Lucene search

K
kasperskyKaspersky LabKLA48769
HistoryApr 04, 2023 - 12:00 a.m.

KLA48769 Multiple vulnerabilities in Google Chrome

2023-04-0400:00:00
Kaspersky Lab
threats.kaspersky.com
14
google chrome
ui spoofing
denial of service
arbitrary code execution
privilege escalation
stable channel update for desktop
cve-2023-1822
cve-2023-1812
cve-2023-1813
cve-2023-1820
cve-2023-1818
cve-2023-1823
cve-2023-1811
cve-2023-1819
cve-2023-1814
cve-2023-1817
cve-2023-1810
cve-2023-1815
cve-2023-1821
cve-2023-1816
cve-2023-2313
cve-2023-2311
security bypass
spoof user interface
privilege escalation
ace
dos
sb
pe

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.8

Confidence

High

EPSS

0.004

Percentile

75.2%

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to spoof user interface, cause denial of service, execute arbitrary code, gain privileges.

Below is a complete list of vulnerabilities:

  1. Security UI vulnerability in Navigation can be exploited to spoof user interface.
  2. Out of bounds memory access vulnerability in DOM Bindings can be exploited to cause denial of service.
  3. Implementation vulnerability in Extensions can be exploited to cause denial of service.
  4. Heap buffer overflow vulnerability in Browser History can be exploited to cause denial of service.
  5. Use after free vulnerability in Vulkan can be exploited to cause denial of service or execute arbitrary code.
  6. Implementation vulnerability in FedCM can be exploited to cause denial of service.
  7. Use after free vulnerability in Frames can be exploited to cause denial of service or execute arbitrary code.
  8. Out of bounds read vulnerability in Accessibility can be exploited to cause denial of service.
  9. Validation of untrusted input vulnerability in Safe can be exploited to cause denial of service.
  10. Policy enforcement vulnerability in Intents can be exploited to cause denial of service.
  11. Heap buffer overflow vulnerability in Visuals can be exploited to cause denial of service.
  12. Use after free vulnerability in Networking APIs can be exploited to cause denial of service or execute arbitrary code.
  13. Implementation vulnerability in WebShare can be exploited to cause denial of service.
  14. Security UI vulnerability in Picture In Picture can be exploited to spoof user interface.
  15. Implementation vulnerability in Sandbox can be exploited to cause denial of service.

Original advisories

Stable Channel Update for Desktop

Related products

Google-Chrome

CVE list

CVE-2023-1822 high

CVE-2023-1812 critical

CVE-2023-1813 high

CVE-2023-1820 critical

CVE-2023-1818 critical

CVE-2023-1823 high

CVE-2023-1811 critical

CVE-2023-1819 high

CVE-2023-1814 high

CVE-2023-1817 high

CVE-2023-1810 critical

CVE-2023-1815 critical

CVE-2023-1821 high

CVE-2023-1816 high

CVE-2023-2313 critical

CVE-2023-2311 high

Solution

Update to the latest version

Download Google Chrome

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Google Chrome earlier than 112.0.5615.50

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.8

Confidence

High

EPSS

0.004

Percentile

75.2%