Description
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4064-1 security@debian.org
https://www.debian.org/security/ Michael Gilbert
December 12, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : chromium-browser
CVE ID : CVE-2017-15407 CVE-2017-15408 CVE-2017-15409 CVE-2017-15410
CVE-2017-15411 CVE-2017-15413 CVE-2017-15415 CVE-2017-15416
CVE-2017-15417 CVE-2017-15418 CVE-2017-15419 CVE-2017-15420
CVE-2017-15423 CVE-2017-15424 CVE-2017-15425 CVE-2017-15426
CVE-2017-15427
Several vulnerabilities have been discovered in the chromium web browser.
CVE-2017-15407
Ned Williamson discovered an out-of-bounds write issue.
CVE-2017-15408
Ke Liu discovered a heap overflow issue in the pdfium library.
CVE-2017-15409
An out-of-bounds write issue was discovered in the skia library.
CVE-2017-15410
Luat Nguyen discovered a use-after-free issue in the pdfium library.
CVE-2017-15411
Luat Nguyen discovered a use-after-free issue in the pdfium library.
CVE-2017-15413
Gaurav Dewan discovered a type confusion issue.
CVE-2017-15415
Viktor Brange discovered an information disclosure issue.
CVE-2017-15416
Ned Williamson discovered an out-of-bounds read issue.
CVE-2017-15417
Max May discovered an information disclosure issue in the skia
library.
CVE-2017-15418
Kushal Arvind Shah discovered an uninitialized value in the skia
library.
CVE-2017-15419
Jun Kokatsu discoved an information disclosure issue.
CVE-2017-15420
WenXu Wu discovered a URL spoofing issue.
CVE-2017-15423
Greg Hudson discovered an issue in the boringssl library.
CVE-2017-15424
Khalil Zhani discovered a URL spoofing issue.
CVE-2017-15425
xisigr discovered a URL spoofing issue.
CVE-2017-15426
WenXu Wu discovered a URL spoofing issue.
CVE-2017-15427
Junaid Farhan discovered an issue with the omnibox.
For the stable distribution (stretch), these problems have been fixed in
version 63.0.3239.84-1~deb9u1.
We recommend that you upgrade your chromium-browser packages.
For the detailed security status of chromium-browser please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/chromium-browser
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
Affected Package
Related
{"id": "DEBIAN:DSA-4064-1:25480", "vendorId": null, "type": "debian", "bulletinFamily": "unix", "title": "[SECURITY] [DSA 4064-1] chromium-browser security update", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4064-1 security@debian.org\nhttps://www.debian.org/security/ Michael Gilbert\nDecember 12, 2017 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : chromium-browser\nCVE ID : CVE-2017-15407 CVE-2017-15408 CVE-2017-15409 CVE-2017-15410\n CVE-2017-15411 CVE-2017-15413 CVE-2017-15415 CVE-2017-15416\n CVE-2017-15417 CVE-2017-15418 CVE-2017-15419 CVE-2017-15420\n CVE-2017-15423 CVE-2017-15424 CVE-2017-15425 CVE-2017-15426\n CVE-2017-15427\n\nSeveral vulnerabilities have been discovered in the chromium web browser.\n\nCVE-2017-15407\n\n Ned Williamson discovered an out-of-bounds write issue.\n\nCVE-2017-15408\n\n Ke Liu discovered a heap overflow issue in the pdfium library.\n\nCVE-2017-15409\n\n An out-of-bounds write issue was discovered in the skia library.\n\nCVE-2017-15410\n\n Luat Nguyen discovered a use-after-free issue in the pdfium library.\n\nCVE-2017-15411\n\n Luat Nguyen discovered a use-after-free issue in the pdfium library.\n\nCVE-2017-15413\n\n Gaurav Dewan discovered a type confusion issue.\n\nCVE-2017-15415\n\n Viktor Brange discovered an information disclosure issue.\n\nCVE-2017-15416\n\n Ned Williamson discovered an out-of-bounds read issue.\n\nCVE-2017-15417\n\n Max May discovered an information disclosure issue in the skia\n library.\n\nCVE-2017-15418\n\n Kushal Arvind Shah discovered an uninitialized value in the skia\n library.\n\nCVE-2017-15419\n\n Jun Kokatsu discoved an information disclosure issue.\n\nCVE-2017-15420\n\n WenXu Wu discovered a URL spoofing issue.\n\nCVE-2017-15423\n\n Greg Hudson discovered an issue in the boringssl library.\n\nCVE-2017-15424\n\n Khalil Zhani discovered a URL spoofing issue.\n\nCVE-2017-15425\n\n xisigr discovered a URL spoofing issue.\n\nCVE-2017-15426\n\n WenXu Wu discovered a URL spoofing issue.\n\nCVE-2017-15427\n\n Junaid Farhan discovered an issue with the omnibox.\n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 63.0.3239.84-1~deb9u1.\n\nWe recommend that you upgrade your chromium-browser packages.\n\nFor the detailed security status of chromium-browser please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/chromium-browser\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "published": "2017-12-12T11:04:40", "modified": "2017-12-12T11:04:40", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cvss2": {"cvssV2": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true}, "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 2.8, "impactScore": 5.9}, "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2017/msg00327.html", "reporter": "Debian", "references": [], "cvelist": ["CVE-2017-15417", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15427", "CVE-2017-15407", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15415", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-15420"], "immutableFields": [], "lastseen": "2019-05-30T02:21:33", "viewCount": 3, "enchantments": {"dependencies": {"references": [{"type": "archlinux", "idList": ["ASA-201712-5"]}, {"type": "chrome", "idList": ["GCSA-6993857189147290065", "GCSA-9103668740237956942"]}, {"type": "cve", "idList": ["CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427"]}, {"type": "debian", "idList": ["DEBIAN:DSA-4103-1:4A64B"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2017-15407", "DEBIANCVE:CVE-2017-15408", "DEBIANCVE:CVE-2017-15409", "DEBIANCVE:CVE-2017-15410", "DEBIANCVE:CVE-2017-15411", "DEBIANCVE:CVE-2017-15413", "DEBIANCVE:CVE-2017-15415", "DEBIANCVE:CVE-2017-15416", "DEBIANCVE:CVE-2017-15417", "DEBIANCVE:CVE-2017-15418", "DEBIANCVE:CVE-2017-15419", "DEBIANCVE:CVE-2017-15420", "DEBIANCVE:CVE-2017-15423", "DEBIANCVE:CVE-2017-15424", "DEBIANCVE:CVE-2017-15425", "DEBIANCVE:CVE-2017-15426", "DEBIANCVE:CVE-2017-15427"]}, {"type": "fedora", "idList": ["FEDORA:0F54C60BE23D", "FEDORA:2E8D96005552", "FEDORA:5CFCF60A5875", "FEDORA:855A9625F2AD", "FEDORA:CAFF160478EB", "FEDORA:EC7F86046254"]}, {"type": "freebsd", "idList": ["1D951E85-FFDB-11E7-8B91-E8E0B747A45A", "8E986B2B-1BAA-11E8-A944-54EE754AF08E"]}, {"type": "gentoo", "idList": ["GLSA-201801-03"]}, {"type": "kaspersky", "idList": ["KLA11152", "KLA11185"]}, {"type": "mageia", "idList": ["MGAA-2018-0067"]}, {"type": "nessus", "idList": ["700351.PASL", "DEBIAN_DSA-4064.NASL", "DEBIAN_DSA-4103.NASL", "FEDORA_2017-C2645AA935.NASL", "FEDORA_2017-EA44F172E3.NASL", "FEDORA_2018-AAFDBB5554.NASL", "FEDORA_2018-C0D3DB441F.NASL", "FEDORA_2018-E08D828ED9.NASL", "FEDORA_2018-FAFF5F661E.NASL", "FREEBSD_PKG_1D951E85FFDB11E78B91E8E0B747A45A.NASL", "FREEBSD_PKG_8E986B2B1BAA11E8A94454EE754AF08E.NASL", "GENTOO_GLSA-201801-03.NASL", "GOOGLE_CHROME_63_0_3239_84.NASL", "GOOGLE_CHROME_64_0_3282_119.NASL", "MACOSX_GOOGLE_CHROME_63_0_3239_84.NASL", "MACOSX_GOOGLE_CHROME_64_0_3282_119.NASL", "OPENSUSE-2017-1349.NASL", "OPENSUSE-2018-103.NASL", "REDHAT-RHSA-2017-3401.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310704064", "OPENVAS:1361412562310704103", "OPENVAS:1361412562310812235", "OPENVAS:1361412562310812236", "OPENVAS:1361412562310812237", "OPENVAS:1361412562310851660", "OPENVAS:1361412562310851692", "OPENVAS:1361412562310873974", "OPENVAS:1361412562310873977", "OPENVAS:1361412562310874144", "OPENVAS:1361412562310874155", "OPENVAS:1361412562310874300"]}, {"type": "osv", "idList": ["OSV:DSA-4064-1", "OSV:DSA-4103-1"]}, {"type": "redhat", "idList": ["RHSA-2017:3401"]}, {"type": "redhatcve", "idList": ["RH:CVE-2017-15407", "RH:CVE-2017-15408", "RH:CVE-2017-15409", "RH:CVE-2017-15410", "RH:CVE-2017-15411", "RH:CVE-2017-15413", "RH:CVE-2017-15415", "RH:CVE-2017-15416", "RH:CVE-2017-15417", "RH:CVE-2017-15418", "RH:CVE-2017-15419", "RH:CVE-2017-15420", "RH:CVE-2017-15423", "RH:CVE-2017-15424", "RH:CVE-2017-15425", "RH:CVE-2017-15426", "RH:CVE-2017-15427"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2017:3244-1", "OPENSUSE-SU-2017:3245-1", "OPENSUSE-SU-2018:0259-1", "OPENSUSE-SU-2018:0313-1"]}, {"type": "threatpost", "idList": ["THREATPOST:BC7785C1AA5CE337FD6268A2941438EE"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2017-15407", "UB:CVE-2017-15408", "UB:CVE-2017-15409", "UB:CVE-2017-15410", "UB:CVE-2017-15411", "UB:CVE-2017-15413", "UB:CVE-2017-15415", "UB:CVE-2017-15416", "UB:CVE-2017-15417", "UB:CVE-2017-15418", "UB:CVE-2017-15419", "UB:CVE-2017-15420", "UB:CVE-2017-15423", "UB:CVE-2017-15424", "UB:CVE-2017-15425", "UB:CVE-2017-15426", "UB:CVE-2017-15427"]}]}, "score": {"value": 0.3, "vector": "NONE"}, "backreferences": {"references": [{"type": "archlinux", "idList": ["ASA-201712-5"]}, {"type": "chrome", "idList": ["GCSA-6993857189147290065", "GCSA-9103668740237956942"]}, {"type": "cve", "idList": ["CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427"]}, {"type": "debian", "idList": ["DEBIAN:DSA-4103-1:4A64B"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2017-15407", "DEBIANCVE:CVE-2017-15408", "DEBIANCVE:CVE-2017-15409", "DEBIANCVE:CVE-2017-15410", "DEBIANCVE:CVE-2017-15411", "DEBIANCVE:CVE-2017-15413", "DEBIANCVE:CVE-2017-15415", "DEBIANCVE:CVE-2017-15416", "DEBIANCVE:CVE-2017-15417", "DEBIANCVE:CVE-2017-15418", "DEBIANCVE:CVE-2017-15419", "DEBIANCVE:CVE-2017-15420", "DEBIANCVE:CVE-2017-15423", "DEBIANCVE:CVE-2017-15424", "DEBIANCVE:CVE-2017-15425", "DEBIANCVE:CVE-2017-15426", "DEBIANCVE:CVE-2017-15427"]}, {"type": "fedora", "idList": ["FEDORA:0F54C60BE23D", "FEDORA:2E8D96005552", "FEDORA:5CFCF60A5875", "FEDORA:855A9625F2AD", "FEDORA:CAFF160478EB", "FEDORA:EC7F86046254"]}, {"type": "freebsd", "idList": ["1D951E85-FFDB-11E7-8B91-E8E0B747A45A"]}, {"type": "gentoo", "idList": ["GLSA-201801-03"]}, {"type": "kaspersky", "idList": ["KLA11152"]}, {"type": "metasploit", "idList": ["MSF:ILITIES/REDHAT_LINUX-CVE-2017-15407/", "MSF:ILITIES/REDHAT_LINUX-CVE-2017-15410/", "MSF:ILITIES/REDHAT_LINUX-CVE-2017-15415/", "MSF:ILITIES/REDHAT_LINUX-CVE-2017-15418/"]}, {"type": "nessus", "idList": ["DEBIAN_DSA-4064.NASL", "FEDORA_2017-C2645AA935.NASL", "FREEBSD_PKG_1D951E85FFDB11E78B91E8E0B747A45A.NASL", "GENTOO_GLSA-201801-03.NASL", "GOOGLE_CHROME_63_0_3239_84.NASL", "MACOSX_GOOGLE_CHROME_63_0_3239_84.NASL", "OPENSUSE-2017-1349.NASL", "REDHAT-RHSA-2017-3401.