Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Google Chrome Multiple Vulnerabilities-01 July15 (Windows)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
The host is installed with Google Chrome and is prone to multiple vulnerabilities.
Insight
Insight
Multiple flaws are due to: - Multiple heap based buffer-overflow in pdfium. - An error which allows executable files to run immediately after download. - A use-after-free error in IndexedDB. - A memory corruption error in skia. - An error allowing content security policy (CSP) bypass. - A use-after-free error in pdfium. - A heap based buffer-overflow in expat. - A use-after-free error in blink. - Universal cross-site scripting (UXSS) error in blink. - An error in cascading style sheets (CSS) allowing to bypass same origin policy. - Uninitialized memory read error in ICU. - A use-after-free error related to unexpected GPU process termination. - A use-after-free error in accessibility. - An error leading to URL spoofing using pdf files. - An error leading to information leak in XSS auditor. - An error allowing spell checking dictionaries to be fetched over HTTP. - The regular-expression implementation in Google V8 mishandles interrupts. - Various other unspecified errors.
Affected Software
Affected Software
Google Chrome version prior to 44.0.2403.89 on Windows.
Detection Method
Detection Method
Checks if a vulnerable version is present on the target host.
Solution
Solution
Upgrade to Google Chrome version 44.0.2403.89 or later.