Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Google Chrome Multiple Vulnerabilities-01 July15 (Windows)

Information

Severity

Severity

Critical

Family

Family

General

CVSSv2 Base

CVSSv2 Base

9.3

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

8 years ago

Modified

Modified

4 years ago

Summary

The host is installed with Google Chrome and is prone to multiple vulnerabilities.

Insight

Insight

Multiple flaws are due to: - Multiple heap based buffer-overflow in pdfium. - An error which allows executable files to run immediately after download. - A use-after-free error in IndexedDB. - A memory corruption error in skia. - An error allowing content security policy (CSP) bypass. - A use-after-free error in pdfium. - A heap based buffer-overflow in expat. - A use-after-free error in blink. - Universal cross-site scripting (UXSS) error in blink. - An error in cascading style sheets (CSS) allowing to bypass same origin policy. - Uninitialized memory read error in ICU. - A use-after-free error related to unexpected GPU process termination. - A use-after-free error in accessibility. - An error leading to URL spoofing using pdf files. - An error leading to information leak in XSS auditor. - An error allowing spell checking dictionaries to be fetched over HTTP. - The regular-expression implementation in Google V8 mishandles interrupts. - Various other unspecified errors.

Affected Software

Affected Software

Google Chrome version prior to 44.0.2403.89 on Windows.

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Upgrade to Google Chrome version 44.0.2403.89 or later.