Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Google Chrome Multiple Vulnerabilities Feb16 (Windows)

Information

Severity

Severity

Medium

Family

Family

General

CVSSv2 Base

CVSSv2 Base

6.8

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

8 years ago

Modified

Modified

5 years ago

Summary

The host is installed with Google Chrome and is prone to multiple vulnerabilities.

Insight

Insight

Multiple flaws exist as, - The Developer Tools subsystem does not validate URL schemes properly. - The 'opj_pi_update_decode_poc' function in 'pi.c' script in OpenJPEG miscalculates a certain layer index value. - The Chrome Instant feature does not ensure a New Tab Page (NTP) navigation target is on the most-visited or suggestions list. - The DOM implementation does not properly restrict frame-attach operations from occurring during or after frame-detach operations. - Integer underflow exists in the 'ProcessCommandsInternal' function in 'dec/decode.c' script in Brotli - The Extensions subsystem does not prevent use of the 'Object.defineProperty' method to override intended extension behavior. - The'pi.c' script in OpenJPEG, as used in PDFium does not validate a certain precision value

Affected Software

Affected Software

Google Chrome versions prior to 48.0.2564.109 on Windows.

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Upgrade to Google Chrome version 48.0.2564.109 or later.