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310704064", "OPENVAS:1361412562310812235", "OPENVAS:1361412562310812236", "OPENVAS:1361412562310812237", "OPENVAS:1361412562310851660", "OPENVAS:1361412562310873974", "OPENVAS:1361412562310873977"]}, {"type": "redhat", "idList": ["RHSA-2017:3401"]}, {"type": "redhatcve", "idList": ["RH:CVE-2017-15407", "RH:CVE-2017-15408", "RH:CVE-2017-15409", "RH:CVE-2017-15410", "RH:CVE-2017-15411", "RH:CVE-2017-15413", "RH:CVE-2017-15415", "RH:CVE-2017-15416", "RH:CVE-2017-15417", "RH:CVE-2017-15418", "RH:CVE-2017-15419", "RH:CVE-2017-15420", "RH:CVE-2017-15423", "RH:CVE-2017-15424", "RH:CVE-2017-15425", "RH:CVE-2017-15426", "RH:CVE-2017-15427"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2017:3244-1", "OPENSUSE-SU-2017:3245-1"]}, {"type": "threatpost", "idList": ["THREATPOST:BC7785C1AA5CE337FD6268A2941438EE"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2017-15407", "UB:CVE-2017-15408", "UB:CVE-2017-15409", "UB:CVE-2017-15410", "UB:CVE-2017-15411", "UB:CVE-2017-15413", "UB:CVE-2017-15415", "UB:CVE-2017-15416", "UB:CVE-2017-15417", "UB:CVE-2017-15418", "UB:CVE-2017-15419", "UB:CVE-2017-15420", "UB:CVE-2017-15423", "UB:CVE-2017-15424", "UB:CVE-2017-15425", "UB:CVE-2017-15426", "UB:CVE-2017-15427"]}]}, "exploitation": null, "epss": [{"cve": "CVE-2017-15417", "epss": "0.004250000", "percentile": "0.703500000", "modified": "2023-03-15"}, {"cve": "CVE-2017-15409", "epss": "0.018540000", "percentile": "0.865050000", "modified": "2023-03-15"}, {"cve": "CVE-2017-15423", "epss": "0.008350000", "percentile": "0.794560000", "modified": "2023-03-15"}, {"cve": "CVE-2017-15419", "epss": "0.005790000", "percentile": "0.747240000", "modified": "2023-03-15"}, {"cve": "CVE-2017-15425", "epss": "0.005870000", "percentile": "0.748980000", "modified": "2023-03-15"}, {"cve": "CVE-2017-15410", "epss": "0.018140000", "percentile": "0.862980000", "modified": "2023-03-15"}, {"cve": "CVE-2017-15427", "epss": "0.005860000", "percentile": "0.748710000", "modified": "2023-03-15"}, {"cve": "CVE-2017-15407", "epss": "0.050860000", "percentile": "0.916710000", "modified": "2023-03-15"}, {"cve": "CVE-2017-15418", "epss": "0.004880000", "percentile": "0.723300000", "modified": "2023-03-15"}, {"cve": "CVE-2017-15411", "epss": "0.018140000", "percentile": "0.862980000", "modified": "2023-03-15"}, {"cve": "CVE-2017-15415", "epss": "0.004250000", "percentile": "0.703500000", "modified": "2023-03-15"}, {"cve": "CVE-2017-15426", "epss": "0.005870000", "percentile": "0.748980000", "modified": "2023-03-15"}, {"cve": "CVE-2017-15413", "epss": "0.003150000", "percentile": "0.655930000", "modified": "2023-03-15"}, {"cve": "CVE-2017-15408", "epss": "0.022520000", "percentile": "0.878140000", "modified": "2023-03-15"}, {"cve": "CVE-2017-15416", "epss": "0.003670000", "percentile": "0.681410000", "modified": "2023-03-15"}, {"cve": "CVE-2017-15424", "epss": "0.005870000", "percentile": "0.748980000", "modified": "2023-03-15"}, {"cve": "CVE-2017-15420", "epss": "0.007760000", "percentile": "0.785930000", "modified": "2023-03-15"}], "vulnersScore": 0.3}, "_state": {"dependencies": 1678918916, "score": 1678919600, "epss": 1678939848}, "_internal": {"score_hash": "7f12ef35e6747f94e30aac46ee8b59fd"}, "affectedPackage": [{"OS": "Debian", "OSVersion": "9", "arch": "all", "operator": "lt", "packageFilename": "chromium-browser_63.0.3239.84-1~deb9u1_all.deb", "packageName": "chromium-browser", "packageVersion": "63.0.3239.84-1~deb9u1"}]}
{"nessus": [{"lastseen": "2023-02-04T14:53:19", "description": "Several vulnerabilities have been discovered in the chromium web browser.\n\n - CVE-2017-15407 Ned Williamson discovered an out-of-bounds write issue.\n\n - CVE-2017-15408 Ke Liu discovered a heap overflow issue in the pdfium library.\n\n - CVE-2017-15409 An out-of-bounds write issue was discovered in the skia library.\n\n - CVE-2017-15410 Luat Nguyen discovered a use-after-free issue in the pdfium library.\n\n - CVE-2017-15411 Luat Nguyen discovered a use-after-free issue in the pdfium library.\n\n - CVE-2017-15413 Gaurav Dewan discovered a type confusion issue.\n\n - CVE-2017-15415 Viktor Brange discovered an information disclosure issue.\n\n - CVE-2017-15416 Ned Williamson discovered an out-of-bounds read issue.\n\n - CVE-2017-15417 Max May discovered an information disclosure issue in the skia library.\n\n - CVE-2017-15418 Kushal Arvind Shah discovered an uninitialized value in the skia library.\n\n - CVE-2017-15419 Jun Kokatsu discoved an information disclosure issue.\n\n - CVE-2017-15420 WenXu Wu discovered a URL spoofing issue.\n\n - CVE-2017-15423 Greg Hudson discovered an issue in the boringssl library.\n\n - CVE-2017-15424 Khalil Zhani discovered a URL spoofing issue.\n\n - CVE-2017-15425 xisigr discovered a URL spoofing issue.\n\n - CVE-2017-15426 WenXu Wu discovered a URL spoofing issue.\n\n - CVE-2017-15427 Junaid Farhan discovered an issue with the omnibox.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2017-12-13T00:00:00", "type": "nessus", "title": "Debian DSA-4064-1 : chromium-browser - security update", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427"], "modified": "2021-01-04T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:chromium-browser", "cpe:/o:debian:debian_linux:9.0"], "id": "DEBIAN_DSA-4064.NASL", "href": "https://www.tenable.com/plugins/nessus/105195", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-4064. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(105195);\n script_version(\"3.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2017-15407\", \"CVE-2017-15408\", \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\", \"CVE-2017-15413\", \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15417\", \"CVE-2017-15418\", \"CVE-2017-15419\", \"CVE-2017-15420\", \"CVE-2017-15423\", \"CVE-2017-15424\", \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2017-15427\");\n script_xref(name:\"DSA\", value:\"4064\");\n\n script_name(english:\"Debian DSA-4064-1 : chromium-browser - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities have been discovered in the chromium web\nbrowser.\n\n - CVE-2017-15407\n Ned Williamson discovered an out-of-bounds write issue.\n\n - CVE-2017-15408\n Ke Liu discovered a heap overflow issue in the pdfium\n library.\n\n - CVE-2017-15409\n An out-of-bounds write issue was discovered in the skia\n library.\n\n - CVE-2017-15410\n Luat Nguyen discovered a use-after-free issue in the\n pdfium library.\n\n - CVE-2017-15411\n Luat Nguyen discovered a use-after-free issue in the\n pdfium library.\n\n - CVE-2017-15413\n Gaurav Dewan discovered a type confusion issue.\n\n - CVE-2017-15415\n Viktor Brange discovered an information disclosure\n issue.\n\n - CVE-2017-15416\n Ned Williamson discovered an out-of-bounds read issue.\n\n - CVE-2017-15417\n Max May discovered an information disclosure issue in\n the skia library.\n\n - CVE-2017-15418\n Kushal Arvind Shah discovered an uninitialized value in\n the skia library.\n\n - CVE-2017-15419\n Jun Kokatsu discoved an information disclosure issue.\n\n - CVE-2017-15420\n WenXu Wu discovered a URL spoofing issue.\n\n - CVE-2017-15423\n Greg Hudson discovered an issue in the boringssl\n library.\n\n - CVE-2017-15424\n Khalil Zhani discovered a URL spoofing issue.\n\n - CVE-2017-15425\n xisigr discovered a URL spoofing issue.\n\n - CVE-2017-15426\n WenXu Wu discovered a URL spoofing issue.\n\n - CVE-2017-15427\n Junaid Farhan discovered an issue with the omnibox.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15407\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15408\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15409\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15410\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15411\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15413\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15415\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15416\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15417\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15418\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15419\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15420\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15423\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15424\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15425\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15426\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15427\"\n );\n # https://security-tracker.debian.org/tracker/source-package/chromium-browser\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?e33901a2\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/stretch/chromium-browser\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2017/dsa-4064\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the chromium-browser packages.\n\nFor the stable distribution (stretch), these problems have been fixed\nin version 63.0.3239.84-1~deb9u1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:chromium-browser\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:9.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/08/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/12/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/12/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"9.0\", prefix:\"chromedriver\", reference:\"63.0.3239.84-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"chromium\", reference:\"63.0.3239.84-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"chromium-driver\", reference:\"63.0.3239.84-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"chromium-l10n\", reference:\"63.0.3239.84-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"chromium-shell\", reference:\"63.0.3239.84-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"chromium-widevine\", reference:\"63.0.3239.84-1~deb9u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-02-04T14:52:24", "description": "An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\nChromium is an open source web browser, powered by WebKit (Blink).