Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Google Chrome Security Updates(stable-channel-update-for-desktop_24-2018-01)-Windows

Information

Severity

Severity

Medium

Family

Family

General

CVSSv2 Base

CVSSv2 Base

6.8

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

6 years ago

Modified

Modified

4 years ago

Summary

The host is installed with Google Chrome and is prone to multiple vulnerabilities.

Insight

Insight

Multiple flaws exists due to, - Use after free error in PDFium. - Same origin bypass in Shared Worker. - Race condition when opening downloaded files. - Integer overflow error and referrer policy bypass in Blink. - Insufficient isolation of devtools from extensions. - Integer underflow in WebAssembly. - Insufficient user gesture requirements in autofill. - Heap buffer overflow and cross origin URL leak in WebGL. - XSS in DevTools. - Content security policy bypass. - URL spoof in Navigation and OmniBox. - Insufficient escaping with external URL handlers. - UI spoof in Permissions. - Referrer leak in XSS Auditor. - Incomplete no-referrer policy implementation. - Leak of page thumbnails in New Tab Page. - Use after free in WebUI. - Incorrect security UI in Omnibox. - Insufficient policy enforcement in Catalog Service.

Affected Software

Affected Software

Google Chrome version prior to 64.0.3282.119 on Windows

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Upgrade to Google Chrome version 64.0.3282.119 or later. Please see the references for more information.