Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.802930
Kategorie:General
Titel:Google Chrome Multiple Vulnerabilities - August 12 (Linux)
Zusammenfassung:This host is installed with Google Chrome and is prone to multiple; vulnerabilities.
Beschreibung:Summary:
This host is installed with Google Chrome and is prone to multiple
vulnerabilities.

Vulnerability Insight:
The flaws are due to

- The application does not properly re-prompt the user when downloading
multiple files and can be exploited to trick the user into downloading a
malicious file.

- An error when handling drag and drop events.

- Integer overflow errors, use-after-free error, out-of-bounds write error
exists within the PDF viewer.

- A use-after-free error exists when handling object linkage in PDFs.

- An error within the 'webRequest' module can be exploited to cause
interference with the Chrome Web Store.

- A use-after-free error exits when handling CSS DOM objects.

- An error within the WebP decoder can be exploited to cause a buffer
overflow.

- An out-of-bounds access error exists when clicking in date picker.

- An error when handling renderer processes can be exploited to bypass the
cross-process policy.

- An unspecified error exists within tab handling.

Vulnerability Impact:
Successful exploitation could allow attackers to bypass certain security
restrictions, execute arbitrary code in the context of the browser or
cause a denial of service.

Affected Software/OS:
Google Chrome version prior to 21.0.1180.57 on Linux

Solution:
Upgrade to the Google Chrome 21.0.1180.57 or later.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: BugTraq ID: 54749
Common Vulnerability Exposure (CVE) ID: CVE-2012-2847
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15735
Common Vulnerability Exposure (CVE) ID: CVE-2012-2860
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15709
Common Vulnerability Exposure (CVE) ID: CVE-2012-2858
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15679
Common Vulnerability Exposure (CVE) ID: CVE-2012-2857
http://lists.apple.com/archives/security-announce/2013/Jan/msg00000.html
http://lists.apple.com/archives/security-announce/2013/Mar/msg00003.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15336
Common Vulnerability Exposure (CVE) ID: CVE-2012-2856
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15053
Common Vulnerability Exposure (CVE) ID: CVE-2012-2855
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15038
Common Vulnerability Exposure (CVE) ID: CVE-2012-2854
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15698
Common Vulnerability Exposure (CVE) ID: CVE-2012-2853
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15439
Common Vulnerability Exposure (CVE) ID: CVE-2012-2852
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15744
Common Vulnerability Exposure (CVE) ID: CVE-2012-2851
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15705
Common Vulnerability Exposure (CVE) ID: CVE-2012-2850
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15630
Common Vulnerability Exposure (CVE) ID: CVE-2012-2849
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15653
Common Vulnerability Exposure (CVE) ID: CVE-2012-2848
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15658
Common Vulnerability Exposure (CVE) ID: CVE-2012-2846
Common Vulnerability Exposure (CVE) ID: CVE-2012-2859
CopyrightCopyright (C) 2012 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.