New! Vulnerability Priority Rating (VPR)
Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.
VPR Score: 5.9
SynopsisThe remote FreeBSD host is missing a security-related update.
DescriptionGoogle Chrome Releases reports :
 Medium CVE-2012-5127: Integer overflow leading to out-of-bounds read in WebP handling. Credit to Phil Turnbull.
[Linux 64-bit only]  Medium CVE-2012-5120: Out-of-bounds array access in v8. Credit to Atte Kettunen of OUSPG.
 High CVE-2012-5116: Use-after-free in SVG filter handling.
Credit to miaubiz.
[Mac OS only]  High CVE-2012-5118: Integer bounds check issue in GPU command buffers. Credit to miaubiz.
 High CVE-2012-5121: Use-after-free in video layout. Credit to Atte Kettunen of OUSPG.
 Low CVE-2012-5117: Inappropriate load of SVG subresource in img context. Credit to Felix Grobert of the Google Security Team.
 Medium CVE-2012-5119: Race condition in Pepper buffer handling. Credit to Fermin Serna of the Google Security Team.
 Medium CVE-2012-5122: Bad cast in input handling. Credit to Google Chrome Security Team (Inferno).
  Medium CVE-2012-5123: Out-of-bounds reads in Skia.
Credit to Google Chrome Security Team (Inferno).
 High CVE-2012-5124: Memory corruption in texture handling.
Credit to Al Patrick of the Chromium development community.
 Medium CVE-2012-5125: Use-after-free in extension tab handling. Credit to Alexander Potapenko of the Chromium development community.
 Medium CVE-2012-5126: Use-after-free in plug-in placeholder handling. Credit to Google Chrome Security Team (Inferno).
 High CVE-2012-5128: Bad write in v8. Credit to Google Chrome Security Team (Cris Neckar).
SolutionUpdate the affected package.