Rewterz
Rewterz Threat Advisory – CVE-2021-42753 – Fortinet FortiWeb
February 3, 2022
Rewterz
Rewterz Threat Alert – Sugar Ransomware – Active IOCs
February 3, 2022

Rewterz Threat Advisory – Multiple Google Chrome Vulnerabilities

Severity

High

Analysis Summary

CVE-2022-0470

Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds memory access in V8. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.

CVE-2022-0469

Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Cast. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.

CVE-2022-0468

Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Payments. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.

CVE-2022-0467

Google Chrome could allow a remote attacker to bypass security restrictions, caused by inappropriate implementation in Pointer Lock. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.

CVE-2022-0466

Google Chrome could allow a remote attacker to bypass security restrictions, caused by inappropriate implementation in Extensions Platform. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.

CVE-2022-0465

Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Extensions. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.

CVE-2022-0464

Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Accessibility. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.

CVE-2022-0463

Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Accessibility. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.

CVE-2022-0462

Google Chrome could allow a remote attacker to bypass security restrictions, caused by inappropriate implementation in Scroll. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.

CVE-2022-0461

Google Chrome could allow a remote attacker to bypass security restrictions, caused by a policy bypass in COOP. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.

CVE-2022-0460

Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Window Dialog. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.

CVE-2022-0459

Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Screen Capture. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.

CVE-2022-0458

Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Thumbnail Tab Strip. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.

CVE-2022-0457

Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a type confusion in V8. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.

CVE-2022-0456

Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Web Search. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.

CVE-2022-0455

Google Chrome could allow a remote attacker to bypass security restrictions, caused by inappropriate implementation in Full Screen Mode. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.

CVE-2022-0454

Google Chrome is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by ANGLE. By persuading a victim to visit a specially crafted Web site, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.

CVE-2022-0453

Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Reader Mode. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.

CVE-2022-0452

Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Safe Browsing. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.

Impact

  • Code Execution
  • Security Bypass
  • Buffer Overflow
  • Denial of Service

Affected Vendors

  • Google

Affected Products

  • Google Chrome 98

Remediation

Upgrade to the latest version of Chrome (98.0.4758.80 or later) from here:

https://chromereleases.googleblog.com/