Google Chrome < 33.0.1750.152 Multiple Vulnerabilities (Mac OS X)

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Synopsis :

The remote Mac OS X host contains a web browser that is affected by
multiple vulnerabilities.

Description :

The version of Google Chrome installed on the remote Mac OS X host is
a version prior to 33.0.1750.152. It is, therefore, affected by the
following vulnerabilities :

- A remote code-execution flaw exists due to a read/write
error with the a sandbox bypass, specifically the V8
JavaScript engine. This could allow an attacker to
execute code or cause a denial of service if the exploit
fails. (CVE-2014-1705)

- A use-after-free flaw exists with the
'document.location' bindings. An attacker, using a
specially crafted web page, can dereference freed memory
and could execute arbitrary code. (CVE-2014-1713)

- A flaw exists with the clipboard message filter. A
context-dependent attacker could bypass sandbox
restrictions. (CVE-2014-1714)

- A restriction bypass flaw exists with the
'CreatePlatformFileUnsafe()' function in the
'base/' where user input is not
properly sanitized. A context-dependent attacker could
open arbitrary directories bypassing sandbox
restrictions. (CVE-2014-1715)

Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.

See also :

Solution :

Upgrade to Google Chrome 33.0.1750.152 or later.

Risk factor :

Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.9
Public Exploit Available : true

Family: MacOS X Local Security Checks

Nessus Plugin ID: 73083 ()

Bugtraq ID: 66239

CVE ID: CVE-2014-1705

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now