Vulnerabilities > CVE-2010-1663 - Unspecified vulnerability in Google Chrome

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
google
nessus
exploit available

Summary

The Google URL Parsing Library (aka google-url or GURL) in Google Chrome before 4.1.249.1064 allows remote attackers to bypass the Same Origin Policy via unspecified vectors.

Vulnerable Configurations

Part Description Count
Application
Google
286

Exploit-Db

descriptionGoogle Chrome 4.1.249.1059 Cross Origin Bypass in Google URL (GURL). CVE-2010-1663. Remote exploit for windows platform
idEDB-ID:12657
last seen2016-02-01
modified2010-05-19
published2010-05-19
reporterJordi Chancel
sourcehttps://www.exploit-db.com/download/12657/
titleGoogle Chrome 4.1.249.1059 - Cross Origin Bypass in Google URL GURL

Nessus

NASL familyWindows
NASL idGOOGLE_CHROME_4_1_249_1064.NASL
descriptionThe version of Google Chrome installed on the remote host is earlier than 4.1.249.1064. Such versions are reportedly affected by multiple vulnerabilities : - A cross-origin bypass in Google URL (GURL). (Issue #40445) - An HTML5 media handling issue could lead to memory corruption. (Issue #40487) - A font handling issue could lead to memory corruption. (Issue #42294)
last seen2020-06-01
modified2020-06-02
plugin id46171
published2010-04-28
reporterThis script is Copyright (C) 2010-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/46171
titleGoogle Chrome < 4.1.249.1064 Multiple Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(46171);
  script_version("1.14");
  script_cvs_date("Date: 2018/11/15 20:50:27");

  script_cve_id("CVE-2010-1663", "CVE-2010-1664", "CVE-2010-1665");
  script_bugtraq_id(39804, 39808, 39813);
  script_xref(name:"Secunia", value:"39651");

  script_name(english:"Google Chrome < 4.1.249.1064 Multiple Vulnerabilities");
  script_summary(english:"Checks version number of Google Chrome");

  script_set_attribute(attribute:"synopsis", value:
"The remote host contains a web browser that is affected by multiple
vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The version of Google Chrome installed on the remote host is earlier
than 4.1.249.1064.  Such versions are reportedly affected by multiple
vulnerabilities :

  - A cross-origin bypass in Google URL (GURL). (Issue
    #40445)

  - An HTML5 media handling issue could lead to memory
    corruption. (Issue #40487)

  - A font handling issue could lead to memory corruption.
    (Issue #42294)");

  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?f33868d9");
  script_set_attribute(attribute:"solution", value:"Upgrade to Google Chrome 4.1.249.1064 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2010/04/27");
  script_set_attribute(attribute:"patch_publication_date", value:"2010/04/27");
  script_set_attribute(attribute:"plugin_publication_date", value:"2010/04/28");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:google:chrome");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.");

  script_dependencies("google_chrome_installed.nasl");
  script_require_keys("SMB/Google_Chrome/Installed");

  exit(0);
}


include("google_chrome_version.inc");

get_kb_item_or_exit("SMB/Google_Chrome/Installed");

installs = get_kb_list("SMB/Google_Chrome/*");
google_chrome_check_version(installs:installs, fix:'4.1.249.1064', severity:SECURITY_HOLE);

Oval

accepted2013-08-12T04:09:45.262-04:00
classvulnerability
contributors
  • nameSecPod Team
    organizationSecPod Technologies
  • nameShane Shaffer
    organizationG2, Inc.
  • nameShane Shaffer
    organizationG2, Inc.
  • nameShane Shaffer
    organizationG2, Inc.
  • nameShane Shaffer
    organizationG2, Inc.
  • nameMaria Kedovskaya
    organizationALTX-SOFT
definition_extensions
commentGoogle Chrome is installed
ovaloval:org.mitre.oval:def:11914
descriptionThe Google URL Parsing Library (aka google-url or GURL) in Google Chrome before 4.1.249.1064 allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
familywindows
idoval:org.mitre.oval:def:6813
statusaccepted
submitted2010-09-13T19:43:23
titleAllows remote attackers to bypass the Origin Policy in Google Chrome version less than 4.1.249.1064
version51

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/89715/googlechrome-crossorigin.txt
idPACKETSTORM:89715
last seen2016-12-05
published2010-05-20
reporterJordi Chancel
sourcehttps://packetstormsecurity.com/files/89715/Google-Chrome-4.1.249.1059-Cross-Origin-Bypass.html
titleGoogle Chrome 4.1.249.1059 Cross Origin Bypass

Seebug

  • bulletinFamilyexploit
    descriptionNo description provided by source.
    idSSV:19654
    last seen2017-11-19
    modified2010-05-20
    published2010-05-20
    reporterRoot
    sourcehttps://www.seebug.org/vuldb/ssvid-19654
    titleGoogle Chrome 4.1.249.1059 Cross Origin Bypass in Google URL (GURL)
  • bulletinFamilyexploit
    descriptionNo description provided by source.
    idSSV:68653
    last seen2017-11-19
    modified2014-07-01
    published2014-07-01
    reporterRoot
    sourcehttps://www.seebug.org/vuldb/ssvid-68653
    titleGoogle Chrome 4.1.249.1059 - Cross Origin Bypass in Google URL (GURL)