![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.811843 |
Category: | General |
Title: | Google Chrome Security Updates (stable-channel-update-for-desktop_21-2017-09) - Linux |
Summary: | Google Chrome is prone to multiple vulnerabilities. |
Description: | Summary: Google Chrome is prone to multiple vulnerabilities. Vulnerability Insight: Multiple flaws exist due to: - Multiple out-of-bounds access errors in V8. - Various fixes from internal audits, fuzzing and other initiatives. Vulnerability Impact: Successful exploitation of these vulnerabilities will allow remote attackers to access information and can also cause a crash. Affected Software/OS: Google Chrome version prior to 61.0.3163.100 on Linux Solution: Upgrade to Google Chrome version 61.0.3163.100 or later. CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-5121 BugTraq ID: 100947 http://www.securityfocus.com/bid/100947 Debian Security Information: DSA-3985 (Google Search) http://www.debian.org/security/2017/dsa-3985 https://security.gentoo.org/glsa/201709-25 https://blogs.technet.microsoft.com/mmpc/2017/10/18/browser-security-beyond-sandboxing/ https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop_21.html https://crbug.com/765433 RedHat Security Advisories: RHSA-2017:2792 https://access.redhat.com/errata/RHSA-2017:2792 http://www.securitytracker.com/id/1039497 Common Vulnerability Exposure (CVE) ID: CVE-2017-5122 https://crbug.com/752423 |
Copyright | Copyright (C) 2017 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |