The version of Google Chrome installed on the remote host is prior to 53.0.2785.113, and is affected by multiple vulnerabilities :
- A use-after-free error in ‘bindings/modules/v8/V8BindingForModules.cpp’ may allow a context-dependent attacker to dereference already freed memory and potentially execute arbitrary code.
- A use-after-free error exists in Blink related to window constructors being callable. This may allow a context-dependent attacker to dereference already freed memory and potentially execute arbitrary code.
- An unspecified flaw may allow a context-dependent attacker to disclose potentially sensitive information in memory. No further details have been provided.
- A flaw is triggered when handling a specially crafted web page. This may allow a context-dependent attacker to load extension JavaScript resources, which they may leverage to perform unauthorized actions.
- A flaw exists in ‘ui/cocoa/browser_window_controller_private.mm’ that is triggered when in fullscreen mode. This may cause popups to not be properly suppressed.
- An unspecified flaw may allow a context-dependent attacker to have an unspecified high severity impact. No further details have been provided by the vendor.
- A flaw is triggered when handling IPC messages for dead routing IDs. This may allow a context-dependent attacker to potentially execute arbitrary code.
- An unspecified flaw exists in ‘content/child/blob_storage/blob_transport_controller.cc’ related to improper shared memory mapping. This may allow a context-dependent attacker to have an unspecified impact.
- An unspecified flaw exists in the Safe Browsing feature that is triggered when validating URLs. This may allow a context-dependent attacker to bypass intended restrictions.
- An unspecified flaw may allow a context-dependent attacker to bypass SafeBrowsing. No further details have been provided.