Lucene search

K
nessusThis script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.MACOSX_GOOGLE_CHROME_53_0_2785_89.NASL
HistorySep 02, 2016 - 12:00 a.m.

Google Chrome < 53.0.2785.89 Multiple Vulnerabilities (Mac OS X

2016-09-0200:00:00
This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
9

The version of Google Chrome installed on the remote Mac OS X host is prior to 53.0.2785.89. It is, therefore, affected by multiple vulnerabilities :

  • Universal XSS in Blink. Credit to anonymous

  • Universal XSS in Blink. Credit to anonymous

  • Script injection in extensions. Credit to Max Justicz (http

  • Use after free in Blink. Credit to anonymous

  • Use after free in PDFium. Credit to anonymous

  • Heap overflow in PDFium. Credit to GiWan Go of Stealien

  • Use after destruction in Blink. Credit to Atte Kettunen of OUSPG

  • Heap overflow in PDFium. Credit to anonymous

  • Address bar spoofing. Credit to anonymous

  • Use after free in event bindings. Credit to jinmo123

  • Heap overflow in PDFium. Credit to anonymous

  • Heap overflow in PDFium. Credit to GiWan Go of Stealien

  • Heap overflow in PDFium. Credit to GiWan Go of Stealien

  • Type confusion in Blink. Credit to 62600BCA031B9EB5CB4A74ADDDD6771E working with Trend Micro’s Zero Day Initiative

  • Extensions web accessible resources bypass. Credit to Nicolas Golubovic

  • Address bar spoofing. Credit to Rafay Baloch PTCL Etisalat (http

  • Universal XSS using DevTools. Credit to anonymous

  • Script injection in DevTools. Credit to Gregory Panakkal

  • SMB Relay Attack via Save Page As. Credit to Gregory Panakkal

  • Extensions web accessible resources bypass. Credit to @l33terally, FogMarks.com (@FogMarks)

  • Various fixes from internal audits, fuzzing and other initiatives.

Note that Nessus has not tested for these issues but has instead relied only on the applications self-reported version number.

Note that Tenable Network Security has extracted the preceding description block directly from the Chrome security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(93316);
  script_version("1.9");
  script_cvs_date("Date: 2019/11/14");

  script_cve_id(
    "CVE-2016-5147",
    "CVE-2016-5148",
    "CVE-2016-5149",
    "CVE-2016-5150",
    "CVE-2016-5151",
    "CVE-2016-5152",
    "CVE-2016-5153",
    "CVE-2016-5154",
    "CVE-2016-5155",
    "CVE-2016-5156",
    "CVE-2016-5157",
    "CVE-2016-5158",
    "CVE-2016-5159",
    "CVE-2016-5160",
    "CVE-2016-5161",
    "CVE-2016-5162",
    "CVE-2016-5163",
    "CVE-2016-5164",
    "CVE-2016-5165",
    "CVE-2016-5166",
    "CVE-2016-5167"
  );

  script_name(english:"Google Chrome < 53.0.2785.89 Multiple Vulnerabilities (Mac OS X");
  script_summary(english:"Checks the version of Google Chrome.");

  script_set_attribute(attribute:"synopsis", value:
"A web browser installed on the remote Mac OS X host is affected by
multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The version of Google Chrome installed on the remote Mac OS X host is
prior to 53.0.2785.89. It is, therefore, affected by multiple
vulnerabilities :

  - Universal XSS in Blink. Credit to anonymous

  - Universal XSS in Blink. Credit to anonymous

  - Script injection in extensions. Credit to Max Justicz
    (http

  - Use after free in Blink. Credit to anonymous

  - Use after free in PDFium. Credit to anonymous

  - Heap overflow in PDFium. Credit to GiWan Go of Stealien

  - Use after destruction in Blink. Credit to Atte Kettunen
    of OUSPG

  - Heap overflow in PDFium. Credit to anonymous

  - Address bar spoofing. Credit to anonymous

  - Use after free in event bindings. Credit to jinmo123

  - Heap overflow in PDFium. Credit to anonymous

  - Heap overflow in PDFium. Credit to GiWan Go of Stealien

  - Heap overflow in PDFium. Credit to GiWan Go of Stealien

  - Type confusion in Blink. Credit to
    62600BCA031B9EB5CB4A74ADDDD6771E working with Trend
    Micro's Zero Day Initiative

  - Extensions web accessible resources bypass. Credit to
    Nicolas Golubovic

  - Address bar spoofing. Credit to Rafay Baloch PTCL
    Etisalat (http

  - Universal XSS using DevTools. Credit to anonymous

  - Script injection in DevTools. Credit to Gregory
    Panakkal

  - SMB Relay Attack via Save Page As. Credit to Gregory
    Panakkal

  - Extensions web accessible resources bypass. Credit to
    @l33terally, FogMarks.com (@FogMarks)

  - Various fixes from internal audits, fuzzing and other
    initiatives.

Note that Nessus has not tested for these issues but has instead
relied only on the applications self-reported version number.

Note that Tenable Network Security has extracted the preceding
description block directly from the Chrome security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.");
  # http://googlechromereleases.blogspot.com/2016/08/stable-channel-update-for-desktop_31.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?f6e7512a");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Google Chrome version to 53.0.2785.89 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2016-5167");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2016/08/31");
  script_set_attribute(attribute:"patch_publication_date", value:"2016/08/31");
  script_set_attribute(attribute:"plugin_publication_date", value:"2016/09/02");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:google:chrome");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"MacOS X Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("macosx_google_chrome_installed.nbin");
  script_require_keys("MacOSX/Google Chrome/Installed");

  exit(0);
}

include("google_chrome_version.inc");

get_kb_item_or_exit("MacOSX/Google Chrome/Installed");

google_chrome_check_version(fix:'53.0.2785.89', severity:SECURITY_HOLE);
VendorProductVersionCPE
googlechromecpe:/a:google:chrome

References