Google Chrome < 53.0.2785.113 Multiple Vulnerabilities

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

A web browser installed on the remote Windows host is affected by
multiple vulnerabilities.

Description :

The version of Google Chrome installed on the remote Windows host is
prior to 53.0.2785.113. It is, therefore, affected by multiple
vulnerabilities :

- A use-after-free error exists in the file
bindings/modules/v8/V8BindingForModules.cpp that allows
an unauthenticated, remote attacker to execute arbitrary
code. (CVE-2016-5170)

- A use-after-free error exists in Blink that is related
to window constructors being callable. An
unauthenticated, remote attacker can exploit this to
execute arbitrary code. (CVE-2016-5171)

- An arbitrary memory read error exists in V8 that allows
an unauthenticated, remote attacker to disclose
sensitive memory information. (CVE-2016-5172)

- A flaw exists due to improper handling of specially
crafted web pages. An unauthenticated, remote attacker
can exploit this to load JavaScript extension resources,
which may then be used to perform unauthorized actions.
(CVE-2016-5173)

- A flaw exists that is triggered when in fullscreen mode,
in file ui/cocoa/browser_window_controller_private.mm,
that results in a failure to suppress popups.
(CVE-2016-5174)

- An unspecified flaw exists that allows an attacker to
impact confidentiality, integrity, and availability.
(CVE-2016-5175, VulnDB 144201)

- A flaw exists due to improper handling of IPC messages
for dead routing IDs. An authenticated, remote attacker
can exploit this to execute arbitrary code.
(CVE-2016-5175, VulnDB 144214)

- An unspecified flaw exists that allows an
unauthenticated, remote attacker to bypass the
SafeBrowsing protection mechanism. (CVE-2016-5176)

Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number

See also :

http://www.nessus.org/u?d15fba3d

Solution :

Upgrade to Google Chrome version 53.0.2785.113 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.3
(CVSS2#E:POC/RL:OF/RC:ND)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 93476 ()

Bugtraq ID: 92942

CVE ID: CVE-2016-5170
CVE-2016-5171
CVE-2016-5172
CVE-2016-5173
CVE-2016-5174
CVE-2016-5175
CVE-2016-5176

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now