CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
91.6%
Google Chrome is prone to multiple vulnerabilities.
# SPDX-FileCopyrightText: 2011 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.802102");
script_version("2024-02-08T14:36:53+0000");
script_tag(name:"last_modification", value:"2024-02-08 14:36:53 +0000 (Thu, 08 Feb 2024)");
script_tag(name:"creation_date", value:"2011-06-13 15:28:04 +0200 (Mon, 13 Jun 2011)");
script_cve_id("CVE-2011-1808", "CVE-2011-1809", "CVE-2011-1810", "CVE-2011-1811",
"CVE-2011-1812", "CVE-2011-1813", "CVE-2011-1814", "CVE-2011-1815",
"CVE-2011-1816", "CVE-2011-1817", "CVE-2011-1818", "CVE-2011-1819",
"CVE-2011-2332", "CVE-2011-2342");
script_tag(name:"cvss_base", value:"7.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_name("Google Chrome Multiple Vulnerabilities (Jun 2011) - Windows");
script_xref(name:"URL", value:"http://googlechromereleases.blogspot.com/2011/06/chrome-stable-release.html");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/48129");
script_copyright("Copyright (C) 2011 Greenbone AG");
script_category(ACT_GATHER_INFO);
script_family("General");
script_dependencies("gb_google_chrome_detect_portable_win.nasl");
script_mandatory_keys("GoogleChrome/Win/Ver");
script_tag(name:"impact", value:"Successful exploitation could allow attackers to execute arbitrary code in
the context of the browser, cause denial-of-service conditions, bypass the
same-origin policy, and disclose potentially sensitive information.");
script_tag(name:"affected", value:"Google Chrome version prior to 12.0.742.91 on windows");
script_tag(name:"insight", value:"The flaws are due to
- Use-after-free vulnerability due to integer issues in float handling.
- Use-after-free vulnerability in accessibility support.
- Error in 'Cascading Style Sheets (CSS)' implementation, which fails to properly
restrict access to the visit history, which allows remote attackers to obtain
sensitive information via unspecified vectors.
- Not properly handling a large number of form submissions.
- Bypassing extensions permission.
- 'Stale pointer' in extension framework.
- Attempts to read data from an uninitialized pointer.
- Extension script injection into new tab page.
- Use-after-free vulnerability in developer tools, image loader
- Fails to properly implement history deletion.
- Extension injection into 'chrome://' pages.
- Same origin bypass in 'v8' and 'DOM'.");
script_tag(name:"solution", value:"Upgrade to the Google Chrome 12.0.742.91 or later.");
script_tag(name:"summary", value:"Google Chrome is prone to multiple vulnerabilities.");
script_tag(name:"qod_type", value:"registry");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("version_func.inc");
chromeVer = get_kb_item("GoogleChrome/Win/Ver");
if(!chromeVer){
exit(0);
}
if(version_is_less(version:chromeVer, test_version:"12.0.742.91")){
report = report_fixed_ver(installed_version:chromeVer, fixed_version:"12.0.742.91");
security_message(port: 0, data: report);
}