\n\nThis update upgrades Chromium to version 63.0.3239.84.\n\nSecurity Fix(es) :\n\n* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2017-15407, CVE-2017-15408, CVE-2017-15409, CVE-2017-15410, CVE-2017-15411, CVE-2017-15412, CVE-2017-15413, CVE-2017-15415, CVE-2017-15416, CVE-2017-15417, CVE-2017-15418, CVE-2017-15419, CVE-2017-15420, CVE-2017-15422, CVE-2017-15423, CVE-2017-15424, CVE-2017-15425, CVE-2017-15426, CVE-2017-15427)", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2017-12-08T00:00:00", "type": "nessus", "title": "RHEL 6 : chromium-browser (RHSA-2017:3401)", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427"], "modified": "2020-05-29T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:chromium-browser", "p-cpe:/a:redhat:enterprise_linux:chromium-browser-debuginfo", "cpe:/o:redhat:enterprise_linux:6"], "id": "REDHAT-RHSA-2017-3401.NASL", "href": "https://www.tenable.com/plugins/nessus/105091", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2017:3401. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(105091);\n script_version(\"3.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/05/29\");\n\n script_cve_id(\"CVE-2017-15407\", \"CVE-2017-15408\", \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\", \"CVE-2017-15412\", \"CVE-2017-15413\", \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15417\", \"CVE-2017-15418\", \"CVE-2017-15419\", \"CVE-2017-15420\", \"CVE-2017-15422\", \"CVE-2017-15423\", \"CVE-2017-15424\", \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2017-15427\");\n script_xref(name:\"RHSA\", value:\"2017:3401\");\n\n script_name(english:\"RHEL 6 : chromium-browser (RHSA-2017:3401)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"An update for chromium-browser is now available for Red Hat Enterprise\nLinux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Critical. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nChromium is an open source web browser, powered by WebKit (Blink).\n\nThis update upgrades Chromium to version 63.0.3239.84.\n\nSecurity Fix(es) :\n\n* Multiple flaws were found in the processing of malformed web\ncontent. A web page containing malicious content could cause Chromium\nto crash, execute arbitrary code, or disclose sensitive information\nwhen visited by the victim. (CVE-2017-15407, CVE-2017-15408,\nCVE-2017-15409, CVE-2017-15410, CVE-2017-15411, CVE-2017-15412,\nCVE-2017-15413, CVE-2017-15415, CVE-2017-15416, CVE-2017-15417,\nCVE-2017-15418, CVE-2017-15419, CVE-2017-15420, CVE-2017-15422,\nCVE-2017-15423, CVE-2017-15424, CVE-2017-15425, CVE-2017-15426,\nCVE-2017-15427)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://chromereleases.googleblog.com/2017/12/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2017:3401\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15407\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15408\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15409\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15410\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15411\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15412\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15413\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15415\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15416\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15417\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15418\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15419\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15420\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15422\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15423\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15424\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15425\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15426\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15427\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"Update the affected chromium-browser and / or\nchromium-browser-debuginfo packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:chromium-browser\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:chromium-browser-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/08/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/12/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/12/08\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2017:3401\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"chromium-browser-63.0.3239.84-1.el6_9\", allowmaj:TRUE)) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"chromium-browser-63.0.3239.84-1.el6_9\", allowmaj:TRUE)) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"chromium-browser-debuginfo-63.0.3239.84-1.el6_9\", allowmaj:TRUE)) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"chromium-browser-debuginfo-63.0.3239.84-1.el6_9\", allowmaj:TRUE)) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromium-browser / chromium-browser-debuginfo\");\n }\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-02-04T14:53:18", "description": "This update to Chromium 63.0.3239.84 fixes the following security issues :\n\n - CVE-2017-15408: Heap buffer overflow in PDFium\n\n - CVE-2017-15409: Out of bounds write in Skia\n\n - CVE-2017-15410: Use after free in PDFium\n\n - CVE-2017-15411: Use after free in PDFium\n\n - CVE-2017-15412: Use after free in libXML\n\n - CVE-2017-15413: Type confusion in WebAssembly\n\n - CVE-2017-15415: Pointer information disclosure in IPC call\n\n - CVE-2017-15416: Out of bounds read in Blink\n\n - CVE-2017-15417: Cross origin information disclosure in Skia\n\n - CVE-2017-15418: Use of uninitialized value in Skia\n\n - CVE-2017-15419: Cross origin leak of redirect URL in Blink\n\n - CVE-2017-15420: URL spoofing in Omnibox\n\n - CVE-2017-15422: Integer overflow in ICU\n\n - CVE-2017-15423: Issue with SPAKE implementation in BoringSSL\n\n - CVE-2017-15424: URL Spoof in Omnibox\n\n - CVE-2017-15425: URL Spoof in Omnibox\n\n - CVE-2017-15426: URL Spoof in Omnibox\n\n - CVE-2017-15427: Insufficient blocking of JavaScript in Omnibox", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2017-12-14T00:00:00", "type": "nessus", "title": "openSUSE Security Update : chromium (openSUSE-2017-1349)", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:chromedriver", "p-cpe:/a:novell:opensuse:chromedriver-debuginfo", "p-cpe:/a:novell:opensuse:chromium", "p-cpe:/a:novell:opensuse:chromium-debuginfo", "p-cpe:/a:novell:opensuse:chromium-debugsource", "cpe:/o:novell:opensuse:42.2", "cpe:/o:novell:opensuse:42.3"], "id": "OPENSUSE-2017-1349.NASL", "href": "https://www.tenable.com/plugins/nessus/105235", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2017-1349.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(105235);\n script_version(\"3.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2017-15408\", \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\", \"CVE-2017-15412\", \"CVE-2017-15413\", \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15417\", \"CVE-2017-15418\", \"CVE-2017-15419\", \"CVE-2017-15420\", \"CVE-2017-15422\", \"CVE-2017-15423\", \"CVE-2017-15424\", \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2017-15427\");\n\n script_name(english:\"openSUSE Security Update : chromium (openSUSE-2017-1349)\");\n script_summary(english:\"Check for the openSUSE-2017-1349 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update to Chromium 63.0.3239.84 fixes the following security\nissues :\n\n - CVE-2017-15408: Heap buffer overflow in PDFium\n\n - CVE-2017-15409: Out of bounds write in Skia\n\n - CVE-2017-15410: Use after free in PDFium\n\n - CVE-2017-15411: Use after free in PDFium\n\n - CVE-2017-15412: Use after free in libXML\n\n - CVE-2017-15413: Type confusion in WebAssembly\n\n - CVE-2017-15415: Pointer information disclosure in IPC\n call\n\n - CVE-2017-15416: Out of bounds read in Blink\n\n - CVE-2017-15417: Cross origin information disclosure in\n Skia\n\n - CVE-2017-15418: Use of uninitialized value in Skia\n\n - CVE-2017-15419: Cross origin leak of redirect URL in\n Blink\n\n - CVE-2017-15420: URL spoofing in Omnibox\n\n - CVE-2017-15422: Integer overflow in ICU\n\n - CVE-2017-15423: Issue with SPAKE implementation in\n BoringSSL\n\n - CVE-2017-15424: URL Spoof in Omnibox\n\n - CVE-2017-15425: URL Spoof in Omnibox\n\n - CVE-2017-15426: URL Spoof in Omnibox\n\n - CVE-2017-15427: Insufficient blocking of JavaScript in\n Omnibox\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1071691\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected chromium packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/12/14\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE42\\.2|SUSE42\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"42.2 / 42.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE42.2\", reference:\"chromedriver-63.0.3239.84-104.41.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"chromedriver-debuginfo-63.0.3239.84-104.41.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"chromium-63.0.3239.84-104.41.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"chromium-debuginfo-63.0.3239.84-104.41.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"chromium-debugsource-63.0.3239.84-104.41.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"chromedriver-63.0.3239.84-127.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"chromedriver-debuginfo-63.0.3239.84-127.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"chromium-63.0.3239.84-127.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"chromium-debuginfo-63.0.3239.84-127.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"chromium-debugsource-63.0.3239.84-127.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromedriver / chromedriver-debuginfo / chromium / etc\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-02-04T14:39:06", "description": "Security fix for CVE-2017-15412 CVE-2017-15422 CVE-2017-15407 CVE-2017-15408 CVE-2017-15409 CVE-2017-15410 CVE-2017-15411 CVE-2017-15413 CVE-2017-15415 CVE-2017-15416 CVE-2017-15417 CVE-2017-15418 CVE-2017-15419 CVE-2017-15420 CVE-2017-15423 CVE-2017-15424 CVE-2017-15425 CVE-2017-15426 CVE-2017-15427 CVE-2017-15429\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-01-15T00:00:00", "type": "nessus", "title": "Fedora 27 : chromium (2017-c2645aa935)", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427", "CVE-2017-15429"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:chromium", "cpe:/o:fedoraproject:fedora:27"], "id": "FEDORA_2017-C2645AA935.NASL", "href": "https://www.tenable.com/plugins/nessus/105968", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2017-c2645aa935.