Multiple vulnerabilities have been discovered in Google Chrome that could result in an attacker gaining control of your computer.

These vulnerabilities can be exploited if a user visits, or is redirected to, a specially crafted web page. Successful exploitation of these vulnerabilities could result in an attacker gaining the same privileges as the affected application. The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Our recommendations:

  • Update all out of Date Google Chrome products.
  • Use a non-administrative profile for running programs.
  • Don’t visit untrusted websites
  • Don’t open email attachments or click on unknown URLs in your email.

More information can be found at the links below:

Google:

http://googlechromereleases.blogspot.com/2014/04/stable-channel-update_24.html

CVE:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1730

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1731

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1732

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1733

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1734

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1735

SecurityFocus:

http://www.securityfocus.com/bid/67082