Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.903031
Categoría:General
Título:Google Chrome Multiple Vulnerabilities(02) - May 12 (Linux)
Resumen:This host is installed with Google Chrome and is prone to multiple; vulnerabilities.
Descripción:Summary:
This host is installed with Google Chrome and is prone to multiple
vulnerabilities.

Vulnerability Insight:
The flaws are due to

- An unspecified error exists in the v8 garbage collection, plug-in
JavaScript bindings.

- A use-after-free error exists in the browser cache, first-letter handling
and with encrypted PDF.

- An out-of-bounds read error exists in Skia.

- An error with websockets over SSL can be exploited to corrupt memory.

- A bad cast error exists in the GTK UI.

- An invalid read error exists in v8.

- An invalid cast error exists with colorspace handling in PDF.

- An error with PDF functions can be exploited to cause a buffer overflow.

- A type corruption error exists in v8.

Vulnerability Impact:
Successful exploitation could allow attackers to bypass certain security
restrictions, execute arbitrary code in the context of the browser or
cause a denial of service.

Affected Software/OS:
Google Chrome version prior to 19.0.1084.52 on Linux

Solution:
Upgrade to the Google Chrome 19.0.1084.52 or later.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: BugTraq ID: 53679
Common Vulnerability Exposure (CVE) ID: CVE-2011-3103
http://www.securityfocus.com/bid/53679
http://security.gentoo.org/glsa/glsa-201205-04.xml
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15095
http://www.securitytracker.com/id?1027098
http://secunia.com/advisories/49277
http://secunia.com/advisories/49306
Common Vulnerability Exposure (CVE) ID: CVE-2011-3104
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15471
Common Vulnerability Exposure (CVE) ID: CVE-2011-3105
http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html
http://osvdb.org/82242
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15535
Common Vulnerability Exposure (CVE) ID: CVE-2011-3106
http://osvdb.org/82251
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15470
Common Vulnerability Exposure (CVE) ID: CVE-2011-3107
http://osvdb.org/82252
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15409
Common Vulnerability Exposure (CVE) ID: CVE-2011-3108
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14947
Common Vulnerability Exposure (CVE) ID: CVE-2011-3109
Common Vulnerability Exposure (CVE) ID: CVE-2011-3110
http://osvdb.org/82245
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14666
Common Vulnerability Exposure (CVE) ID: CVE-2011-3111
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15549
Common Vulnerability Exposure (CVE) ID: CVE-2011-3112
http://osvdb.org/82247
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15076
Common Vulnerability Exposure (CVE) ID: CVE-2011-3113
http://osvdb.org/82248
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15566
Common Vulnerability Exposure (CVE) ID: CVE-2011-3114
http://osvdb.org/82249
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15545
Common Vulnerability Exposure (CVE) ID: CVE-2011-3115
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15433
XForce ISS Database: chrome-type-corruption-code-exec(75853)
https://exchange.xforce.ibmcloud.com/vulnerabilities/75853
CopyrightCopyright (C) 2012 Greenbone Networks GmbH

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.