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(105968);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2017-15407\", \"CVE-2017-15408\", \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\", \"CVE-2017-15412\", \"CVE-2017-15413\", \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15417\", \"CVE-2017-15418\", \"CVE-2017-15419\", \"CVE-2017-15420\", \"CVE-2017-15422\", \"CVE-2017-15423\", \"CVE-2017-15424\", \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2017-15427\", \"CVE-2017-15429\");\n script_xref(name:\"FEDORA\", value:\"2017-c2645aa935\");\n\n script_name(english:\"Fedora 27 : chromium (2017-c2645aa935)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Security fix for CVE-2017-15412 CVE-2017-15422 CVE-2017-15407\nCVE-2017-15408 CVE-2017-15409 CVE-2017-15410 CVE-2017-15411\nCVE-2017-15413 CVE-2017-15415 CVE-2017-15416 CVE-2017-15417\nCVE-2017-15418 CVE-2017-15419 CVE-2017-15420 CVE-2017-15423\nCVE-2017-15424 CVE-2017-15425 CVE-2017-15426 CVE-2017-15427\nCVE-2017-15429\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2017-c2645aa935\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected chromium package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:27\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/08/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/01/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/01/15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^27([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 27\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC27\", reference:\"chromium-63.0.3239.108-1.fc27\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromium\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-02-04T14:52:23", "description": "The version of Google Chrome installed on the remote macOS or Mac OS X host is prior to 63.0.3239.84. It is, therefore, affected by multiple vulnerabilities as noted in Chrome stable channel update release notes for Wednesday, December 6, 2017. Please refer to the release notes for additional information.\n\nNote that Nessus has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2017-12-11T00:00:00", "type": "nessus", "title": "Google Chrome < 63.0.3239.84 Multiple Vulnerabilities (macOS)", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15414", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427"], "modified": "2019-11-12T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "MACOSX_GOOGLE_CHROME_63_0_3239_84.NASL", "href": "https://www.tenable.com/plugins/nessus/105153", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(105153);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/11/12\");\n\n script_cve_id(\n \"CVE-2017-15407\",\n \"CVE-2017-15408\",\n \"CVE-2017-15409\",\n \"CVE-2017-15410\",\n \"CVE-2017-15411\",\n \"CVE-2017-15412\",\n \"CVE-2017-15413\",\n \"CVE-2017-15414\",\n \"CVE-2017-15415\",\n \"CVE-2017-15416\",\n \"CVE-2017-15417\",\n \"CVE-2017-15418\",\n \"CVE-2017-15419\",\n \"CVE-2017-15420\",\n \"CVE-2017-15422\",\n \"CVE-2017-15423\",\n \"CVE-2017-15424\",\n \"CVE-2017-15425\",\n \"CVE-2017-15426\",\n \"CVE-2017-15427\"\n );\n\n script_name(english:\"Google Chrome < 63.0.3239.84 Multiple Vulnerabilities (macOS)\");\n script_summary(english:\"Checks the version of Google Chrome.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A web browser installed on the remote macOS or Mac OS X host is\naffected by multiple unspecified vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote macOS or Mac OS X\nhost is prior to 63.0.3239.84. It is, therefore, affected by multiple\nvulnerabilities as noted in Chrome stable channel update release notes\nfor Wednesday, December 6, 2017. Please refer to the release notes for\nadditional information.\n\nNote that Nessus has not attempted to exploit these issues but has\ninstead relied only on the application's self-reported version number.\");\n # https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?98a7b4bd\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome version 63.0.3239.84 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2017-15413\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/12/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/12/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/12/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_google_chrome_installed.nbin\");\n script_require_keys(\"MacOSX/Google Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"MacOSX/Google Chrome/Installed\");\n\ngoogle_chrome_check_version(fix:'63.0.3239.84', severity:SECURITY_WARNING);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-02-04T14:52:24", "description": "The version of Google Chrome installed on the remote Windows host is prior to 63.0.3239.84. It is, therefore, affected by multiple vulnerabilities as noted in Chrome stable channel update release notes for Wednesday, December 6, 2017. Please refer to the release notes for additional information.\n\nNote that Nessus has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2017-12-11T00:00:00", "type": "nessus", "title": "Google Chrome < 63.0.3239.84 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15414", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427"], "modified": "2022-04-11T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "GOOGLE_CHROME_63_0_3239_84.NASL", "href": "https://www.tenable.com/plugins/nessus/105152", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(105152);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/04/11\");\n\n script_cve_id(\n \"CVE-2017-15407\",\n \"CVE-2017-15408\",\n \"CVE-2017-15409\",\n \"CVE-2017-15410\",\n \"CVE-2017-15411\",\n \"CVE-2017-15412\",\n \"CVE-2017-15413\",\n \"CVE-2017-15414\",\n \"CVE-2017-15415\",\n \"CVE-2017-15416\",\n \"CVE-2017-15417\",\n \"CVE-2017-15418\",\n \"CVE-2017-15419\",\n \"CVE-2017-15420\",\n \"CVE-2017-15422\",\n \"CVE-2017-15423\",\n \"CVE-2017-15424\",\n \"CVE-2017-15425\",\n \"CVE-2017-15426\",\n \"CVE-2017-15427\"\n );\n\n script_name(english:\"Google Chrome < 63.0.3239.84 Multiple Vulnerabilities\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A web browser installed on the remote Windows host is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote Windows host is\nprior to 63.0.3239.84. It is, therefore, affected by multiple\nvulnerabilities as noted in Chrome stable channel update release\nnotes for Wednesday, December 6, 2017. Please refer to the release\nnotes for additional information.\n\nNote that Nessus has not attempted to exploit these issues but has\ninstead relied only on the application's self-reported version number.\");\n # https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?98a7b4bd\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome version 63.0.3239.84 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2017-15413\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/12/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/12/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/12/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_set_attribute(attribute:\"thorough_tests\", value:\"true\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"google_chrome_installed.nasl\");\n script_require_keys(\"SMB/Google_Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"SMB/Google_Chrome/Installed\");\ninstalls = get_kb_list(\"SMB/Google_Chrome/*\");\n\ngoogle_chrome_check_version(installs:installs, fix:'63.0.3239.84', severity:SECURITY_WARNING);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-02-03T14:30:03", "description": "Google Chrome Releases reports :\n\n37 security fixes in this release, including :\n\n- [778505] Critical CVE-2017-15407: Out of bounds write in QUIC.\nReported by Ned Williamson on 2017-10-26\n\n- [762374] High CVE-2017-15408: Heap buffer overflow in PDFium.\nReported by Ke Liu of Tencent's Xuanwu LAB on 2017-09-06\n\n- [763972] High CVE-2017-15409: Out of bounds write in Skia. Reported by Anonymous on 2017-09-11\n\n- [765921] High CVE-2017-15410: Use after free in PDFium. Reported by Luat Nguyen of KeenLab, Tencent on 2017-09-16\n\n- [770148] High CVE-2017-15411: Use after free in PDFium. Reported by Luat Nguyen of KeenLab, Tencent on 2017-09-29\n\n- [727039] High CVE-2017-15412: Use after free in libXML. Reported by Nick Wellnhofer on 2017-05-27\n\n- [766666] High CVE-2017-15413: Type confusion in WebAssembly.\nReported by Gaurav Dewan of Adobe Systems India Pvt. Ltd. on 2017-09-19\n\n- [765512] Medium CVE-2017-15415: Pointer information disclosure in IPC call. Reported by Viktor Brange of Microsoft Offensive Security Research Team on 2017-09-15\n\n- [779314] Medium CVE-2017-15416: Out of bounds read in Blink.\nReported by Ned Williamson on 2017-10-28\n\n- [699028] Medium CVE-2017-15417: Cross origin information disclosure in Skia. Reported by Max May on 2017-03-07\n\n- [765858] Medium CVE-2017-15418: Use of uninitialized value in Skia.