Summary
The host is running Google Chrome and is prone to security bypass vulnerability.
Impact
Successful exploitation will allow attackers to overwrite or delete arbitrary cookies by sending a specially crafted HTTP response through a man-in-the- middle attack.
Impact Level: Application
Solution
Upgrade to the Google Chrome 4.0.211.0 or later,
For updates refer to http://www.google.com/chrome
Insight
The flaw is due to improper restrictions for modifications to cookies established in HTTPS sessions i.e lack of the HTTP Strict Transport Security (HSTS) includeSubDomains feature, which allows man-in-the-middle attackers to overwrite or delete arbitrary cookies via a Set-Cookie header in an HTTP response.
Affected
Google Chrome version prior to 4.0.211.0 on Linux.
References
Severity
Classification
-
CVE CVE-2008-7294 -
CVSS Base Score: 5.8
AV:N/AC:M/Au:N/C:N/I:P/A:P
Related Vulnerabilities
- Apple iTunes Tutorials Window Security Bypass Vulnerability (Mac OS X)
- Adobe Reader Multiple Unspecified Vulnerabilities Jun06 (Mac OS X)
- Adobe Reader Privelege Escalation Vulnerability - Jul07 (Mac OS X)
- APC PowerChute Business Edition Unspecified Cross Site Scripting Vulnerability
- Arris DOCSIS Password Disclosure