Lucene search

K
nessusThis script is Copyright (C) 2013-2022 Tenable Network Security, Inc.GOOGLE_CHROME_FRAME_26_0_1410_28.NASL
HistoryMar 28, 2013 - 12:00 a.m.

Google Chrome Frame < 26.0.1410.28 Denial of Service

2013-03-2800:00:00
This script is Copyright (C) 2013-2022 Tenable Network Security, Inc.
www.tenable.com
11

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

EPSS

0.014

Percentile

86.7%

The version of Google Chrome Frame installed on the remote host is earlier than 26.0.1410.28. Such versions are affected by a vulnerability that could allow an attacker to trigger a browser crash by tricking a victim into opening a specially crafted HTML document.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(65723);
  script_version("1.6");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");

  script_cve_id("CVE-2013-2493");
  script_bugtraq_id(58562);

  script_name(english:"Google Chrome Frame < 26.0.1410.28 Denial of Service");

  script_set_attribute(attribute:"synopsis", value:
"The remote host contains a web browser plugin that is affected by a
denial of service vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of Google Chrome Frame installed on the remote host is
earlier than 26.0.1410.28.  Such versions are affected by a
vulnerability that could allow an attacker to trigger a browser crash by
tricking a victim into opening a specially crafted HTML document.");
  script_set_attribute(attribute:"see_also", value:"https://bugs.chromium.org/p/chromium/issues/detail?id=178415");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Google Chrome Frame 26.0.1410.28 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2013/02/26");
  script_set_attribute(attribute:"patch_publication_date", value:"2013/03/06");
  script_set_attribute(attribute:"plugin_publication_date", value:"2013/03/28");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:google:chrome_frame");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2013-2022 Tenable Network Security, Inc.");

  script_dependencies("google_chrome_frame_installed.nasl");
  script_require_keys("SMB/Google_Chrome_Frame/Installed");

  exit(0);
}

include("audit.inc");
include("misc_func.inc");
include("global_settings.inc");

# Check each installation.
installs = get_kb_list_or_exit("SMB/Google_Chrome_Frame/*");

info = "";
vulns = make_array();

fix_version = "26.0.1410.28";

foreach install(sort(keys(installs)))
{
  if ("/Installed" >< install) continue;

  version = install - "SMB/Google_Chrome_Frame/";

  if (ver_compare(ver:version, fix:fix_version, strict:FALSE) == -1)
    vulns[version] =  installs[install];
}

# Report if vulnerable installs were found.
if (max_index(keys(vulns)))
{
  port = get_kb_item("SMB/transport");
  if (!port) port = 445;

  if (report_verbosity > 0)
  {
    info = "";
    n = 0;
    foreach version (sort(keys(vulns)))
    {
      path = vulns[version];
      if(!isnull(path))
      {
        info +=
          '\n  Path              : ' + path +
          '\n  Installed version : ' + version +
          '\n  Fixed version     : ' + fix_version +
          '\n';
        n++;
      }
    }
    info += '\n';

    if (n > 1) s = "s of Google Chrome Frame are";
    else s = " of Google Chrome Frame is";

    report =
      '\n' +
      "The following vulnerable instance" + s + " installed on" + '\n' +
      "the remote host :" + '\n' +
      info;

    security_warning(port:port, extra:report);
  }
  else security_warning(port);
}
else
{
  if (thorough_tests)
    exit(0,"No vulnerable versions of Google Chrome Frame were found.");
  else exit(1, "Some installs may have been missed because the 'Perform thorough tests' setting was not enabled.");
}

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

EPSS

0.014

Percentile

86.7%

Related for GOOGLE_CHROME_FRAME_26_0_1410_28.NASL