Vulnerabilities > CVE-2014-1736 - Integer Overflow or Wraparound vulnerability in Google Chrome

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

Integer overflow in api.cc in Google V8, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large length value.

Vulnerable Configurations

Part Description Count
Application
Google
3548
OS
Apple
1
OS
Microsoft
1
OS
Linux
1

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Forced Integer Overflow
    This attack forces an integer variable to go out of range. The integer variable is often used as an offset such as size of memory allocation or similarly. The attacker would typically control the value of such variable and try to get it out of range. For instance the integer in question is incremented past the maximum possible value, it may wrap to become a very small, or negative number, therefore providing a very incorrect value which can lead to unexpected behavior. At worst the attacker can execute arbitrary code.

Nessus

  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-2920.NASL
    descriptionSeveral vulnerabilities have been discovered in the chromium web browser. - CVE-2014-1730 A type confusion issue was discovered in the v8 JavaScript library. - CVE-2014-1731 John Butler discovered a type confusion issue in the WebKit/Blink document object model implementation. - CVE-2014-1732 Khalil Zhani discovered a use-after-free issue in the speech recognition feature. - CVE-2014-1733 Jed Davis discovered a way to bypass the seccomp-bpf sandbox. - CVE-2014-1734 The Google Chrome development team discovered and fixed multiple issues with potential security impact. - CVE-2014-1735 The Google Chrome development team discovered and fixed multiple issues in version 3.24.35.33 of the v8 JavaScript library. - CVE-2014-1736 SkyLined discovered an integer overlflow issue in the v8 JavaScript library.
    last seen2020-03-17
    modified2014-05-05
    plugin id73856
    published2014-05-05
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/73856
    titleDebian DSA-2920-1 : chromium-browser - security update
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Debian Security Advisory DSA-2920. The text 
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(73856);
      script_version("1.12");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12");
    
      script_cve_id("CVE-2014-1730", "CVE-2014-1731", "CVE-2014-1732", "CVE-2014-1733", "CVE-2014-1734", "CVE-2014-1735", "CVE-2014-1736");
      script_bugtraq_id(67082);
      script_xref(name:"DSA", value:"2920");
    
      script_name(english:"Debian DSA-2920-1 : chromium-browser - security update");
      script_summary(english:"Checks dpkg output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Several vulnerabilities have been discovered in the chromium web
    browser.
    
      - CVE-2014-1730
        A type confusion issue was discovered in the v8
        JavaScript library.
    
      - CVE-2014-1731
        John Butler discovered a type confusion issue in the
        WebKit/Blink document object model implementation.
    
      - CVE-2014-1732
        Khalil Zhani discovered a use-after-free issue in the
        speech recognition feature.
    
      - CVE-2014-1733
        Jed Davis discovered a way to bypass the seccomp-bpf
        sandbox.
    
      - CVE-2014-1734
        The Google Chrome development team discovered and fixed
        multiple issues with potential security impact.
    
      - CVE-2014-1735
        The Google Chrome development team discovered and fixed
        multiple issues in version 3.24.35.33 of the v8
        JavaScript library.
    
      - CVE-2014-1736
        SkyLined discovered an integer overlflow issue in the v8
        JavaScript library."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2014-1730"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2014-1731"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2014-1732"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2014-1733"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2014-1734"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2014-1735"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2014-1736"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://packages.debian.org/source/wheezy/chromium-browser"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.debian.org/security/2014/dsa-2920"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Upgrade the chromium-browser packages.
    
    For the stable distribution (wheezy), these problems have been fixed
    in version 34.0.1847.132-1~deb7u1."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:chromium-browser");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:7.0");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2014/05/03");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/05/05");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"7.0", prefix:"chromium", reference:"34.0.1847.132-1~deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"chromium-browser", reference:"34.0.1847.132-1~deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"chromium-browser-dbg", reference:"34.0.1847.132-1~deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"chromium-browser-inspector", reference:"34.0.1847.132-1~deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"chromium-browser-l10n", reference:"34.0.1847.132-1~deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"chromium-dbg", reference:"34.0.1847.132-1~deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"chromium-inspector", reference:"34.0.1847.132-1~deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"chromium-l10n", reference:"34.0.1847.132-1~deb7u1")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyWindows
    NASL idGOOGLE_CHROME_34_0_1847_131.NASL
    descriptionThe version of Google Chrome installed on the remote host is a version prior to 34.0.1847.131. It is, therefore, affected by the following vulnerabilities : - A buffer overflow error exists related to the included version of Flash Player. (CVE-2014-0515) - Type confusion errors exist related to the V8 JavaScript engine and DOM handling. (CVE-2014-1730, CVE-2014-1731) - A use-after-free error exists related to speech recognition processing. (CVE-2014-1732) - An error exists related to compiling in
    last seen2020-06-01
    modified2020-06-02
    plugin id73710
    published2014-04-25
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/73710
    titleGoogle Chrome < 34.0.1847.131 Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(73710);
      script_version("1.21");
      script_cvs_date("Date: 2019/11/26");
    
