Lucene search

K
openvasCopyright (C) 2014 Greenbone AGOPENVAS:1361412562310804811
HistoryAug 19, 2014 - 12:00 a.m.

Google Chrome Multiple Vulnerabilities - 01 (Aug 2014) - Mac OS X

2014-08-1900:00:00
Copyright (C) 2014 Greenbone AG
plugins.openvas.org
12

6.1 Medium

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.011 Low

EPSS

Percentile

84.3%

Google Chrome is prone to multiple vulnerabilities.

# SPDX-FileCopyrightText: 2014 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:google:chrome";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.804811");
  script_version("2024-02-09T05:06:25+0000");
  script_cve_id("CVE-2014-3165", "CVE-2014-3166", "CVE-2014-3167");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_tag(name:"last_modification", value:"2024-02-09 05:06:25 +0000 (Fri, 09 Feb 2024)");
  script_tag(name:"creation_date", value:"2014-08-19 11:25:08 +0530 (Tue, 19 Aug 2014)");
  script_name("Google Chrome Multiple Vulnerabilities - 01 (Aug 2014) - Mac OS X");

  script_tag(name:"summary", value:"Google Chrome is prone to multiple vulnerabilities.");
  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
  script_tag(name:"insight", value:"Multiple flaws are due to

  - Use-after-free vulnerability in websockets/WorkerThreadableWebSocketChannel.cpp
script within the Web Sockets implementation in Blink.

  - An error within SPDY and other multiple unspecified errors.");
  script_tag(name:"impact", value:"Successful exploitation will allow remote attackers to disclose potentially
sensitive information, conduct a denial of service attack and potentially
execute arbitrary code or possibly have other impact via unknown vectors.");
  script_tag(name:"affected", value:"Google Chrome version prior to 36.0.1985.143 on Mac OS X.");
  script_tag(name:"solution", value:"Upgrade to Google Chrome 36.0.1985.143 or later.");
  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");

  script_xref(name:"URL", value:"http://secunia.com/advisories/59904");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/69201");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/69202");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/69203");
  script_xref(name:"URL", value:"https://www.hkcert.org/my_url/en/alert/14081401");
  script_xref(name:"URL", value:"http://googlechromereleases.blogspot.in/2014/08/stable-channel-update.html");
  script_copyright("Copyright (C) 2014 Greenbone AG");
  script_category(ACT_GATHER_INFO);
  script_family("General");
  script_dependencies("gb_google_chrome_detect_macosx.nasl");
  script_mandatory_keys("GoogleChrome/MacOSX/Version");

  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if(!chromeVer = get_app_version(cpe:CPE)){
  exit(0);
}

if(version_is_less(version:chromeVer, test_version:"36.0.1985.143"))
{
  report = report_fixed_ver(installed_version:chromeVer, fixed_version:"36.0.1985.143");
  security_message(port:0, data:report);
  exit(0);
}

6.1 Medium

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.011 Low

EPSS

Percentile

84.3%