Google Chrome < 52.0.2743.116 Multiple Vulnerabilities

2016-09-02T00:00:00
ID 9490.PASL
Type nessus
Reporter Tenable
Modified 2019-03-06T00:00:00

Description

The version of Google Chrome installed on the remote host is prior to 52.0.2743.116, and is affected by multiple vulnerabilities :

  • An unspecified issue exists, which may allow a context-dependent attacker to have an unspecified high severity impact. No further details have been provided.
  • An unspecified issue exists, which may allow a context-dependent attacker to have an unspecified medium severity impact. No further details have been provided.)
  • A flaw exists that is triggered during the handling of specially crafted images. This may allow a context-dependent attacker to bypass the same-origin policy.(
  • A flaw exists that is triggered as nested message loops might access documents and not generate a notification. This may allow a context-dependent attacker to spoof the address bar.
  • An unspecified use-after-free error exists that may allow a context-dependent attacker to dereference already freed memory and potentially execute arbitrary code.(
  • A flaw exists in the 'sanitizeRemoteFrontendUrl()' function in 'devtools/front_end/devtools.js' that is triggered by a failure to properly sanitize input parameters. This may allow a context-dependent attacker to have an unspecified impact.
  • A flaw exists in the 'loadScriptsPromise()' function in 'devtools/front_end/Runtime.js' that is triggered by a failure to properly sanitize input parameters. This may allow a context-dependent attacker to have an unspecified impact.
  • An overflow condition is triggered as user-supplied input is not properly validated when handling RTP packets. This may allow a context-dependent attacker to cause a buffer overflow, resulting in a denial of service in a process linked against the library or potentially allowing the execution of arbitrary code.

                                        
                                            Binary data 9490.pasl