Vulnerabilities > CVE-2008-6995 - Numeric Errors vulnerability in Google Chrome 0.2.149.27

047910
CVSS 4.3 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
google
CWE-189
nessus
exploit available

Summary

Integer underflow in net/base/escape.cc in chrome.dll in Google Chrome 0.2.149.27 allows remote attackers to cause a denial of service (browser crash) via a URI with an invalid handler followed by a "%" (percent) character, which triggers a buffer over-read, as demonstrated using an "about:%" URI.

Vulnerable Configurations

Part Description Count
Application
Google
1

Common Weakness Enumeration (CWE)

Exploit-Db

descriptionGoogle Chrome Browser 0.2.149.27 malicious link DoS Vulnerability. CVE-2008-6995. Dos exploit for windows platform
fileexploits/windows/dos/6353.txt
idEDB-ID:6353
last seen2016-02-01
modified2008-09-03
platformwindows
port
published2008-09-03
reporterRishi Narang
sourcehttps://www.exploit-db.com/download/6353/
titleGoogle Chrome Browser 0.2.149.27 - DoS Vulnerability
typedos

Nessus

NASL familyWindows
NASL idGOOGLE_CHROME_0_2_149_29.NASL
descriptionThe version of Google Chrome installed on the remote host is earlier than 0.2.149.29. Such versions are reportedly affected by several issues : - A buffer overflow involving long filenames that display in the
last seen2020-06-01
modified2020-06-02
plugin id34197
published2008-09-12
reporterThis script is Copyright (C) 2008-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/34197
titleGoogle Chrome < 0.2.149.29 Multiple Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(34197);
  script_version("1.22");
 script_cvs_date("Date: 2018/11/15 20:50:26");

  script_cve_id(
    "CVE-2008-6994",
    "CVE-2008-6995",
    "CVE-2008-6997",
    "CVE-2008-6998"
  );
  script_bugtraq_id(30983, 31029, 31038, 31071);

  script_name(english:"Google Chrome < 0.2.149.29 Multiple Vulnerabilities");
  script_summary(english:"Checks version number of Google Chrome");

  script_set_attribute(attribute:"synopsis", value:
"The remote host contains a web browser that is affected by multiple
vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The version of Google Chrome installed on the remote host is earlier
than 0.2.149.29.  Such versions are reportedly affected by several
issues :

  - A buffer overflow involving long filenames that display
    in the 'Save As...' dialog could lead to arbitrary code
    execution (Issue #1414).

  - A buffer overflow in handling of link targets displayed
    in the status area when a user hovers over a link could
    lead to arbitrary code execution (Fix #1797).

  - An out-of-bounds memory read when parsing URLs ending in
    ':%' could cause the application itself to crash (Issue
    #122).

  - The default Downloads directory is set to Desktop, which
    could lead to malicious cluttering of the desktop with
    unwanted downloads and even execution of arbitrary
    programs (Fix #17933).");
  script_set_attribute(attribute:"see_also", value:"https://bugs.chromium.org/p/chromium/issues/detail?id=122");
  script_set_attribute(attribute:"see_also", value:"https://bugs.chromium.org/p/chromium/issues/detail?id=1414");
  # https://chromereleases.googleblog.com/2008/09/beta-release-0214929.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?1c51684b");
  script_set_attribute(attribute:"solution", value:"Upgrade to Google Chrome 0.2.149.29.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_cwe_id(119, 189);

  script_set_attribute(attribute:"patch_publication_date", value:"2008/09/08");
  script_set_attribute(attribute:"plugin_publication_date", value:"2008/09/12");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:google:chrome");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");
  script_copyright(english:"This script is Copyright (C) 2008-2018 Tenable Network Security, Inc.");

  script_dependencies("google_chrome_installed.nasl");
  script_require_keys("SMB/Google_Chrome/Installed");
  exit(0);
}

include("google_chrome_version.inc");

get_kb_item_or_exit("SMB/Google_Chrome/Installed");

installs = get_kb_list("SMB/Google_Chrome/*");
google_chrome_check_version(installs:installs, fix:'0.2.149.29', severity:SECURITY_HOLE);