Highly critical

Google Chrome Multiple Vulnerabilities


Release Date:  2010-12-14    Last Update:  2010-12-23    Views:  6,043

Secunia Advisory SA42605


You need to log in to view this


You need to log in to view this

Solution Status:

You need to log in to view this


You need to log in to view this

CVE Reference(s):

You need to log in to view this


Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system

You need to log in to the Secunia Community to view the full description of this advisory

If you are not a member of the Secunia community, you can sign up here for free.

Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Subject: Google Chrome Multiple Vulnerabilities

User Message
flyzipper RE: Google Chrome Multiple Vulnerabilities
Member 11th Jan, 2011 04:46
Score: 0
Posts: 1
User Since: 11th Jan 2011
System Score: N/A
Location: CA
Last edited on 11th Jan, 2011 04:46
The signature/scan for this may need a little tweaking.
The description states, "This vulnerability affects 64-bit builds for Linux only", yet I'm running 64-bit Windows 7 and still receive a warning.
Was this reply relevant?
Anthony Wells RE: Google Chrome Multiple Vulnerabilities
Expert Contributor 12th Jan, 2011 21:14
Score: 2468
Posts: 3,356
User Since: 19th Dec 2007
System Score: N/A
Location: N/A

@flyzipper ,

I would read the Linux note as referring to point 1) only and release 8.0.552.224 fixes all 3) noted insecurities , hence your warning .

The subsequent update to version 8.0.552.231 is for Mac only and is a bug fix :-


Hope that is clearer .



It always seems impossible until its done.
Nelson Mandela
Was this reply relevant?


You must be logged in to post a comment.