Google Chrome < 49.0.2623.75 Multiple Vulnerabilities

high Nessus Network Monitor Plugin ID 9202

Synopsis

The remote host is utilizing a web browser that is affected by multiple vulnerabilities.

Description

The version of Google Chrome installed on the remote host is prior to 49.0.2623.75, and is affected by multiple vulnerabilities :

- Multiple overflow conditions exist in the libpng library in the 'png_set_PLTE()' and 'png_get_PLTE()' functions due to improper handling of bit depths less than eight. A remote attacker can exploit this, via a specially crafted PNG image, to cause a denial of service condition or the execution of arbitrary code. (CVE-2015-8126)
- An unspecified flaw exists in Blink that allows an attacker to bypass the same-origin policy. (CVE-2016-1630)
- An unspecified flaw exists in the Pepper plugin that allows an attacker to bypass the same-origin policy. (CVE-2016-1631)
- A bad cast flaw exists in the Extensions component that allows an attacker to have an unspecified impact. (CVE-2016-1632)
- Multiple use-after-free errors exist in Blink. A remote attacker can exploit these issues to dereference already freed memory, resulting in the execution of arbitrary code. (CVE-2016-1633, CVE-2016-1634, CVE-2016-1635)
- An unspecified flaw exists that allows an attacker to bypass SRI validation. (CVE-2016-1636)
- An unspecified flaw exists that allows an attacker to disclose sensitive information. (CVE-2016-1637)
- An unspecified flaw exists that allows an attacker to bypass the webAPI. (CVE-2016-1638)
- A use-after-free error exists in WebRTC. A remote attacker can exploit this issue to dereference already freed memory, resulting in the execution of arbitrary code. (CVE-2016-1639)
- An unspecified origin confusion flaw exists in the Extensions UI that allows an attacker to have an unspecified impact. (CVE-2016-1640)
- A use-after-free error exists in Favicon. A remote attacker can exploit this issue to dereference already freed memory, resulting in the execution of arbitrary code. (CVE-2016-1641)
- Multiple flaws exist that allow a remote attacker to execute arbitrary code. (CVE-2016-1642)
- Multiple unspecified flaws exist in Google V8 in 'runetime-scopes.cc' that allows an attacker to cause a denial of service condition or the execution of arbitrary code. (CVE-2016-2843)
- A bad cast flaw in 'layout/LayoutBlock.cpp' that is triggered as anonymous block wrappers are not properly removed from inline children allowing a context-dependent attacker to execute arbitrary code. (CVE-2016-2844)
- A flaw that is triggered as the path component of the URL is not properly validated when handling a response fetched via ServiceWoker. (CVE-2016-2845)

Solution

Update the Chrome browser to 49.0.2623.75 or later.

See Also

http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html

Plugin Details

Severity: High

ID: 9202

Family: Web Clients

Published: 4/5/2016

Updated: 3/6/2019

Nessus ID: 89685

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:google:chrome

Patch Publication Date: 3/2/2016

Vulnerability Publication Date: 11/13/2015

Reference Information

CVE: CVE-2016-1630