Google Chrome < 53.0.2785.89 Multiple Vulnerabilities (Mac OS X

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

A web browser installed on the remote Mac OS X host is affected by
multiple vulnerabilities.

Description :

The version of Google Chrome installed on the remote Mac OS X host is
prior to 53.0.2785.89. It is, therefore, affected by multiple
vulnerabilities :

- Universal XSS in Blink. Credit to anonymous

- Universal XSS in Blink. Credit to anonymous

- Script injection in extensions. Credit to Max Justicz
(http

- Use after free in Blink. Credit to anonymous

- Use after free in PDFium. Credit to anonymous

- Heap overflow in PDFium. Credit to GiWan Go of Stealien

- Use after destruction in Blink. Credit to Atte Kettunen
of OUSPG

- Heap overflow in PDFium. Credit to anonymous

- Address bar spoofing. Credit to anonymous

- Use after free in event bindings. Credit to jinmo123

- Heap overflow in PDFium. Credit to anonymous

- Heap overflow in PDFium. Credit to GiWan Go of Stealien

- Heap overflow in PDFium. Credit to GiWan Go of Stealien

- Type confusion in Blink. Credit to
62600BCA031B9EB5CB4A74ADDDD6771E working with Trend
Micro's Zero Day Initiative

- Extensions web accessible resources bypass. Credit to
Nicolas Golubovic

- Address bar spoofing. Credit to Rafay Baloch PTCL
Etisalat (http

- Universal XSS using DevTools. Credit to anonymous

- Script injection in DevTools. Credit to Gregory
Panakkal

- SMB Relay Attack via Save Page As. Credit to Gregory
Panakkal

- Extensions web accessible resources bypass. Credit to
@l33terally, FogMarks.com (@FogMarks)

- Various fixes from internal audits, fuzzing and other
initiatives.

Note that Nessus has not tested for these issues but has instead
relied only on the applications self-reported version number.

Note that Tenable Network Security has extracted the preceding
description block directly from the Chrome security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

http://www.nessus.org/u?f6e7512a

Solution :

Upgrade to Google Chrome version to 53.0.2785.89 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.3
(CVSS2#E:POC/RL:OF/RC:ND)
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now