Google Chrome < 45.0.2454.85 Multiple Vulnerabilities

High Nessus Plugin ID 85743

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 5.9

Synopsis

The remote Windows host contains a web browser that is affected by multiple vulnerabilities.

Description

The version of Google Chrome installed on the remote Windows host is prior to 45.0.2454.85. It is, therefore, affected by multiple vulnerabilities :

- A cross-origin bypass vulnerability exists due to a flaw in the ContainerNode::parserRemoveChild() function in ContainerNode.cpp wherein user scripts may unexpectedly run in 'onunload' handlers during Document Object Model (DOM) modification. A remote attacker can exploit this, via a specially crafted web page, to bypass cross-origin restrictions. (CVE-2015-1291)

- A cross-origin bypass vulnerability exists due to a flaw in the LocalDOMWindow::navigator() function in LocalDOMWindow.cpp wherein an incorrect navigator associated with a frame may be returned. A remote attacker can exploit this, via a specially crafted web page, to bypass cross-origin restrictions.
(CVE-2015-1292)

- An unspecified cross-origin bypass vulnerability exists that allows a remote attacker, via a specially crafted web page, to bypass cross-origin restrictions.
(CVE-2015-1293)

- A use-after-free error exists in the SkMatrix::invertNonIdentity() function in SkMatrix.cpp.
A remote attacker can exploit this to dereference already freed memory, potentially resulting in the execution of arbitrary code. (CVE-2015-1294)

- A use-after-free error exists in print_web_view_helper.cc that is triggered when handling nested IPC handlers. A remote attacker can exploit this to dereference already freed memory, potentially resulting in the execution of arbitrary code.
(CVE-2015-1295)

- A spoofing vulnerability exists due to a flaw that is triggered when displaying a URL containing certain characters in an omnibox. A remote attacker can exploit this to include characters that may look like a padlock, spoofing a secure connection. (CVE-2015-1296)

- An unspecified flaw exists related to permission scoping as requests in an extension are not hidden from other extensions. (CVE-2015-1297)

- An unspecified URL handling issue exists as the URL to be opened after an extension is uninstalled is not restricted to HTTP and HTTPS. (CVE-2015-1298)

- A use-after-free error exists due to improper validation of user-supplied input. A remote attacker can exploit this to dereference already freed memory, potentially resulting in the execution of arbitrary code.
(CVE-2015-1299)

- An unspecified information disclosure vulnerability exists in Blink. (CVE-2015-1300)

- Multiple unspecified flaws exist that allow an attacker to have unspecified medium severity impact.
(CVE-2015-1301)

Solution

Upgrade to Google Chrome 45.0.2454.85 or later.

See Also

http://www.nessus.org/u?96b510c5

Plugin Details

Severity: High

ID: 85743

File Name: google_chrome_45_0_2454_85.nasl

Version: 1.9

Type: local

Agent: windows

Family: Windows

Published: 2015/09/02

Updated: 2019/11/22

Dependencies: 34196

Risk Information

Risk Factor: High

VPR Score: 5.9

CVSS Score Source: CVE-2015-1301

CVSS v2.0

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:google:chrome

Required KB Items: SMB/Google_Chrome/Installed

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2015/09/01

Vulnerability Publication Date: 2015/09/01

Reference Information

CVE: CVE-2015-1291, CVE-2015-1292, CVE-2015-1293, CVE-2015-1294, CVE-2015-1295, CVE-2015-1296, CVE-2015-1297, CVE-2015-1298, CVE-2015-1299, CVE-2015-1300, CVE-2015-1301