A Multiple vulnerabilities were identified in Google Chrome, where a remote attacker could exploit some of these vulnerabilities to trigger security restriction bypass, data manipulation, remote code execution and denial of service condition on the targeted system.
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for remote code execution. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. Details of these severe vulnerabilities are as follows:
Before installation of the software, please visit the software vendor web-site for more details.
Apply fixes issued by the vendor:
The information provided herein is on an “as is” basis, without warranty of any kind.