\nReported by Kushal Arvind Shah of Fortinet's FortiGuard Labs on 2017-09-15\n\n- [780312] Medium CVE-2017-15419: Cross origin leak of redirect URL in Blink. Reported by Jun Kokatsu on 2017-10-31\n\n- [777419] Medium CVE-2017-15420: URL spoofing in Omnibox. Reported by WenXu Wu of Tencent's Xuanwu Lab on 2017-10-23\n\n- [774382] Medium CVE-2017-15422: Integer overflow in ICU. Reported by Yuan Deng of Ant-financial Light-Year Security Lab on 2017-10-13\n\n- [780484] Medium CVE-2017-15430: Unsafe navigation in Chromecast Plugin. Reported by jinmo123 on 2017-01-11\n\n- [778101] Low CVE-2017-15423: Issue with SPAKE implementation in BoringSSL. Reported by Greg Hudson on 2017-10-25\n\n- [756226] Low CVE-2017-15424: URL Spoof in Omnibox. Reported by Khalil Zhani on 2017-08-16\n\n- [756456] Low CVE-2017-15425: URL Spoof in Omnibox. Reported by xisigr of Tencent's Xuanwu Lab on 2017-08-17\n\n- [757735] Low CVE-2017-15426: URL Spoof in Omnibox. Reported by WenXu Wu of Tencent's Xuanwu Lab on 2017-08-18\n\n- [768910] Low CVE-2017-15427: Insufficient blocking of JavaScript in Omnibox. Reported by Junaid Farhan on 2017-09-26\n\n- [792099] Various fixes from internal audits, fuzzing and other initiatives", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-01-23T00:00:00", "type": "nessus", "title": "FreeBSD : chromium -- multiple vulnerabilities (1d951e85-ffdb-11e7-8b91-e8e0b747a45a)", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427", "CVE-2017-15430"], "modified": "2019-07-10T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:chromium", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_1D951E85FFDB11E78B91E8E0B747A45A.NASL", "href": "https://www.tenable.com/plugins/nessus/106236", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2019 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(106236);\n script_version(\"3.6\");\n script_cvs_date(\"Date: 2019/07/10 16:04:13\");\n\n script_cve_id(\"CVE-2017-15407\", \"CVE-2017-15408\", \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\", \"CVE-2017-15412\", \"CVE-2017-15413\", \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15417\", \"CVE-2017-15418\", \"CVE-2017-15419\", \"CVE-2017-15420\", \"CVE-2017-15422\", \"CVE-2017-15423\", \"CVE-2017-15424\", \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2017-15427\", \"CVE-2017-15430\");\n\n script_name(english:\"FreeBSD : chromium -- multiple vulnerabilities (1d951e85-ffdb-11e7-8b91-e8e0b747a45a)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Google Chrome Releases reports :\n\n37 security fixes in this release, including :\n\n- [778505] Critical CVE-2017-15407: Out of bounds write in QUIC.\nReported by Ned Williamson on 2017-10-26\n\n- [762374] High CVE-2017-15408: Heap buffer overflow in PDFium.\nReported by Ke Liu of Tencent's Xuanwu LAB on 2017-09-06\n\n- [763972] High CVE-2017-15409: Out of bounds write in Skia. Reported\nby Anonymous on 2017-09-11\n\n- [765921] High CVE-2017-15410: Use after free in PDFium. Reported by\nLuat Nguyen of KeenLab, Tencent on 2017-09-16\n\n- [770148] High CVE-2017-15411: Use after free in PDFium. Reported by\nLuat Nguyen of KeenLab, Tencent on 2017-09-29\n\n- [727039] High CVE-2017-15412: Use after free in libXML. Reported by\nNick Wellnhofer on 2017-05-27\n\n- [766666] High CVE-2017-15413: Type confusion in WebAssembly.\nReported by Gaurav Dewan of Adobe Systems India Pvt. Ltd. on\n2017-09-19\n\n- [765512] Medium CVE-2017-15415: Pointer information disclosure in\nIPC call. Reported by Viktor Brange of Microsoft Offensive Security\nResearch Team on 2017-09-15\n\n- [779314] Medium CVE-2017-15416: Out of bounds read in Blink.\nReported by Ned Williamson on 2017-10-28\n\n- [699028] Medium CVE-2017-15417: Cross origin information disclosure\nin Skia. Reported by Max May on 2017-03-07\n\n- [765858] Medium CVE-2017-15418: Use of uninitialized value in Skia.\nReported by Kushal Arvind Shah of Fortinet's FortiGuard Labs on\n2017-09-15\n\n- [780312] Medium CVE-2017-15419: Cross origin leak of redirect URL in\nBlink. Reported by Jun Kokatsu on 2017-10-31\n\n- [777419] Medium CVE-2017-15420: URL spoofing in Omnibox. Reported by\nWenXu Wu of Tencent's Xuanwu Lab on 2017-10-23\n\n- [774382] Medium CVE-2017-15422: Integer overflow in ICU. Reported by\nYuan Deng of Ant-financial Light-Year Security Lab on 2017-10-13\n\n- [780484] Medium CVE-2017-15430: Unsafe navigation in Chromecast\nPlugin. Reported by jinmo123 on 2017-01-11\n\n- [778101] Low CVE-2017-15423: Issue with SPAKE implementation in\nBoringSSL. Reported by Greg Hudson on 2017-10-25\n\n- [756226] Low CVE-2017-15424: URL Spoof in Omnibox. Reported by\nKhalil Zhani on 2017-08-16\n\n- [756456] Low CVE-2017-15425: URL Spoof in Omnibox. Reported by\nxisigr of Tencent's Xuanwu Lab on 2017-08-17\n\n- [757735] Low CVE-2017-15426: URL Spoof in Omnibox. Reported by WenXu\nWu of Tencent's Xuanwu Lab on 2017-08-18\n\n- [768910] Low CVE-2017-15427: Insufficient blocking of JavaScript in\nOmnibox. Reported by Junaid Farhan on 2017-09-26\n\n- [792099] Various fixes from internal audits, fuzzing and other\ninitiatives\"\n );\n # https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?98a7b4bd\"\n );\n # https://vuxml.freebsd.org/freebsd/1d951e85-ffdb-11e7-8b91-e8e0b747a45a.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5706b5c2\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/12/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/01/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/01/23\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"chromium<63.0.3239.84\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-02-04T14:40:47", "description": "The remote host is affected by the vulnerability described in GLSA-201801-03 (Chromium, Google Chrome: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Chromium and Google Chrome. Please review the CVE identifiers referenced below for details.\n Impact :\n\n A remote attacker could possibly execute arbitrary code with the privileges of the process, cause a Denial of Service condition, bypass content security controls, or conduct URL spoofing.\n Workaround :\n\n There are no known workarounds at this time.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-01-08T00:00:00", "type": "nessus", "title": "GLSA-201801-03 : Chromium, Google Chrome: Multiple vulnerabilities", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427", "CVE-2017-15429"], "modified": "2018-10-25T00:00:00", "cpe": ["p-cpe:/a:gentoo:linux:chromium", "p-cpe:/a:gentoo:linux:google-chrome", "cpe:/o:gentoo:linux"], "id": "GENTOO_GLSA-201801-03.NASL", "href": "https://www.tenable.com/plugins/nessus/105629", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201801-03.\n#\n# The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(105629);\n script_version(\"3.6\");\n script_cvs_date(\"Date: 2018/10/25 11:32:02\");\n\n script_cve_id(\"CVE-2017-15407\", \"CVE-2017-15408\", \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\", \"CVE-2017-15412\", \"CVE-2017-15413\", \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15417\", \"CVE-2017-15418\", \"CVE-2017-15419\", \"CVE-2017-15420\", \"CVE-2017-15422\", \"CVE-2017-15423\", \"CVE-2017-15424\", \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2017-15427\", \"CVE-2017-15429\");\n script_xref(name:\"GLSA\", value:\"201801-03\");\n\n script_name(english:\"GLSA-201801-03 : Chromium, Google Chrome: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201801-03\n(Chromium, Google Chrome: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Chromium and Google\n Chrome. Please review the CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker could possibly execute arbitrary code with the\n privileges of the process, cause a Denial of Service condition, bypass\n content security controls, or conduct URL spoofing.\n \nWorkaround :\n\n There are no known workarounds at this time.\"\n );\n # https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?98a7b4bd\"\n );\n # https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop_14.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?125c6f30\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201801-03\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Chromium users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose\n '>=www-client/chromium-63.0.3239.108'\n All Google Chrome users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose\n '>=www-client/google-chrome-63.0.3239.108'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:google-chrome\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/01/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/01/08\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"www-client/chromium\", unaffected:make_list(\"ge 63.0.3239.108\"), vulnerable:make_list(\"lt 63.0.3239.108\"))) flag++;\nif (qpkg_check(package:\"www-client/google-chrome\", unaffected:make_list(\"ge 63.0.3239.108\"), vulnerable:make_list(\"lt 63.0.3239.108\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Chromium / Google Chrome\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-02-04T14:38:20", "description": "Security fix for CVE-2017-15412 CVE-2017-15422 CVE-2017-15407 CVE-2017-15408 CVE-2017-15409 CVE-2017-15410 CVE-2017-15411 CVE-2017-15413 CVE-2017-15415 CVE-2017-15416 CVE-2017-15417 CVE-2017-15418 CVE-2017-15419 CVE-2017-15420 CVE-2017-15423 CVE-2017-15424 CVE-2017-15425 CVE-2017-15426 CVE-2017-15427 CVE-2017-15429\n\n----\n\nSecurity fix for CVE-2017-15398, CVE-2017-15399\n\n----\n\nSecurity fix for CVE-2017-15386 CVE-2017-15387 CVE-2017-15388 CVE-2017-15389 CVE-2017-15390 CVE-2017-15391 CVE-2017-15392 CVE-2017-15393 CVE-2017-15394 CVE-2017-15395 CVE-2017-5124 CVE-2017-5125 CVE-2017-5126 CVE-2017-5127.\n\nBuild switched to use gtk3.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2018-01-02T00:00:00", "type": "nessus", "title": "Fedora 26 : chromium (2017-ea44f172e3)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15386", "CVE-2017-15387", "CVE-2017-15388", "CVE-2017-15389", "CVE-2017-15390", "CVE-2017-15391", "CVE-2017-15392", "CVE-2017-15393", "CVE-2017-15394", "CVE-2017-15395", "CVE-2017-15398", "CVE-2017-15399", "CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427", "CVE-2017-15429", "CVE-2017-5124", "CVE-2017-5125", "CVE-2017-5126", "CVE-2017-5127", "CVE-2017-5128", "CVE-2017-5129", "CVE-2017-5130", "CVE-2017-5131", "CVE-2017-5132", "CVE-2017-5133"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:chromium", "cpe:/o:fedoraproject:fedora:26"], "id": "FEDORA_2017-EA44F172E3.NASL", "href": "https://www.tenable.com/plugins/nessus/105501", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2017-ea44f172e3.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(105501);\n script_version(\"3.