Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Google Chrome Multiple Vulnerabilities Feb16 (Windows)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
The host is installed with Google Chrome and is prone to multiple vulnerabilities.
Insight
Insight
Multiple flaws exist as, - The Developer Tools subsystem does not validate URL schemes properly. - The 'opj_pi_update_decode_poc' function in 'pi.c' script in OpenJPEG miscalculates a certain layer index value. - The Chrome Instant feature does not ensure a New Tab Page (NTP) navigation target is on the most-visited or suggestions list. - The DOM implementation does not properly restrict frame-attach operations from occurring during or after frame-detach operations. - Integer underflow exists in the 'ProcessCommandsInternal' function in 'dec/decode.c' script in Brotli - The Extensions subsystem does not prevent use of the 'Object.defineProperty' method to override intended extension behavior. - The'pi.c' script in OpenJPEG, as used in PDFium does not validate a certain precision value
Affected Software
Affected Software
Google Chrome versions prior to 48.0.2564.109 on Windows.
Detection Method
Detection Method
Checks if a vulnerable version is present on the target host.
Solution
Solution
Upgrade to Google Chrome version 48.0.2564.109 or later.