logo
DATABASE RESOURCES PRICING ABOUT US

KLA10585 Multiple vulnerabilities in Google Chrome

Description

### *Detect date*: 05/19/2015 ### *Severity*: Critical ### *Description*: Multiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to bypass security restrictions, spoof user interface, conduct cross-scripting attack, cause denial of service or execute arbitrary code. ### *Affected products*: Google Chrome versions earlier than 43.0.2357.65 ### *Solution*: Update to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk. [Get Google Chrome](<https://www.google.com/chrome/browser/desktop/index.html>) ### *Original advisories*: [Google blog](<http://feedproxy.google.com/~r/GoogleChromeReleases/~3/r7j0t-RwdaU/stable-channel-update_19.html>) ### *Impacts*: ACE ### *Related products*: [Google Chrome](<https://threats.kaspersky.com/en/product/Google-Chrome/>) ### *CVE-IDS*: [CVE-2015-1258](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1258>)7.5Critical [CVE-2015-1259](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1259>)7.5Critical [CVE-2015-1265](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1265>)7.5Critical [CVE-2015-1251](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1251>)6.8High [CVE-2015-1262](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1262>)7.5Critical [CVE-2015-1264](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1264>)4.3Warning [CVE-2015-1252](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1252>)7.5Critical [CVE-2015-3910](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3910>)7.5Critical [CVE-2015-1263](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1263>)4.3Warning [CVE-2015-1260](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1260>)7.5Critical [CVE-2015-1261](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1261>)5.0Critical [CVE-2015-1255](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1255>)6.8High [CVE-2015-1257](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1257>)7.5Critical [CVE-2015-1256](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1256>)7.5Critical [CVE-2015-1254](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1254>)5.0Critical [CVE-2015-1253](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1253>)7.5Critical ### *Exploitation*: The following public exploits exists for this vulnerability:


Related