Google Chrome < 3.0.195.24 dtoa Implementation Remote Overflow

medium Nessus Plugin ID 41958

Synopsis

The remote host contains a web browser that is affected by a buffer overflow vulnerability.

Description

The version of Google Chrome installed on the remote host is earlier than 3.0.195.24. A boundary error in the dtoa() function can lead to a buffer overflow. A remote attacker could exploit this by tricking a user into visiting a malicious web page, which could result in arbitrary code execution within the Google Chrome sandbox.

Solution

Upgrade to Google Chrome 3.0.195.24 or later.

Plugin Details

Severity: Medium

ID: 41958

File Name: google_chrome_3_0_195_24.nasl

Version: 1.14

Type: local

Agent: windows

Family: Windows

Published: 10/1/2009

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:google:chrome

Required KB Items: SMB/Google_Chrome/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/30/2009

Vulnerability Publication Date: 9/30/2009

Reference Information

CVE: CVE-2009-0689

BID: 36565

CWE: 119

SECUNIA: 36913