Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Google Chrome Security Updates(stable-channel-update-for-desktop-2017-10)-Linux

Information

Severity

Severity

Medium

Family

Family

General

CVSSv2 Base

CVSSv2 Base

6.8

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

6 years ago

Modified

Modified

5 years ago

Summary

The host is installed with Google Chrome and is prone to multiple vulnerabilities.

Insight

Insight

Multiple flaws exists due to, - An input validation error in MHTML. - Multiple heap overflow errors in Skia, WebGL and libxml2. - Multiple use after free errors in PDFium and WebAudio. - An incorrect stack manipulation in WebAssembly. - Multiple Out of bounds read and write errors in Skia. - UI spoofing in Blink. - Content security bypass. - Multiple URL spoofing errors in OmniBox. - An extension limitation bypass in Extensions. - An incorrect registry key handling in PlatformIntegration. - Referrer leak in Devtools. - URL spoofing in extensions UI. - Null pointer dereference error in ImageCapture. - Various fixes from internal audits, fuzzing and other initiatives.

Affected Software

Affected Software

Google Chrome version prior to 62.0.3202.62 on Linux

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Upgrade to Google Chrome version 62.0.3202.62 or later.