This script is Copyright (C) 2010-2015 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-201012-01
(Chromium: Multiple vulnerabilities)
Multiple vulnerabilities were found in Chromium. For further
information please consult the release notes referenced below.
A remote attacker could trick a user to perform a set of UI actions
that trigger a possibly exploitable crash, leading to execution of
arbitrary code or a Denial of Service.
It was also possible for an attacker to entice a user to visit a
specially crafted web page that would trigger one of the
vulnerabilities, leading to execution of arbitrary code within the
confines of the sandbox, successful Cross-Site Scripting attacks,
violation of the same-origin policy, successful website spoofing
attacks, information leak, or a Denial of Service. An attacker could
also trick a user to perform a set of UI actions that might result in a
successful website spoofing attack.
Multiple bugs in the sandbox could result in a sandbox escape.
Multiple UI bugs could lead to information leak and successful website
There is no known workaround at this time.
See also :
All Chromium users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=www-client/chromium-8.0.552.224'
Risk factor :
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now