Synopsis
A web browser installed on the remote Windows host is affected by multiple vulnerabilities.
Description
The version of Google Chrome installed on the remote Windows host is prior to 146.0.7680.71. It is, therefore, affected by multiple vulnerabilities as referenced in the 2026_03_stable-channel-update-for-desktop_10 advisory.
- Use after free in WebView in Google Chrome on Android prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) (CVE-2026-3936)
- Heap buffer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical) (CVE-2026-3913)
- Integer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2026-3914)
- Heap buffer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High) (CVE-2026-3915)
- Out of bounds read in Web Speech in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) (CVE-2026-3916)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Upgrade to Google Chrome version 146.0.7680.71 or later.
Plugin Details
File Name: google_chrome_146_0_7680_71.nasl
Agent: windows
Configuration: Enable thorough checks (optional)
Supported Sensors: Nessus Agent, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
Vulnerability Information
CPE: cpe:/a:google:chrome
Required KB Items: installed_sw/Google Chrome
Exploit Ease: No known exploits are available
Patch Publication Date: 3/10/2026
Vulnerability Publication Date: 3/10/2026
Reference Information
CVE: CVE-2026-3913, CVE-2026-3914, CVE-2026-3915, CVE-2026-3916, CVE-2026-3917, CVE-2026-3918, CVE-2026-3919, CVE-2026-3920, CVE-2026-3921, CVE-2026-3922, CVE-2026-3923, CVE-2026-3924, CVE-2026-3925, CVE-2026-3926, CVE-2026-3927, CVE-2026-3928, CVE-2026-3929, CVE-2026-3930, CVE-2026-3931, CVE-2026-3932, CVE-2026-3934, CVE-2026-3935, CVE-2026-3936, CVE-2026-3937, CVE-2026-3938, CVE-2026-3939, CVE-2026-3940, CVE-2026-3941, CVE-2026-3942