|
|162114||high||CVE-2013-0829||Corruption of database metadata leading to incorrect file access|
|162066||Low||CVE-2013-0830||Missing NUL termination in IPC|
|161836||Low||CVE-2013-0831||Possible path traversal from extension process|
|160380||Medium||CVE-2013-0832||Use-after-free with printing|
|154485||Medium||CVE-2013-0833||Out-of-bounds read with printing|
|154283||Medium||CVE-2013-0834||Out-of-bounds read with glyph handling|
|152921||Low||CVE-2013-0835||Browser crash with geolocation|
|150545||High||CVE-2013-0836||Crash in v8 garbage collection|
|145363||Medium||CVE-2013-0837||Crash in extension tab handling|
|143859||Low||CVE-2013-0838||Tighten permissions on shared memory segments|
For more details, and the credits to the vulnerabilities please see:
Last Updated: 2013-01-11 14:44:08 UTC
by Stephen Hall (Version: 1)
Well, hot on the heals of Microsoft Patch Tuesday as we now know comes Adobe Patch Tuesday.
This covers a huge number of CVE's (27 if you need to know) and most of which "could" lead to code execution using a variety of techniques including use-after-free, integer, heap and stack over flows.
However, as we know "other PDF readers are available" and Foxit is quiet often what security minded people have installed. However there is also announced this week an as yet un-patched vulnerability discovered by Andrea Micalizzii in Foxit Reader 5.x, and Foxit Reader 2.x Plugin for which the exploit code is publicly available. This has reportedly been tested against version Foxit Reader 184.108.40.2068 which is what is available for download as of today.
Please choose a specific diary above to comment