Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Google Chrome multiple vulnerabilities - Jan11 (Linux)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
The host is running Google Chrome and is prone to multiple vulnerabilities.
Insight
Insight
- An unspecified error exists within the extensions notification handling. - An unspecified error exists when handling pointers within node iteration. - An unspecified error exists when printing multi-page PDF files. - An error when handling CSS and canvas can be exploited to reference a stale pointer. - An error when handling CSS and cursors can be exploited to reference a stale pointer. - A use-after-free error when handling PDF pages can be exploited to reference freed memory. - An error due to an out-of-memory condition when processing PDF files can be exploited to cause stack corruption. - An error when handling mismatched video frame sizes can be exploited to reference invalid memory. - An error when handling SVG '<use>' elements can be exploited to reference a stale pointer. - An error when handling rogue extensions can be exploited to reference an uninitialised pointer. - An error within the Vorbis decoder can be exploited to cause a buffer overflow. - An error within PDF shading can be exploited to cause a buffer overflow. - An error when handling anchors may result in an incorrect type cast. - An error when handling videos may result in an incorrect type cast. - An error after removal of a DOM node may result in a stale rendering node. - An error when handling speech can be exploited to reference a stale pointer.
Affected Software
Affected Software
Google Chrome version prior to 8.0.552.237 on Linux
Solution
Solution
Upgrade to the Google Chrome 8.0.552.237 or later.