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2017-15386\", \"CVE-2017-15387\", \"CVE-2017-15388\", \"CVE-2017-15389\", \"CVE-2017-15390\", \"CVE-2017-15391\", \"CVE-2017-15392\", \"CVE-2017-15393\", \"CVE-2017-15394\", \"CVE-2017-15395\", \"CVE-2017-15398\", \"CVE-2017-15399\", \"CVE-2017-15407\", \"CVE-2017-15408\", \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\", \"CVE-2017-15412\", \"CVE-2017-15413\", \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15417\", \"CVE-2017-15418\", \"CVE-2017-15419\", \"CVE-2017-15420\", \"CVE-2017-15422\", \"CVE-2017-15423\", \"CVE-2017-15424\", \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2017-15427\", \"CVE-2017-15429\", \"CVE-2017-5124\", \"CVE-2017-5125\", \"CVE-2017-5126\", \"CVE-2017-5127\", \"CVE-2017-5128\", \"CVE-2017-5129\", \"CVE-2017-5130\", \"CVE-2017-5131\", \"CVE-2017-5132\", \"CVE-2017-5133\");\n script_xref(name:\"FEDORA\", value:\"2017-ea44f172e3\");\n\n script_name(english:\"Fedora 26 : chromium (2017-ea44f172e3)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Security fix for CVE-2017-15412 CVE-2017-15422 CVE-2017-15407\nCVE-2017-15408 CVE-2017-15409 CVE-2017-15410 CVE-2017-15411\nCVE-2017-15413 CVE-2017-15415 CVE-2017-15416 CVE-2017-15417\nCVE-2017-15418 CVE-2017-15419 CVE-2017-15420 CVE-2017-15423\nCVE-2017-15424 CVE-2017-15425 CVE-2017-15426 CVE-2017-15427\nCVE-2017-15429\n\n----\n\nSecurity fix for CVE-2017-15398, CVE-2017-15399\n\n----\n\nSecurity fix for CVE-2017-15386 CVE-2017-15387 CVE-2017-15388\nCVE-2017-15389 CVE-2017-15390 CVE-2017-15391 CVE-2017-15392\nCVE-2017-15393 CVE-2017-15394 CVE-2017-15395 CVE-2017-5124\nCVE-2017-5125 CVE-2017-5126 CVE-2017-5127.\n\nBuild switched to use gtk3.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2017-ea44f172e3\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected chromium package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:26\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/02/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/01/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/01/02\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^26([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 26\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC26\", reference:\"chromium-63.0.3239.108-1.fc26\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromium\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-02-04T14:40:03", "description": "This update updates QtWebEngine to the 5.10.1 bugfix and security release. QtWebEngine 5.10.1 is part of the Qt 5.10.1 release, but only the QtWebEngine component is included in this update.\n\nThis update includes :\n\n - Security fixes from Chromium up to version 64.0.3282.140. Including: CVE-2017-15407, CVE-2017-15409, CVE-2017-15410, CVE-2017-15411, CVE-2017-15415, CVE-2017-15416, CVE-2017-15418, CVE-2017-15419, CVE-2017-15422, CVE-2017-15423, CVE-2017-15424, CVE-2017-15425, CVE-2017-15426, CVE-2018-6031, CVE-2018-6033, CVE-2018-6034, CVE-2018-6036, CVE-2018-6037, CVE-2018-6038, CVE-2018-6040, CVE-2018-6041, CVE-2018-6042, CVE-2018-6047, CVE-2018-6048, CVE-2018-6050, CVE-2018-6051, CVE-2018-6052, CVE-2018-6053 and CVE-2018-6054.\n\n - Mitigations for SPECTRE: disabled shared-buffers, added cryptographic noise to precision timers\n\n - [QTBUG-47206] Fixed incorrect layouting due to bug in HTML5 viewport support.\n\n - [QTBUG-47945, QTBUG-65647] Fixed random crashes on exit\n\n - [QTBUG-57206] Fixed regression in viewport handling in embedded mode\n\n - [QTBUG-58400] Improved memory usage when printing\n\n - [QTBUG-63867] Fixed <canvas> elements when compiled without OpenGL\n\n - [QTBUG-63266, QTBUG-64436] Fixed that pointerType of Pointer Events was empty\n\n - [QTBUG-63606] Improved runtime disabling and clearing of HTTP cache\n\n - [QTBUG-64436] QtWebEngineWidgets: Fixed crash when exiting fullscreen mode using the context menu.\n\n - [QTBUG-64560] Fixed rendering glitches after renderProcessTerminated signal was emitted.\n\n - [QTBUG-64812] Fixed message bubble position in Hi-DPI mode\n\n - [QTBUG-64869, QTBUG-65004] Added testing for 32-bit host compiler when crossbuilding to 32-bit platforms\n\n - [QTBUG-64933] QtWebEngineWidgets: Fixed tooltips that did still show after mouse was moved away.\n\n - [QTBUG-65239] Fixed hanging of process if application is closed too fast after startup.\n\n - [QTBUG-65715] Fixed double margins when printing\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-02-26T00:00:00", "type": "nessus", "title": "Fedora 27 : qt5-qtwebengine (2018-e08d828ed9)", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15407", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2018-6031", "CVE-2018-6033", "CVE-2018-6034", "CVE-2018-6036", "CVE-2018-6037", "CVE-2018-6038", "CVE-2018-6040", "CVE-2018-6041", "CVE-2018-6042", "CVE-2018-6047", "CVE-2018-6048", "CVE-2018-6050", "CVE-2018-6051", "CVE-2018-6052", "CVE-2018-6053", "CVE-2018-6054"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:qt5-qtwebengine", "cpe:/o:fedoraproject:fedora:27"], "id": "FEDORA_2018-E08D828ED9.NASL", "href": "https://www.tenable.com/plugins/nessus/106991", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2018-e08d828ed9.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(106991);\n script_version(\"3.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2017-15407\", \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\", \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15418\", \"CVE-2017-15419\", \"CVE-2017-15422\", \"CVE-2017-15423\", \"CVE-2017-15424\", \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2018-6031\", \"CVE-2018-6033\", \"CVE-2018-6034\", \"CVE-2018-6036\", \"CVE-2018-6037\", \"CVE-2018-6038\", \"CVE-2018-6040\", \"CVE-2018-6041\", \"CVE-2018-6042\", \"CVE-2018-6047\", \"CVE-2018-6048\", \"CVE-2018-6050\", \"CVE-2018-6051\", \"CVE-2018-6052\", \"CVE-2018-6053\", \"CVE-2018-6054\");\n script_xref(name:\"FEDORA\", value:\"2018-e08d828ed9\");\n\n script_name(english:\"Fedora 27 : qt5-qtwebengine (2018-e08d828ed9)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update updates QtWebEngine to the 5.10.1 bugfix and security\nrelease. QtWebEngine 5.10.1 is part of the Qt 5.10.1 release, but only\nthe QtWebEngine component is included in this update.\n\nThis update includes :\n\n - Security fixes from Chromium up to version\n 64.0.3282.140. Including: CVE-2017-15407,\n CVE-2017-15409, CVE-2017-15410, CVE-2017-15411,\n CVE-2017-15415, CVE-2017-15416, CVE-2017-15418,\n CVE-2017-15419, CVE-2017-15422, CVE-2017-15423,\n CVE-2017-15424, CVE-2017-15425, CVE-2017-15426,\n CVE-2018-6031, CVE-2018-6033, CVE-2018-6034,\n CVE-2018-6036, CVE-2018-6037, CVE-2018-6038,\n CVE-2018-6040, CVE-2018-6041, CVE-2018-6042,\n CVE-2018-6047, CVE-2018-6048, CVE-2018-6050,\n CVE-2018-6051, CVE-2018-6052, CVE-2018-6053 and\n CVE-2018-6054.\n\n - Mitigations for SPECTRE: disabled shared-buffers, added\n cryptographic noise to precision timers\n\n - [QTBUG-47206] Fixed incorrect layouting due to bug in\n HTML5 viewport support.\n\n - [QTBUG-47945, QTBUG-65647] Fixed random crashes on exit\n\n - [QTBUG-57206] Fixed regression in viewport handling in\n embedded mode\n\n - [QTBUG-58400] Improved memory usage when printing\n\n - [QTBUG-63867] Fixed <canvas> elements when compiled\n without OpenGL\n\n - [QTBUG-63266, QTBUG-64436] Fixed that pointerType of\n Pointer Events was empty\n\n - [QTBUG-63606] Improved runtime disabling and clearing of\n HTTP cache\n\n - [QTBUG-64436] QtWebEngineWidgets: Fixed crash when\n exiting fullscreen mode using the context menu.\n\n - [QTBUG-64560] Fixed rendering glitches after\n renderProcessTerminated signal was emitted.\n\n - [QTBUG-64812] Fixed message bubble position in Hi-DPI\n mode\n\n - [QTBUG-64869, QTBUG-65004] Added testing for 32-bit host\n compiler when crossbuilding to 32-bit platforms\n\n - [QTBUG-64933] QtWebEngineWidgets: Fixed tooltips that\n did still show after mouse was moved away.\n\n - [QTBUG-65239] Fixed hanging of process if application is\n closed too fast after startup.\n\n - [QTBUG-65715] Fixed double margins when printing\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2018-e08d828ed9\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected qt5-qtwebengine package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt5-qtwebengine\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:27\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/08/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/02/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/02/26\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^27([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 27\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC27\", reference:\"qt5-qtwebengine-5.10.1-1.fc27\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"qt5-qtwebengine\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-02-05T14:16:54", "description": "This update updates QtWebEngine to the 5.10.1 bugfix and security release. QtWebEngine 5.10.1 is part of the Qt 5.10.1 release, but only the QtWebEngine component is included in this update.\n\nThis update includes :\n\n - Security fixes from Chromium up to version 64.0.3282.140. Including: CVE-2017-15407, CVE-2017-15409, CVE-2017-15410, CVE-2017-15411, CVE-2017-15415, CVE-2017-15416, CVE-2017-15418, CVE-2017-15419, CVE-2017-15422, CVE-2017-15423, CVE-2017-15424, CVE-2017-15425, CVE-2017-15426, CVE-2018-6031, CVE-2018-6033, CVE-2018-6034, CVE-2018-6036, CVE-2018-6037, CVE-2018-6038, CVE-2018-6040, CVE-2018-6041, CVE-2018-6042, CVE-2018-6047, CVE-2018-6048, CVE-2018-6050, CVE-2018-6051, CVE-2018-6052, CVE-2018-6053 and CVE-2018-6054.\n\n - Mitigations for SPECTRE: disabled shared-buffers, added cryptographic noise to precision timers\n\n - [QTBUG-47206] Fixed incorrect layouting due to bug in HTML5 viewport support.\n\n - [QTBUG-47945, QTBUG-65647] Fixed random crashes on exit\n\n - [QTBUG-57206] Fixed regression in viewport handling in embedded mode\n\n - [QTBUG-58400] Improved memory usage when printing\n\n - [QTBUG-63867] Fixed <canvas> elements when compiled without OpenGL\n\n - [QTBUG-63266, QTBUG-64436] Fixed that pointerType of Pointer Events was empty\n\n - [QTBUG-63606] Improved runtime disabling and clearing of HTTP cache\n\n - [QTBUG-64436] QtWebEngineWidgets: Fixed crash when exiting fullscreen mode using the context menu.\n\n - [QTBUG-64560] Fixed rendering glitches after renderProcessTerminated signal was emitted.