      script_cve_id(
        "CVE-2014-0515",
        "CVE-2014-1730",
        "CVE-2014-1731",
        "CVE-2014-1732",
        "CVE-2014-1733",
        "CVE-2014-1734",
        "CVE-2014-1735",
        "CVE-2014-1736"
      );
      script_bugtraq_id(
        67082,
        67092,
        67521,
        67572
      );
    
      script_name(english:"Google Chrome < 34.0.1847.131 Multiple Vulnerabilities");
      script_summary(english:"Checks version number of Google Chrome");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote host contains a web browser that is affected by multiple
    vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The version of Google Chrome installed on the remote host is a version
    prior to 34.0.1847.131. It is, therefore, affected by the following
    vulnerabilities :
    
      - A buffer overflow error exists related to the included
        version of Flash Player. (CVE-2014-0515)
    
      - Type confusion errors exist related to the V8
        JavaScript engine and DOM handling. (CVE-2014-1730,
        CVE-2014-1731)
    
      - A use-after-free error exists related to speech
        recognition processing. (CVE-2014-1732)
    
      - An error exists related to compiling in 'Seccomp-BPF'.
        (CVE-2014-1733)
    
      - Various, unspecified errors exist. (CVE-2014-1734)
    
      - Various, unspecified errors exist related to the V8
        JavaScript engine. (CVE-2014-1735)
    
      - An integer overflow error exists related to the V8
        JavaScript engine. (CVE-2014-1736)
    
    Note that Nessus has not tested for these issues but has instead
    relied only on the application's self-reported version number.");
      # http://googlechromereleases.blogspot.com/2014/04/stable-channel-update_24.html
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?b5291952");
      script_set_attribute(attribute:"see_also", value:"https://helpx.adobe.com/security/products/flash-player/apsb14-13.html");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to Google Chrome 34.0.1847.131 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2014-0515");
    
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploit_framework_core", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
      script_set_attribute(attribute:"metasploit_name", value:'Adobe Flash Player Shader Buffer Overflow');
      script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/04/24");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/04/24");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/04/25");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:google:chrome");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows");
    
      script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("google_chrome_installed.nasl");
      script_require_keys("SMB/Google_Chrome/Installed");
    
      exit(0);
    }
    
    include("google_chrome_version.inc");
    
    get_kb_item_or_exit("SMB/Google_Chrome/Installed");
    installs = get_kb_list("SMB/Google_Chrome/*");
    
    google_chrome_check_version(installs:installs, fix:'34.0.1847.131', severity:SECURITY_HOLE);
    
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_GOOGLE_CHROME_34_0_1847_131.NASL
    descriptionThe version of Google Chrome installed on the remote Mac OS X host is a version prior to 34.0.1847.131. It is, therefore, affected by the following vulnerabilities : - A buffer overflow error exists related to the included version of Flash Player. (CVE-2014-0515) - Type confusion errors exist related to the V8 JavaScript engine and DOM handling. (CVE-2014-1730, CVE-2014-1731) - A use-after-free error exists related to speech recognition processing. (CVE-2014-1732) - An error exists related to compiling in
    last seen2020-06-01
    modified2020-06-02
    plugin id73711
    published2014-04-25
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/73711
    titleGoogle Chrome < 34.0.1847.131 Multiple Vulnerabilities (Mac OS X)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(73711);
      script_version("1.19");
      script_cvs_date("Date: 2019/11/26");
    
      script_cve_id(
        "CVE-2014-0515",
        "CVE-2014-1730",
        "CVE-2014-1731",
        "CVE-2014-1732",
        "CVE-2014-1733",
        "CVE-2014-1734",
        "CVE-2014-1735",
        "CVE-2014-1736"
      );
      script_bugtraq_id(67082, 67092);
    
      script_name(english:"Google Chrome < 34.0.1847.131 Multiple Vulnerabilities (Mac OS X)");
      script_summary(english:"Checks version number of Google Chrome");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote Mac OS X host contains a web browser that is affected by
    multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The version of Google Chrome installed on the remote Mac OS X host is
    a version prior to 34.0.1847.131. It is, therefore, affected by the
    following vulnerabilities :
    
      - A buffer overflow error exists related to the included
        version of Flash Player. (CVE-2014-0515)
    
      - Type confusion errors exist related to the V8
        JavaScript engine and DOM handling. (CVE-2014-1730,
        CVE-2014-1731)
    
      - A use-after-free error exists related to speech
        recognition processing. (CVE-2014-1732)
    
      - An error exists related to compiling in 'Seccomp-BPF'.
        (CVE-2014-1733)
    
      - Various, unspecified errors exist. (CVE-2014-1734)
    
      - Various, unspecified errors exist related to the V8
        JavaScript engine. (CVE-2014-1735)
    
      - An integer overflow error exists related to the V8
        JavaScript engine. (CVE-2014-1736)
    
