February 8, 2011 - Qualys® Vulnerability R&D Lab has released new vulnerability checks in QualysGuard® to protect organizations against vulnerabilities present in Google Chrome that were announced today. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their QualysGuard subscription.
Google has released one security patche to fix newly discovered flaws in Chrome.
Qualys has released the following checks for these new vulnerabilities:
|Google Chrome prior to 9.0.597.94 Multiple Vulnerabilities|
|SEVERITY: Critical 4|
|QUALYS ID: 118957|
|VENDOR REFERENCE: GOOGLE CHROME 9.0.597.94|
|CVSS SCORES: Base 6/ Temporal 4.7|
|THREAT: Google Chrome is a Web browser for multiple platforms.
Chrome has been updated to include security fixes for the following:
Stale pointer in animation event handling.
Use-after-free in SVG font faces.
Stale pointer with anonymous block handling.
Out-of-bounds read in plug-in handling.
Possible failure to terminate process on out-of-memory condition.
|IMPACT: Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial of service. Other attacks are also possible.|
|SOLUTION: These issues are resolved in Chrome 9.0.597.94 (and later). The update is available at the Chrome download site.|
This new vulnerability check is included in Qualys vulnerability signatures v1.28.13-3. Each QualysGuard account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the QualysGuard HOME menu, select the Account Info tab.
SELECTIVE SCAN INSTRUCTIONS USING QUALYSGUARD:
To perform a selective vulnerability scan, configure a scan profile to use the following options:
- Ensure access to TCP ports 135 and 139 are available.
- Enable Windows Authentication (specify Authentication Records).
- Enable the following Qualys IDs:
- If you would like the scan to return the Windows Hostname, also include QID 82044 and ensure access to UDP port 137 is available.
- If you would like to be notified if QualysGuard is unable to logon to a host (if Authentication fails), also include QID 105015.
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Matrix Report, available from the QualysGuard HOME page.
US: 1 866.801.6161 | EMEA: 33 1 44.17.00.41 | UK: +44 1753 872102
Access for QualysGuard customers: https://qualysguard.qualys.com
Free trial of QualysGuard service: http://www.qualys.com/forms/trials/qualysguard_trial/