Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Google Chrome Multiple Vulnerabilities - March 11(Linux)

Information

Severity

Severity

High

Family

Family

Denial of Service

CVSSv2 Base

CVSSv2 Base

7.5

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

13 years ago

Modified

Modified

5 years ago

Summary

The host is running Google Chrome and is prone to multiple vulnerabilities.

Insight

Insight

The flaws are due to - Not preventing 'navigation' and 'close' operations on the top location of a sandboxed frame. - Error in handling parallel execution of calls to the 'print' method. - Cross-origin error message leak. - Error in performing 'box layout'. - Memory corruption error in 'counter nodes'. - Error in 'Web Workers' implementation allows which remote attackers to bypass the Same Origin Policy via unspecified vectors, related to an error message leak. - Use-after-free vulnerability in 'DOM URL' handling. - Out of bounds read handling unicode ranges. - Error in 'Google V8', allows remote attackers to bypass the Same Origin Policy via unspecified vectors. - Use-after-free vulnerability in document script lifetime handling. - Error in performing 'table painting'. - Error in 'OGG' container implementation. - Use of corrupt out-of-bounds structure in video code. - Error in handling DataView objects. - Bad cast in text rendering. - Error in context implementation in WebKit. - Unspecified vulnerability in the 'XSLT' implementation. - Not properly handling 'SVG' cursors. - 'DOM' tree corruption with attribute handling. - Corruption via re-entrancy of RegExp code. - Not properly mitigate an unspecified flaw in an X server.

Affected Software

Affected Software

Google Chrome version prior to 10.0.648.127 on Linux.

Solution

Solution

Upgrade to the Google Chrome 10.0.648.127 or later.