\n\n - [QTBUG-64812] Fixed message bubble position in Hi-DPI mode\n\n - [QTBUG-64869, QTBUG-65004] Added testing for 32-bit host compiler when crossbuilding to 32-bit platforms\n\n - [QTBUG-64933] QtWebEngineWidgets: Fixed tooltips that did still show after mouse was moved away.\n\n - [QTBUG-65239] Fixed hanging of process if application is closed too fast after startup.\n\n - [QTBUG-65715] Fixed double margins when printing\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-02-28T00:00:00", "type": "nessus", "title": "Fedora 26 : qt5-qtwebengine (2018-c0d3db441f)", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15407", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2018-6031", "CVE-2018-6033", "CVE-2018-6034", "CVE-2018-6036", "CVE-2018-6037", "CVE-2018-6038", "CVE-2018-6040", "CVE-2018-6041", "CVE-2018-6042", "CVE-2018-6047", "CVE-2018-6048", "CVE-2018-6050", "CVE-2018-6051", "CVE-2018-6052", "CVE-2018-6053", "CVE-2018-6054"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:qt5-qtwebengine", "cpe:/o:fedoraproject:fedora:26"], "id": "FEDORA_2018-C0D3DB441F.NASL", "href": "https://www.tenable.com/plugins/nessus/107035", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2018-c0d3db441f.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(107035);\n script_version(\"3.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2017-15407\", \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\", \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15418\", \"CVE-2017-15419\", \"CVE-2017-15422\", \"CVE-2017-15423\", \"CVE-2017-15424\", \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2018-6031\", \"CVE-2018-6033\", \"CVE-2018-6034\", \"CVE-2018-6036\", \"CVE-2018-6037\", \"CVE-2018-6038\", \"CVE-2018-6040\", \"CVE-2018-6041\", \"CVE-2018-6042\", \"CVE-2018-6047\", \"CVE-2018-6048\", \"CVE-2018-6050\", \"CVE-2018-6051\", \"CVE-2018-6052\", \"CVE-2018-6053\", \"CVE-2018-6054\");\n script_xref(name:\"FEDORA\", value:\"2018-c0d3db441f\");\n\n script_name(english:\"Fedora 26 : qt5-qtwebengine (2018-c0d3db441f)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update updates QtWebEngine to the 5.10.1 bugfix and security\nrelease. QtWebEngine 5.10.1 is part of the Qt 5.10.1 release, but only\nthe QtWebEngine component is included in this update.\n\nThis update includes :\n\n - Security fixes from Chromium up to version\n 64.0.3282.140. Including: CVE-2017-15407,\n CVE-2017-15409, CVE-2017-15410, CVE-2017-15411,\n CVE-2017-15415, CVE-2017-15416, CVE-2017-15418,\n CVE-2017-15419, CVE-2017-15422, CVE-2017-15423,\n CVE-2017-15424, CVE-2017-15425, CVE-2017-15426,\n CVE-2018-6031, CVE-2018-6033, CVE-2018-6034,\n CVE-2018-6036, CVE-2018-6037, CVE-2018-6038,\n CVE-2018-6040, CVE-2018-6041, CVE-2018-6042,\n CVE-2018-6047, CVE-2018-6048, CVE-2018-6050,\n CVE-2018-6051, CVE-2018-6052, CVE-2018-6053 and\n CVE-2018-6054.\n\n - Mitigations for SPECTRE: disabled shared-buffers, added\n cryptographic noise to precision timers\n\n - [QTBUG-47206] Fixed incorrect layouting due to bug in\n HTML5 viewport support.\n\n - [QTBUG-47945, QTBUG-65647] Fixed random crashes on exit\n\n - [QTBUG-57206] Fixed regression in viewport handling in\n embedded mode\n\n - [QTBUG-58400] Improved memory usage when printing\n\n - [QTBUG-63867] Fixed <canvas> elements when compiled\n without OpenGL\n\n - [QTBUG-63266, QTBUG-64436] Fixed that pointerType of\n Pointer Events was empty\n\n - [QTBUG-63606] Improved runtime disabling and clearing of\n HTTP cache\n\n - [QTBUG-64436] QtWebEngineWidgets: Fixed crash when\n exiting fullscreen mode using the context menu.\n\n - [QTBUG-64560] Fixed rendering glitches after\n renderProcessTerminated signal was emitted.\n\n - [QTBUG-64812] Fixed message bubble position in Hi-DPI\n mode\n\n - [QTBUG-64869, QTBUG-65004] Added testing for 32-bit host\n compiler when crossbuilding to 32-bit platforms\n\n - [QTBUG-64933] QtWebEngineWidgets: Fixed tooltips that\n did still show after mouse was moved away.\n\n - [QTBUG-65239] Fixed hanging of process if application is\n closed too fast after startup.\n\n - [QTBUG-65715] Fixed double margins when printing\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2018-c0d3db441f\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected qt5-qtwebengine package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt5-qtwebengine\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:26\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/08/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/02/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/02/28\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^26([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 26\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC26\", reference:\"qt5-qtwebengine-5.10.1-1.fc26\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"qt5-qtwebengine\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-02-03T14:34:33", "description": "Update to Chromium 65. For EPEL7, it has been a long time since a successful build has been possible, so this will fix a LOT of CVEs.\n\nCVE-2017-15396 CVE-2017-15407 CVE-2017-15408 CVE-2017-15409 CVE-2017-15410 CVE-2017-15411 CVE-2017-15412 CVE-2017-15413 CVE-2017-15415 CVE-2017-15416 CVE-2017-15417 CVE-2017-15418 CVE-2017-15419 CVE-2017-15420 CVE-2017-15422 CVE-2018-6056 CVE-2018-6406 CVE-2018-6057 CVE-2018-6058 CVE-2018-6059 CVE-2018-6060 CVE-2018-6061 CVE-2018-6062 CVE-2018-6063 CVE-2018-6064 CVE-2018-6065 CVE-2018-6066 CVE-2018-6067 CVE-2018-6068 CVE-2018-6069 CVE-2018-6070 CVE-2018-6071\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-03-28T00:00:00", "type": "nessus", "title": "Fedora 27 : chromium (2018-faff5f661e)", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15396", "CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427", "CVE-2018-6056", "CVE-2018-6057", "CVE-2018-6058", "CVE-2018-6059", "CVE-2018-6060", "CVE-2018-6061", "CVE-2018-6062", "CVE-2018-6063", "CVE-2018-6064", "CVE-2018-6065", "CVE-2018-6066", "CVE-2018-6067", "CVE-2018-6068", "CVE-2018-6069", "CVE-2018-6070", "CVE-2018-6071", "CVE-2018-6072", "CVE-2018-6073", "CVE-2018-6074", "CVE-2018-6075", "CVE-2018-6076", "CVE-2018-6077", "CVE-2018-6078", "CVE-2018-6079", "CVE-2018-6080", "CVE-2018-6081", "CVE-2018-6082", "CVE-2018-6083", "CVE-2018-6406"], "modified": "2022-06-08T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:chromium", "cpe:/o:fedoraproject:fedora:27"], "id": "FEDORA_2018-FAFF5F661E.NASL", "href": "https://www.tenable.com/plugins/nessus/108679", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2018-faff5f661e.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(108679);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/06/08\");\n\n script_cve_id(\n \"CVE-2017-15396\",\n \"CVE-2017-15407\",\n \"CVE-2017-15408\",\n \"CVE-2017-15409\",\n \"CVE-2017-15410\",\n \"CVE-2017-15411\",\n \"CVE-2017-15412\",\n \"CVE-2017-15413\",\n \"CVE-2017-15415\",\n \"CVE-2017-15416\",\n \"CVE-2017-15417\",\n \"CVE-2017-15418\",\n \"CVE-2017-15419\",\n \"CVE-2017-15420\",\n \"CVE-2017-15422\",\n \"CVE-2017-15423\",\n \"CVE-2017-15424\",\n \"CVE-2017-15425\",\n \"CVE-2017-15426\",\n \"CVE-2017-15427\",\n \"CVE-2018-6056\",\n \"CVE-2018-6057\",\n \"CVE-2018-6058\",\n \"CVE-2018-6059\",\n \"CVE-2018-6060\",\n \"CVE-2018-6061\",\n \"CVE-2018-6062\",\n \"CVE-2018-6063\",\n \"CVE-2018-6064\",\n \"CVE-2018-6065\",\n \"CVE-2018-6066\",\n \"CVE-2018-6067\",\n \"CVE-2018-6068\",\n \"CVE-2018-6069\",\n \"CVE-2018-6070\",\n \"CVE-2018-6071\",\n \"CVE-2018-6072\",\n \"CVE-2018-6073\",\n \"CVE-2018-6074\",\n \"CVE-2018-6075\",\n \"CVE-2018-6076\",\n \"CVE-2018-6077\",\n \"CVE-2018-6078\",\n \"CVE-2018-6079\",\n \"CVE-2018-6080\",\n \"CVE-2018-6081\",\n \"CVE-2018-6082\",\n \"CVE-2018-6083\",\n \"CVE-2018-6406\"\n );\n script_xref(name:\"FEDORA\", value:\"2018-faff5f661e\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/06/22\");\n\n script_name(english:\"Fedora 27 : chromium (2018-faff5f661e)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Fedora host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"Update to Chromium 65. For EPEL7, it has been a long time since a\nsuccessful build has been possible, so this will fix a LOT of CVEs.\n\nCVE-2017-15396 CVE-2017-15407 CVE-2017-15408 CVE-2017-15409\nCVE-2017-15410 CVE-2017-15411 CVE-2017-15412 CVE-2017-15413\nCVE-2017-15415 CVE-2017-15416 CVE-2017-15417 CVE-2017-15418\nCVE-2017-15419 CVE-2017-15420 CVE-2017-15422 CVE-2018-6056\nCVE-2018-6406 CVE-2018-6057 CVE-2018-6058 CVE-2018-6059 CVE-2018-6060\nCVE-2018-6061 CVE-2018-6062 CVE-2018-6063 CVE-2018-6064 CVE-2018-6065\nCVE-2018-6066 CVE-2018-6067 CVE-2018-6068 CVE-2018-6069 CVE-2018-6070\nCVE-2018-6071\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2018-faff5f661e\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected chromium package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/01/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/03/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/03/28\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:27\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Fedora Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^27([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 27\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC27\", reference:\"chromium-65.0.3325.181-1.fc27\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromium\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-02-03T14:45:24", "description": "Update to Chromium 65. For EPEL7, it has been a long time since a successful build has been possible, so this will fix a LOT of CVEs.