This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Google Chrome Releases reports :
 Medium CVE-2012-5127: Integer overflow leading to
out-of-bounds read in WebP handling. Credit to Phil Turnbull.
[Linux 64-bit only]  Medium CVE-2012-5120: Out-of-bounds array
access in v8. Credit to Atte Kettunen of OUSPG.
 High CVE-2012-5116: Use-after-free in SVG filter handling.
Credit to miaubiz.
[Mac OS only]  High CVE-2012-5118: Integer bounds check issue
in GPU command buffers. Credit to miaubiz.
 High CVE-2012-5121: Use-after-free in video layout. Credit to
Atte Kettunen of OUSPG.
 Low CVE-2012-5117: Inappropriate load of SVG subresource in
img context. Credit to Felix Grobert of the Google Security Team.
 Medium CVE-2012-5119: Race condition in Pepper buffer
handling. Credit to Fermin Serna of the Google Security Team.
 Medium CVE-2012-5122: Bad cast in input handling. Credit to
Google Chrome Security Team (Inferno).
  Medium CVE-2012-5123: Out-of-bounds reads in Skia.
Credit to Google Chrome Security Team (Inferno).
 High CVE-2012-5124: Memory corruption in texture handling.
Credit to Al Patrick of the Chromium development community.
 Medium CVE-2012-5125: Use-after-free in extension tab
handling. Credit to Alexander Potapenko of the Chromium development
 Medium CVE-2012-5126: Use-after-free in plug-in placeholder
handling. Credit to Google Chrome Security Team (Inferno).
 High CVE-2012-5128: Bad write in v8. Credit to Google Chrome
Security Team (Cris Neckar).
See also :
Update the affected package.
Risk factor :
High / CVSS Base Score : 7.5
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 62856 ()
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now