venerdì 22 novembre 2024 10:47 Mobile Tag_Search Network_Search Site_Map Feed_RSS 3dfxzone amdzone atizone nvidiazone unixzone forumzone enboard.3dfxzone
     
HWSetup.it
proudly powered by 3dfxzone.it
 
 
Home   |   News   |   Headlines   |   Articoli   |   Componenti   |   Schede Video   |   Applicazioni   |   Benchmark   |   Community   |   Redazione   |   Ricerca
Sei in: Home  Applicazioni  Informazioni e Release Notes del file Google Chrome 2.0.172.43
Informazioni e Release Notes del file Google Chrome 2.0.172.43
Data di pubblicazione: 26 agosto 2009
Condividi su Facebook Condividi su Twitter Condividi su WhatsApp Condividi su reddit
Di seguito sono consultabili le note di rilascio - in gergo "release notes" - relative al file Google Chrome 2.0.172.43, nel caso in cui gli sviluppatori abbiano reso disponibile tale documentazione in occasione della pubblicazione del software. Tuttavia, se hai bisogno di maggiori informazioni su Google Chrome 2.0.172.43, o se le note di rilascio non sono (ancora) disponibili, è comunque possibile procedere con la lettura della descrizione del file.


Google Chrome 2.0.172.43 has been released to the Stable channel to fix the security issues listed below.

CVE-2009-2935 Unauthorized memory read from Javascript

A flaw in the V8 Javascript engine might allow specially-crafted Javascript on a web page to read unauthorized memory, bypassing security checks. It is possible that this could lead to disclosing unauthorized data to an attacker or allow an attacker to run arbitrary code.

More info: http://code.google.com/p/chromium/issues/detail?id=18639 (This issue will be made public once a majority of users are up to date with the fix.)

Severity: High.  An attacker might be able to run arbitrary code within the Google Chrome sandbox.

Credit: This issue was found by Mozilla Security.

Mitigations:

  • A victim would need to visit a page under an attacker’s control.
  • Any code that an attacker might be able to run inside the renderer process would be inside the sandbox. Click here for more details about sandboxing.

Security Fix: Treat weak signatures as invalid

Google Chrome no longer connects to HTTPS (SSL) sites whose certificates are signed using MD2 or MD4 hashing algorithms. These algorithms are considered weak and might allow an attacker to spoof an invalid site as a valid HTTPS site. 

More info: http://code.google.com/p/chromium/issues/detail?id=18725 (This issue will be made public once a majority of users are up to date with the fix.)

Severity: Medium.  Further advances in attacks against weak hashing algorithms may eventually permit attacks to forge certificates.

Credit:  Dan Kaminsky, Director of Penetration Testing, IOActive Inc., Meredith Patterson and Len Sassaman. See their paper at http://www.ioactive.com/pdfs/PKILayerCake.pdf

CVE-2009-2414  Stack consumption vulnerability in libxml2

CVE-2009-2416  Multiple use-after-free vulnerabilities in libxml2 

Pages using XML can cause a Google Chrome tab process to crash. A malicious XML payload may be able to trigger a use-after-free condition. Other tabs are unaffected.

More info: See the CVE entries noted in this report.

Severity: High.  An attacker might be able to run arbitrary code within the Google Chrome sandbox.

Credit: Original discovery by Rauli Kaksonen and Jukka Taimisto from the CROSS project at Codenomicon Ltd. The Google Chrome security team determined that Chrome was affected.

Mitigations:

  • A victim would need to visit a page under an attacker’s control.
  • Any code that an attacker might be able to run inside the renderer process would be inside the sandbox. Click here for more details about sandboxing.

 TAG: chrome  |  google  |  javascript  |  sicurezzaIndice Tag  
  Applicazione successiva   Applicazione precedente
 EVGA SLI Enhancement Patch 16 (08.25.09)   HDD Temperature 4.0.19 
  Altre applicazioni che ti potrebbero interessare Indice Applicazioni  
 Maxthon 5.2.6.1000 
 Maxthon 5.2.3.4000 
 Maxthon 5.2.3.2000 
 Maxthon 5.1.6.3000 
 Maxthon 5.1.4.3000 
 Avant Browser Ultimate 2017 build 7 
 Avant Browser Ultimate 2016 build 11 
 Avant Browser 2016 build 9 
 Avant Browser Ultimate 2016 build 8 
 Avant Browser 2013 build 108 
      Contatti

      Pubblicità

      Media Kit
      Community HWSetup.it

      Condividi sui social

      Condividi via email
      Feed RSS

      Note legali

      Privacy
      Sitemap

      Translator

      Links
      Siti Partner:

      3dfxzone.it      amdzone.it      atizone.it

      forumzone.it      nvidiazone.it      unixzone.it
Le pagine di HWSetup.it sono generate da un'applicazione proprietaria di cui è vietata la riproduzione parziale o totale (layout e/o logica). I marchi e le sigle in esso citate sono di proprietà degli aventi diritto.