Google Chrome Web Script Execution Vulnerabilites - June09

Summary
This host has Google Chrome installed and is prone to Web Script Execution vulnerabilities.
Impact
Successful exploitation will allow attacker to execute arbitrary web script in an https site's context and spoof an arbitrary https site by letting a browser obtain a valid certificate. Impact Level: Application Impact Level: Application
Solution
Upgrade to Google Chrome version 4.1.249.1064 or later. For updates refer to http://www.google.com/chrome
Insight
- Displays a cached certificate for a '4xx' or '5xx' CONNECT response page returned by a proxy server, which can exploited by sending the browser a valid certificate from this site during one request, and then sending the browser a crafted 502 response page upon a subsequent request. - Error exists in src/net/http/http_transaction_winhttp.cc while the HTTP Host header to determine the context of a document provided in a '4xx' or '5xx' CONNECT response from a proxy server, which can be exploited by modifying this CONNECT response, aka an 'SSL tampering' attack. - Detects http content in https web pages only when the top-level frame uses https. This can be exploited by modifying an http page to include an https iframe that references a script file on an http site, related to 'HTTP-Intended-but-HTTPS-Loadable (HPIHSL) pages.'
Affected
Google Chrome version prior to 1.0.154.53 on Windows.
References