Google Chrome < 40.0.2214.93 Flash Player Multiple Remote Code Execution (Mac OS X)

critical Nessus Plugin ID 81021

Synopsis

The remote Mac OS X host contains a web browser that is affected by multiple remote code execution vulnerabilities.

Description

The version of Google Chrome installed on the remote Mac OS X host is prior to 40.0.2214.93. It is, therefore, affected by the following vulnerabilities :

- A use-after-free error exists that allows an attacker to crash the application or execute arbitrary code.
(CVE-2015-0311)

- A double-free error exists that allows an attacker to crash the application or possibly execute arbitrary code. (CVE-2015-0312)

Solution

Upgrade to Google Chrome 40.0.2214.93 or later.

See Also

http://www.nessus.org/u?d2bec23e

https://helpx.adobe.com/security/products/flash-player/apsb15-03.html

Plugin Details

Severity: Critical

ID: 81021

File Name: macosx_google_chrome_40_0_2214_93.nasl

Version: 1.15

Type: local

Agent: macosx

Published: 1/27/2015

Updated: 4/22/2022

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.6

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2015-0311

Vulnerability Information

CPE: cpe:/a:google:chrome

Required KB Items: MacOSX/Google Chrome/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/26/2015

Vulnerability Publication Date: 1/21/2015

CISA Known Exploited Vulnerability Due Dates: 5/4/2022

Exploitable With

Core Impact

Metasploit (Adobe Flash Player ByteArray UncompressViaZlibVariant Use After Free)

Reference Information

CVE: CVE-2015-0311, CVE-2015-0312

BID: 72283, 72343