    Note that Nessus has not tested for these issues but has instead
    relied only on the application's self-reported version number.");
      # http://googlechromereleases.blogspot.com/2014/04/stable-channel-update_24.html
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?b5291952");
      script_set_attribute(attribute:"see_also", value:"https://helpx.adobe.com/security/products/flash-player/apsb14-13.html");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to Google Chrome 34.0.1847.131 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2014-0515");
    
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploit_framework_core", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
      script_set_attribute(attribute:"metasploit_name", value:'Adobe Flash Player Shader Buffer Overflow');
      script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/04/24");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/04/24");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/04/25");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:google:chrome");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"MacOS X Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("macosx_google_chrome_installed.nbin");
      script_require_keys("MacOSX/Google Chrome/Installed");
    
      exit(0);
    }
    
    include("google_chrome_version.inc");
    
    get_kb_item_or_exit("MacOSX/Google Chrome/Installed");
    
    google_chrome_check_version(fix:'34.0.1847.131', severity:SECURITY_HOLE);
    
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_7CF25A0CD03111E3947B00262D5ED8EE.NASL
    descriptionGoogle Chrome Releases reports (belatedly) : 9 security fixes in this release, including : - [354967] High CVE-2014-1730: Type confusion in V8. Credit to Anonymous. - [349903] High CVE-2014-1731: Type confusion in DOM. Credit to John Butler. - [359802] High CVE-2014-1736: Integer overflow in V8. Credit to SkyLined working with HP
    last seen2020-06-01
    modified2020-06-02
    plugin id73793
    published2014-05-01
    reporterThis script is Copyright (C) 2014 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/73793
    titleFreeBSD : chromium -- multiple vulnerabilities (7cf25a0c-d031-11e3-947b-00262d5ed8ee)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from the FreeBSD VuXML database :
    #
    # Copyright 2003-2014 Jacques Vidrine and contributors
    #
    # Redistribution and use in source (VuXML) and 'compiled' forms (SGML,
    # HTML, PDF, PostScript, RTF and so forth) with or without modification,
    # are permitted provided that the following conditions are met:
    # 1. Redistributions of source code (VuXML) must retain the above
    #    copyright notice, this list of conditions and the following
    #    disclaimer as the first lines of this file unmodified.
    # 2. Redistributions in compiled form (transformed to other DTDs,
    #    published online in any format, converted to PDF, PostScript,
    #    RTF and other formats) must reproduce the above copyright
    #    notice, this list of conditions and the following disclaimer
    #    in the documentation and/or other materials provided with the
    #    distribution.
    # 
    # THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS"
    # AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
    # THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
    # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS
    # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
    # OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT
    # OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
    # BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
    # WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
    # OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,
    # EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(73793);
      script_version("$Revision: 1.4 $");
      script_cvs_date("$Date: 2014/05/18 04:28:24 $");
    
      script_cve_id("CVE-2014-1730", "CVE-2014-1731", "CVE-2014-1732", "CVE-2014-1733", "CVE-2014-1734", "CVE-2014-1735", "CVE-2014-1736");
    
      script_name(english:"FreeBSD : chromium -- multiple vulnerabilities (7cf25a0c-d031-11e3-947b-00262d5ed8ee)");
      script_summary(english:"Checks for updated package in pkg_info output");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote FreeBSD host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Google Chrome Releases reports (belatedly) :
    
    9 security fixes in this release, including :
    
    - [354967] High CVE-2014-1730: Type confusion in V8. Credit to
    Anonymous.
    
    - [349903] High CVE-2014-1731: Type confusion in DOM. Credit to John
    Butler.
    
    - [359802] High CVE-2014-1736: Integer overflow in V8. Credit to
    SkyLined working with HP's Zero Day Initiative.
    
    - [352851] Medium CVE-2014-1732: Use-after-free in Speech Recognition.
    Credit to Khalil Zhani.
    
    - [351103] Medium CVE-2014-1733: Compiler bug in Seccomp-BPF. Credit
    to Jed Davis.
    
    - [367314] CVE-2014-1734: Various fixes from internal audits, fuzzing
    and other initiatives.
    
    - [359130, 359525, 360429] CVE-2014-1735: Multiple vulnerabilities in
    V8 fixed in version 3.24.35.33."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://googlechromereleases.blogspot.nl/"
      );
      # http://www.freebsd.org/ports/portaudit/7cf25a0c-d031-11e3-947b-00262d5ed8ee.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?c7d0ef67"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected package.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:chromium");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:freebsd:freebsd");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/04/24");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/04/30");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/05/01");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014 Tenable Network Security, Inc.");
      script_family(english:"FreeBSD Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/FreeBSD/release", "Host/FreeBSD/pkg_info");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("freebsd_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/FreeBSD/release")) audit(AUDIT_OS_NOT, "FreeBSD");
    if (!get_kb_item("Host/FreeBSD/pkg_info")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (pkg_test(save_report:TRUE, pkg:"chromium<34.0.1847.132")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");