Multiple vulnerabilities have been discovered in Google Chrome that could result in an attacker gaining control of your computer.
These vulnerabilities can be exploited if a user visits, or is redirected to, a specially crafted web page. Successful exploitation of these vulnerabilities could result in an attacker gaining the same privileges as the affected application. The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Our recommendations:
- Update all out of Date Google Chrome products.
- Use a non-administrative profile for running programs.
- Don’t visit untrusted websites
- Don’t open email attachments or click on unknown URLs in your email.
More information can be found at the links below:
Google:
http://googlechromereleases.blogspot.com/2014/04/stable-channel-update_24.html
CVE:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1730
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1731
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1732
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1733
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1734
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1735
SecurityFocus: