Severity Rating: HIGH

Software Affected

Google Chrome versions prior to 84.0.4147.89
Overview

Multiple vulnerabilities have been reported in Google Chrome could allow a
remote attacker to execute arbitrary code, bypass security restrictions,
access sensitive information, conduct spoofing attack and denial of
service(DoS) on the targeted system.

Description

These vulnerabilities exist in Google Chrome due to heap buffer overflow,
side-channel information leakage, type confusion, inappropriate
implementation in WebRTC, use after free, policy bypass, out of bounds
write, insufficient policy enforcement, incorrect security UI, out of
bounds memory access and insufficient data validation. A remote attacker
could exploit these vulnerabilities by creating a specially crafted webpage
on the targeted system. 

Successful exploitation of these vulnerabilities could allow the attacker
to execute arbitrary code, bypass security restrictions, access sensitive
information, conduct spoofing attack and denial of service(DoS) on the
targeted system.

Solution

Upgrade to Google Chrome 84.0.4147.89
Vendor Information

Google Chrome
ktop.html

References

Google Chrome
ktop.html

CVE Name
CVE-2020-6510
CVE-2020-6511
CVE-2020-6512
CVE-2020-6513
CVE-2020-6514
CVE-2020-6515
CVE-2020-6516
CVE-2020-6517
CVE-2020-6518
CVE-2020-6519
CVE-2020-6520
CVE-2020-6521
CVE-2020-6522
CVE-2020-6523
CVE-2020-6524
CVE-2020-6525
CVE-2020-6526
CVE-2020-6527
CVE-2020-6528
CVE-2020-6529
CVE-2020-6530
CVE-2020-6531
CVE-2020-6533
CVE-2020-6534
CVE-2020-6535
CVE-2020-6536

About Cert Advisory

We have created this blog to provide latest security advisory from the india cert for the security vulnerability, threats, attacks and patching required to mitigate any kind of cyber attacks.

Related Posts

© Copyright 2020. Designed By Templateify

© Copyright 2020. Ud64

Scroll to Top