Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.806762
Kategorie:General
Titel:Google Chrome Multiple Vulnerabilities-01 Dec15 (Linux)
Zusammenfassung:The host is installed with google chrome; and is prone to multiple vulnerabilities.
Beschreibung:Summary:
The host is installed with google chrome
and is prone to multiple vulnerabilities.

Vulnerability Insight:
Multiple flaws exist due to:

- 'VideoFramePool::PoolImpl::CreateFrame' function in
'media/base/video_frame_pool.cc' script does not initialize memory for a
video-frame data structure.

- Multiple unspecified vulnerabilities.

- Multiple cross-origin bypass vulnerabilities.

- Multiple out of bounds access vulnerabilities.

- Multiple use-after-free vulnerabilities.

- Integer overflow in Sfntly.

- Content spoofing vulnerability in Omnibox.

- Escaping issue in saved pages.

- Wildcard matching issue in CSP.

- Multiple scheme bypass vulnerabilities.

- Type confusion vulnerability in PDFium.

Vulnerability Impact:
Successful exploitation would allow an attacker
to execute arbitrary code or to cause a denial of service or possibly have
other impact, bypass the security restrictions and gain access to potentially
sensitive information.

Affected Software/OS:
Google Chrome versions prior to
47.0.2526.73 on Linux.

Solution:
Upgrade to Google Chrome version
47.0.2526.73 or later.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: BugTraq ID: 78209
BugTraq ID: 78416
Common Vulnerability Exposure (CVE) ID: CVE-2015-6764
http://www.securityfocus.com/bid/78209
Debian Security Information: DSA-3415 (Google Search)
http://www.debian.org/security/2015/dsa-3415
https://security.gentoo.org/glsa/201603-09
http://www.securitytracker.com/id/1034298
SuSE Security Announcement: openSUSE-SU-2015:2290 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html
SuSE Security Announcement: openSUSE-SU-2015:2291 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html
SuSE Security Announcement: openSUSE-SU-2016:0138 (Google Search)
http://lists.opensuse.org/opensuse-updates/2016-01/msg00045.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-6765
http://www.securityfocus.com/bid/78416
http://www.ubuntu.com/usn/USN-2825-1
Common Vulnerability Exposure (CVE) ID: CVE-2015-6766
Common Vulnerability Exposure (CVE) ID: CVE-2015-6767
Common Vulnerability Exposure (CVE) ID: CVE-2015-6768
Common Vulnerability Exposure (CVE) ID: CVE-2015-6770
Common Vulnerability Exposure (CVE) ID: CVE-2015-6771
Common Vulnerability Exposure (CVE) ID: CVE-2015-6772
Common Vulnerability Exposure (CVE) ID: CVE-2015-6773
Common Vulnerability Exposure (CVE) ID: CVE-2015-6774
Common Vulnerability Exposure (CVE) ID: CVE-2015-6775
Common Vulnerability Exposure (CVE) ID: CVE-2015-6776
Common Vulnerability Exposure (CVE) ID: CVE-2015-6777
Common Vulnerability Exposure (CVE) ID: CVE-2015-6778
Common Vulnerability Exposure (CVE) ID: CVE-2015-6779
Common Vulnerability Exposure (CVE) ID: CVE-2015-6780
Common Vulnerability Exposure (CVE) ID: CVE-2015-6781
Common Vulnerability Exposure (CVE) ID: CVE-2015-6782
Common Vulnerability Exposure (CVE) ID: CVE-2015-6784
Common Vulnerability Exposure (CVE) ID: CVE-2015-6785
Common Vulnerability Exposure (CVE) ID: CVE-2015-6786
Common Vulnerability Exposure (CVE) ID: CVE-2015-6787
https://www.exploit-db.com/exploits/39162/
https://www.exploit-db.com/exploits/39163/
https://www.exploit-db.com/exploits/39165/
Common Vulnerability Exposure (CVE) ID: CVE-2015-8478
Common Vulnerability Exposure (CVE) ID: CVE-2015-8479
Common Vulnerability Exposure (CVE) ID: CVE-2015-8480
Common Vulnerability Exposure (CVE) ID: CVE-2015-6769
CopyrightCopyright (C) 2015 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.