Lucene search

K
openvasCopyright (C) 2009 Greenbone AGOPENVAS:1361412562310900890
HistoryNov 17, 2009 - 12:00 a.m.

Google Chrome Multiple Vulnerabilities (Nov 2009)

2009-11-1700:00:00
Copyright (C) 2009 Greenbone AG
plugins.openvas.org
4

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

6.2 Medium

AI Score

Confidence

Low

0.571 Medium

EPSS

Percentile

97.7%

Google Chrome is prone to multiple vulnerabilities.

# SPDX-FileCopyrightText: 2009 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.900890");
  script_version("2024-02-19T05:05:57+0000");
  script_tag(name:"last_modification", value:"2024-02-19 05:05:57 +0000 (Mon, 19 Feb 2024)");
  script_tag(name:"creation_date", value:"2009-11-17 15:16:05 +0100 (Tue, 17 Nov 2009)");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_cve_id("CVE-2009-3931", "CVE-2009-3932", "CVE-2009-3933", "CVE-2009-3934");
  script_name("Google Chrome Multiple Vulnerabilities (Nov 2009)");
  script_xref(name:"URL", value:"http://secunia.com/advisories/37273/");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/36947");
  script_xref(name:"URL", value:"http://www.vupen.com/english/advisories/2009/3159");
  script_xref(name:"URL", value:"http://googlechromereleases.blogspot.com/2009/11/stable-channel-update.html");
  script_xref(name:"URL", value:"http://securethoughts.com/2009/11/using-blended-browser-threats-involving-chrome-to-steal-files-on-your-computer/");

  script_category(ACT_GATHER_INFO);
  script_tag(name:"qod_type", value:"executable_version");
  script_copyright("Copyright (C) 2009 Greenbone AG");
  script_family("Denial of Service");
  script_dependencies("gb_google_chrome_detect_portable_win.nasl");
  script_mandatory_keys("GoogleChrome/Win/Ver");
  script_tag(name:"impact", value:"Successful exploitation will let the attacker execute arbitrary JavaScript code
  and disclose the content of local files, memory corruption or CPU consumption
  and which may result in Denial of Service condition.");
  script_tag(name:"affected", value:"Google Chrome version prior to 3.0.195.32 on Windows.");
  script_tag(name:"insight", value:"Multiple flaws are due to:

  - Error in 'browser/download/download_exe.cc', which fails to display a
    warning when a user downloads and opens '.svg', '.mht' or '.xml' files.
    This can be exploited to disclose the content of local files via a
    specially crafted web page.

  - An error in the Gears SQL API implementation can be exploited to put SQL
    metadata into a bad state and cause a memory corruption.

  - An error in WebKit, which can be exploited via a web page that calls the
    JavaScript setInterval method, which triggers an incompatibility between
    the 'WTF::currentTime' and 'base::Time' functions.

  - Error in 'WebFrameLoaderClient::dispatchDidChangeLocationWithinPage' function
    in 'src/webkit/glue/webframeloaderclient_impl.cc' and which can be exploited
    via a page-local link, related to an 'empty redirect chain, ' as demonstrated
    by a message in Yahoo! Mail.");
  script_tag(name:"solution", value:"Upgrade to version 3.0.195.32 or later.");
  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"summary", value:"Google Chrome is prone to multiple vulnerabilities.");
  exit(0);
}

include("version_func.inc");

chromeVer = get_kb_item("GoogleChrome/Win/Ver");
if(!chromeVer)
  exit(0);

if(version_is_less(version:chromeVer, test_version:"3.0.195.32")){
  report = report_fixed_ver(installed_version:chromeVer, fixed_version:"3.0.195.32");
  security_message(port: 0, data: report);
  exit(0);
}

exit(99);

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

6.2 Medium

AI Score

Confidence

Low

0.571 Medium

EPSS

Percentile

97.7%