Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Google Chrome Security Updates(stable-channel-update-for-desktop-2020-07)-Linux

Information

Severity

Severity

Critical

Family

Family

General

CVSSv2 Base

CVSSv2 Base

9.3

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

3 years ago

Modified

Modified

3 years ago

Summary

The host is installed with Google Chrome and is prone to multiple vulnerabilities.

Insight

Insight

Multiple flaws exists due to, - Heap buffer overflow in background fetch. - Side-channel information leakage in content security policy. - Type Confusion in V8. - Heap buffer overflow in PDFium. - Inappropriate implementation in WebRTC. - Use after free in tab strip. - Policy bypass in CORS. - Heap buffer overflow in history. - Use after free in developer tools. - Policy bypass in CSP. - Heap buffer overflow in Skia. - Side-channel information leakage in autofill. - Inappropriate implementation in external protocol handlers. - Out of bounds write in Skia. - Heap buffer overflow in WebAudio. - Inappropriate implementation in iframe sandbox. - Insufficient policy enforcement in CSP. - Incorrect security UI in basic auth. - Out of bounds memory access in developer tools. - Side-channel information leakage in scroll to text. - Heap buffer overflow in WebRTC. - Insufficient data validation in WebUI. - Incorrect security UI in PWAs.

Affected Software

Affected Software

Google Chrome version prior to 84.0.4147.89 on Linux

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Upgrade to Google Chrome version 84.0.4147.89 or later. Please see the references for more information.