This script is Copyright (C) 2013-2015 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Google Chrome Releases reports :
A special reward for Andrey Labunets for his combination of
CVE-2013-2879 and CVE-2013-2868 along with some (since fixed)
 Low CVE-2013-2867: Block pop-unders in various scenarios.
 High CVE-2013-2879: Confusion setting up sign-in and sync.
Credit to Andrey Labunets.
 Medium CVE-2013-2868: Incorrect sync of NPAPI extension
component. Credit to Andrey Labunets.
 Medium CVE-2013-2869: Out-of-bounds read in JPEG2000
handling. Credit to Felix Groebert of Google Security Team.
  Critical CVE-2013-2870: Use-after-free with network
sockets. Credit to Collin Payne.
 Medium CVE-2013-2853: Man-in-the-middle attack against HTTP
in SSL. Credit to Antoine Delignat-Lavaud and Karthikeyan Bhargavan
from Prosecco at INRIA Paris.
  High CVE-2013-2871: Use-after-free in input
handling. Credit to miaubiz.
[Mac only]  Low CVE-2013-2872: Possible lack of entropy in
renderers. Credit to Eric Rescorla.
 High CVE-2013-2873: Use-after-free in resource loading.
Credit to miaubiz.
 Medium CVE-2013-2875: Out-of-bounds-read in SVG. Credit to
 Medium CVE-2013-2876: Extensions permissions confusion with
interstitials. Credit to Dev Akhawe.
 Low CVE-2013-2877: Out-of-bounds read in XML parsing. Credit
to Aki Helin of OUSPG.
 None: Remove the 'viewsource' attribute on iframes. Credit to
 Medium CVE-2013-2878: Out-of-bounds read in text handling.
Credit to Atte Kettunen of OUSPG.
See also :
Update the affected package.
Risk factor :
High / CVSS Base Score : 9.3
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 67237 ()
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now