Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Severity
High
Analysis Summary
A number of vulnerabilities are reported in Google Chrome.
1) A use-after-free error related to PDFium can be exploited to corrupt memory.
2) An integer overflow error related to Angle can be exploited to corrupt memory.
3) An error related to V8 can be exploited to corrupt memory.
4) A use-after-free error related to Blink can be exploited to corrupt memory.
5) Another use-after-free error related to Blink can be exploited to corrupt memory.
6) An error related to Autofill can be exploited to disclose certain information.
7) An error related to Blink can be exploited to bypass cross origin restrictions.
8) An error related to Omnibox can be exploited to conduct URL spoofing attacks.
Note: The vulnerability #8 only affects Google Chrome running on Apple iOS.
9) An error related to V8 can be exploited to cause an out-of-bounds read memory access.
10) An error related to Blink can be exploited to bypass cross origin restrictions.
11) Another error related to Blink can be exploited to cause a heap-based buffer overflow.
12) An error related to exploit persistence extension exists. No further information is available.
Note: The vulnerability #12 only affects Google Chrome running on Android.
13) An error related to Angle can be exploited to cause a heap-based buffer overflow.
14) An error related to media reader. exists. No further information is available.
15) An error related to developer tools exists. No further information is available.
16) An integer overflow error related to PDFium can be exploited to corrupt memory.
17) Another integer overflow error related to PDFium can be exploited to corrupt memory.
Successful exploitation of the vulnerabilities #1 through #5, #11, #13, #16, and #17 may allow execution of arbitrary code.
18) An error related to download manager can be exploited to bypass cross origin restrictions.
19) An error related to forced navigation from service worker exists. No further information is available.
20) Multiple unspecified errors exist. No further information is available.
The vulnerabilities are reported in versions prior to 74.0.3729.108.
Below are the CVE identifiers associated with these vulnerabilities.
CVE-2019-5817, CVE-2019-5807, CVE-2019-5808, CVE-2019-5812, CVE-2019-5816, CVE-2019-5820, CVE-2019-5821, CVE-2019-5815, CVE-2019-5805, CVE-2019-5822, CVE-2019-5814, CVE-2019-5811, CVE-2019-5823, CVE-2019-5809, CVE-2019-5819, CVE-2019-5813, CVE-2019-5810, CVE-2019-5806, CVE-2019-5818
Impact
Affected Vendors
Affected Products
Google Chrome 73.x
Remediation
Upgrade Google Chrome to version 74.0.3729.108.