9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
6.2 Medium
AI Score
Confidence
Low
0.571 Medium
EPSS
Percentile
97.7%
Google Chrome is prone to multiple vulnerabilities.
# SPDX-FileCopyrightText: 2009 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.900890");
script_version("2024-02-19T05:05:57+0000");
script_tag(name:"last_modification", value:"2024-02-19 05:05:57 +0000 (Mon, 19 Feb 2024)");
script_tag(name:"creation_date", value:"2009-11-17 15:16:05 +0100 (Tue, 17 Nov 2009)");
script_tag(name:"cvss_base", value:"9.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_cve_id("CVE-2009-3931", "CVE-2009-3932", "CVE-2009-3933", "CVE-2009-3934");
script_name("Google Chrome Multiple Vulnerabilities (Nov 2009)");
script_xref(name:"URL", value:"http://secunia.com/advisories/37273/");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/36947");
script_xref(name:"URL", value:"http://www.vupen.com/english/advisories/2009/3159");
script_xref(name:"URL", value:"http://googlechromereleases.blogspot.com/2009/11/stable-channel-update.html");
script_xref(name:"URL", value:"http://securethoughts.com/2009/11/using-blended-browser-threats-involving-chrome-to-steal-files-on-your-computer/");
script_category(ACT_GATHER_INFO);
script_tag(name:"qod_type", value:"executable_version");
script_copyright("Copyright (C) 2009 Greenbone AG");
script_family("Denial of Service");
script_dependencies("gb_google_chrome_detect_portable_win.nasl");
script_mandatory_keys("GoogleChrome/Win/Ver");
script_tag(name:"impact", value:"Successful exploitation will let the attacker execute arbitrary JavaScript code
and disclose the content of local files, memory corruption or CPU consumption
and which may result in Denial of Service condition.");
script_tag(name:"affected", value:"Google Chrome version prior to 3.0.195.32 on Windows.");
script_tag(name:"insight", value:"Multiple flaws are due to:
- Error in 'browser/download/download_exe.cc', which fails to display a
warning when a user downloads and opens '.svg', '.mht' or '.xml' files.
This can be exploited to disclose the content of local files via a
specially crafted web page.
- An error in the Gears SQL API implementation can be exploited to put SQL
metadata into a bad state and cause a memory corruption.
- An error in WebKit, which can be exploited via a web page that calls the
JavaScript setInterval method, which triggers an incompatibility between
the 'WTF::currentTime' and 'base::Time' functions.
- Error in 'WebFrameLoaderClient::dispatchDidChangeLocationWithinPage' function
in 'src/webkit/glue/webframeloaderclient_impl.cc' and which can be exploited
via a page-local link, related to an 'empty redirect chain, ' as demonstrated
by a message in Yahoo! Mail.");
script_tag(name:"solution", value:"Upgrade to version 3.0.195.32 or later.");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"summary", value:"Google Chrome is prone to multiple vulnerabilities.");
exit(0);
}
include("version_func.inc");
chromeVer = get_kb_item("GoogleChrome/Win/Ver");
if(!chromeVer)
exit(0);
if(version_is_less(version:chromeVer, test_version:"3.0.195.32")){
report = report_fixed_ver(installed_version:chromeVer, fixed_version:"3.0.195.32");
security_message(port: 0, data: report);
exit(0);
}
exit(99);