Summary
The host is running Google Chrome and is prone to security bypass vulnerability.
Impact
Successful exploitation will allow attackers to overwrite or delete arbitrary cookies by sending a specially crafted HTTP response through a man-in-the- middle attack.
Impact Level: Application
Solution
Upgrade to the Google Chrome 4.0.211.0 or later,
For updates refer to http://www.google.com/chrome
Insight
The flaw is due to improper restrictions for modifications to cookies established in HTTPS sessions i.e lack of the HTTP Strict Transport Security (HSTS) includeSubDomains feature, which allows man-in-the-middle attackers to overwrite or delete arbitrary cookies via a Set-Cookie header in an HTTP response.
Affected
Google Chrome version prior to 4.0.211.0 on Windows.
References
Severity
Classification
-
CVE CVE-2008-7294 -
CVSS Base Score: 5.8
AV:N/AC:M/Au:N/C:N/I:P/A:P
Related Vulnerabilities
- Adobe LiveCycle Designer Untrusted Search Path Vulnerability (Windows)
- Adobe Flex SDK 'SWF' Files Cross-Site Scripting Vulnerability (Windows)
- Adobe Reader 'file://' URL Information Disclosure Vulnerability Feb07 (Windows)
- Asterisk CIDR Notation in Access Rule Remote Security Bypass Vulnerability
- Adobe Flash Player/Air Multiple Vulnerabilities -feb10 (Win)