Ubuntu Security Notice (C) 2016 Canonical, Inc. / NASL script (C) 2016 Tenable Network Security, Inc.
The remote Ubuntu host is missing a security-related patch.
It was discovered that a long running unload handler could cause an
incognito profile to be reused in some circumstances. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit this to obtain sensitive information.
Multiple security vulnerabilities were discovered in Chromium. If a
user were tricked in to opening a specially crafted website, an
attacker could potentially exploit these to conduct cross-site
scripting (XSS) attacks, spoof an application's URL bar, obtain
sensitive information, cause a denial of service via application
crash, or execute arbitrary code. (CVE-2016-5181, CVE-2016-5182,
CVE-2016-5185, CVE-2016-5186, CVE-2016-5187, CVE-2016-5188,
CVE-2016-5189, CVE-2016-5192, CVE-2016-5194).
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
Update the affected liboxideqtcore0 package.
Risk factor :
Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.0
Public Exploit Available : false
Family: Ubuntu Local Security Checks
Nessus Plugin ID: 94508 ()
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now