\n\nCVE-2017-15396 CVE-2017-15407 CVE-2017-15408 CVE-2017-15409 CVE-2017-15410 CVE-2017-15411 CVE-2017-15412 CVE-2017-15413 CVE-2017-15415 CVE-2017-15416 CVE-2017-15417 CVE-2017-15418 CVE-2017-15419 CVE-2017-15420 CVE-2017-15422 CVE-2018-6056 CVE-2018-6406 CVE-2018-6057 CVE-2018-6058 CVE-2018-6059 CVE-2018-6060 CVE-2018-6061 CVE-2018-6062 CVE-2018-6063 CVE-2018-6064 CVE-2018-6065 CVE-2018-6066 CVE-2018-6067 CVE-2018-6068 CVE-2018-6069 CVE-2018-6070 CVE-2018-6071\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2019-01-03T00:00:00", "type": "nessus", "title": "Fedora 28 : chromium (2018-aafdbb5554)", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15396", "CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427", "CVE-2018-6056", "CVE-2018-6057", "CVE-2018-6058", "CVE-2018-6059", "CVE-2018-6060", "CVE-2018-6061", "CVE-2018-6062", "CVE-2018-6063", "CVE-2018-6064", "CVE-2018-6065", "CVE-2018-6066", "CVE-2018-6067", "CVE-2018-6068", "CVE-2018-6069", "CVE-2018-6070", "CVE-2018-6071", "CVE-2018-6072", "CVE-2018-6073", "CVE-2018-6074", "CVE-2018-6075", "CVE-2018-6076", "CVE-2018-6077", "CVE-2018-6078", "CVE-2018-6079", "CVE-2018-6080", "CVE-2018-6081", "CVE-2018-6082", "CVE-2018-6083", "CVE-2018-6406"], "modified": "2022-06-08T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:chromium", "cpe:/o:fedoraproject:fedora:28"], "id": "FEDORA_2018-AAFDBB5554.NASL", "href": "https://www.tenable.com/plugins/nessus/120695", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2018-aafdbb5554.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(120695);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/06/08\");\n\n script_cve_id(\n \"CVE-2017-15396\",\n \"CVE-2017-15407\",\n \"CVE-2017-15408\",\n \"CVE-2017-15409\",\n \"CVE-2017-15410\",\n \"CVE-2017-15411\",\n \"CVE-2017-15412\",\n \"CVE-2017-15413\",\n \"CVE-2017-15415\",\n \"CVE-2017-15416\",\n \"CVE-2017-15417\",\n \"CVE-2017-15418\",\n \"CVE-2017-15419\",\n \"CVE-2017-15420\",\n \"CVE-2017-15422\",\n \"CVE-2017-15423\",\n \"CVE-2017-15424\",\n \"CVE-2017-15425\",\n \"CVE-2017-15426\",\n \"CVE-2017-15427\",\n \"CVE-2018-6056\",\n \"CVE-2018-6057\",\n \"CVE-2018-6058\",\n \"CVE-2018-6059\",\n \"CVE-2018-6060\",\n \"CVE-2018-6061\",\n \"CVE-2018-6062\",\n \"CVE-2018-6063\",\n \"CVE-2018-6064\",\n \"CVE-2018-6065\",\n \"CVE-2018-6066\",\n \"CVE-2018-6067\",\n \"CVE-2018-6068\",\n \"CVE-2018-6069\",\n \"CVE-2018-6070\",\n \"CVE-2018-6071\",\n \"CVE-2018-6072\",\n \"CVE-2018-6073\",\n \"CVE-2018-6074\",\n \"CVE-2018-6075\",\n \"CVE-2018-6076\",\n \"CVE-2018-6077\",\n \"CVE-2018-6078\",\n \"CVE-2018-6079\",\n \"CVE-2018-6080\",\n \"CVE-2018-6081\",\n \"CVE-2018-6082\",\n \"CVE-2018-6083\",\n \"CVE-2018-6406\"\n );\n script_xref(name:\"FEDORA\", value:\"2018-aafdbb5554\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/06/22\");\n\n script_name(english:\"Fedora 28 : chromium (2018-aafdbb5554)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Fedora host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"Update to Chromium 65. For EPEL7, it has been a long time since a\nsuccessful build has been possible, so this will fix a LOT of CVEs.\n\nCVE-2017-15396 CVE-2017-15407 CVE-2017-15408 CVE-2017-15409\nCVE-2017-15410 CVE-2017-15411 CVE-2017-15412 CVE-2017-15413\nCVE-2017-15415 CVE-2017-15416 CVE-2017-15417 CVE-2017-15418\nCVE-2017-15419 CVE-2017-15420 CVE-2017-15422 CVE-2018-6056\nCVE-2018-6406 CVE-2018-6057 CVE-2018-6058 CVE-2018-6059 CVE-2018-6060\nCVE-2018-6061 CVE-2018-6062 CVE-2018-6063 CVE-2018-6064 CVE-2018-6065\nCVE-2018-6066 CVE-2018-6067 CVE-2018-6068 CVE-2018-6069 CVE-2018-6070\nCVE-2018-6071\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2018-aafdbb5554\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected chromium package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/01/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/03/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/01/03\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:28\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Fedora Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^28([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 28\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC28\", reference:\"chromium-65.0.3325.181-1.fc28\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromium\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-02-17T15:10:54", "description": "The version of Google Chrome installed on the remote host is prior to 63.0.3239.84, and is affected by multiple vulnerabilities :\n\n - An out-of-bounds read flaw exists in the 'StoreFrame()' function in 'demux/demux.c' that is triggered when handling animated WebP images with small frames. This may allow a context-dependent attacker to crash a process linked against the library or potentially disclose memory contents.\n - A flaw exists related to cache storage. This may allow a context-dependent attacker to disclose service worker response sizes.\n - An out-of-bounds read flaw exists that is triggered when rendering the P4_INTARRAY argument to the OP_IntegrityCk opcode in the output of EXPLAIN. This may allow a context-dependent attacker to crash a process linked against the library or potentially disclose memory contents.\n - An out-of-bounds read flaw exists in 'net/dns/dns_transaction.cc' that is triggered when handling asynchronous DNS exchanges. With specially crafted DNS responses, a context-dependent attacker can potentially disclose memory contents.\n - A flaw exists in the 'PreParser::RewriteCatchPattern()' function in 'parsing/preparser.h' that is triggered as catch variables are not properly handled during block function hoisting. This may allow a context-dependent attacker to potentially execute arbitrary code.\n - A flaw exists in the 'MediaElementEventListener::handleEvent()' function in 'modules/mediacapturefromelement/HTMLMediaElementCapture.cpp' that is triggered when handling media streams. This may allow a context-dependent attacker to potentially execute arbitrary code.\n - A flaw exists that is triggered when handling calls to the 'Reflect.'construct'()' JavaScript method. This may allow a context-dependent attacker to potentially execute arbitrary code.\n - A flaw exists in 'chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java' and 'chrome/android/java/src/org/chromium/chrome/browser/toolbar/ToolbarPhone.java' that is triggered when handling omnibox URL eliding / positioning. This may allow a context-dependent attacker to conduct a spoofing attack.\n - A type confusion flaw exists in the 'TranslatedState::CapturedObjectMaterializer()' function in 'deoptimizer.cc' that is triggered when mutable heap numbers are used in an object field. This may allow a context-dependent attacker to potentially execute arbitrary code.\n - A flaw exists in 'chrome/browser/resources/chromeos/login/oobe_screen_terms_of_service.js' that is triggered as content from the web is loaded within the privileged WebUI process when displaying the Terms of Service text. This may allow a context-dependent attacker to potentially execute code with elevated privileges.\n - An overflow condition exists in the 'InputScalesValid()' function in 'browser/themes/browser_theme_pack.cc' that is triggered as certain input is not properly validated when handling browser theme packs. This may allow a context-dependent attacker to cause a buffer overflow, potentially allowing to execute arbitrary code.\n - A type confusion flaw exists in the 'AXARIAGrid::AddRow()' function in 'modules/accessibility/AXARIAGrid.cpp' that is triggered when handling table rows. This may allow a context-dependent attacker to execute arbitrary code.\n - An overflow condition exists in 'core/fxcodec/codec/fx_codec_jpx_opj.cpp' that is triggered as improper allocate and free functions of OpenJPEG are used. This may allow a context-dependent attacker to cause a heap-based buffer overflow, potentially allowing to execute arbitrary code.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-08-23T00:00:00", "type": "nessus", "title": "Google Chrome < 63.0.3239.84 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15407"], "modified": "2019-03-06T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "700351.PASL", "href": "https://www.tenable.com/plugins/nnm/700351", "sourceData": "Binary data 700351.pasl", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-02-05T14:16:29", "description": "This update for chromium to 64.0.3282.119 fixes several issues.\n\nThese security issues were fixed :\n\n - CVE-2018-6031: Use after free in PDFium (boo#1077571)\n\n - CVE-2018-6032: Same origin bypass in Shared Worker (boo#1077571)\n\n - CVE-2018-6033: Race when opening downloaded files (boo#1077571)\n\n - CVE-2018-6034: Integer overflow in Blink (boo#1077571)\n\n - CVE-2018-6035: Insufficient isolation of devtools from extensions (boo#1077571)\n\n - CVE-2018-6036: Integer underflow in WebAssembly (boo#1077571)\n\n - CVE-2018-6037: Insufficient user gesture requirements in autofill (boo#1077571)\n\n - CVE-2018-6038: Heap buffer overflow in WebGL (boo#1077571)\n\n - CVE-2018-6039: XSS in DevTools (boo#1077571)\n\n - CVE-2018-6040: Content security policy bypass (boo#1077571)\n\n - CVE-2018-6041: URL spoof in Navigation (boo#1077571)\n\n - CVE-2018-6042: URL spoof in OmniBox (boo#1077571)\n\n - CVE-2018-6043: Insufficient escaping with external URL handlers (boo#1077571)\n\n - CVE-2018-6045: Insufficient isolation of devtools from extensions (boo#1077571)\n\n - CVE-2018-6046: Insufficient isolation of devtools from extensions (boo#1077571)\n\n - CVE-2018-6047: Cross origin URL leak in WebGL (boo#1077571)\n\n - CVE-2018-6048: Referrer policy bypass in Blink (boo#1077571)\n\n - CVE-2017-15420: URL spoofing in Omnibox (boo#1077571)\n\n - CVE-2018-6049: UI spoof in Permissions (boo#1077571)\n\n - CVE-2018-6050: URL spoof in OmniBox (boo#1077571)\n\n - CVE-2018-6051: Referrer leak in XSS Auditor (boo#1077571)\n\n - CVE-2018-6052: Incomplete no-referrer policy implementation (boo#1077571)\n\n - CVE-2018-6053: Leak of page thumbnails in New Tab Page (boo#1077571)\n\n - CVE-2018-6054: Use after free in WebUI (boo#1077571)\n\nRe was updated to version 2018-01-01 (boo#1073323)", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-01-29T00:00:00", "type": "nessus", "title": "openSUSE Security Update : chromium (openSUSE-2018-103)", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15420", "CVE-2018-6031", "CVE-2018-6032", "CVE-2018-6033", "CVE-2018-6034", "CVE-2018-6035", "CVE-2018-6036", "CVE-2018-6037", "CVE-2018-6038", "CVE-2018-6039", "CVE-2018-6040", "CVE-2018-6041", "CVE-2018-6042", "CVE-2018-6043", "CVE-2018-6045", "CVE-2018-6046", "CVE-2018-6047", "CVE-2018-6048", "CVE-2018-6049", "CVE-2018-6050", "CVE-2018-6051", "CVE-2018-6052", "CVE-2018-6053", "CVE-2018-6054"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:chromedriver", "p-cpe:/a:novell:opensuse:chromedriver-debuginfo", "p-cpe:/a:novell:opensuse:chromium", "p-cpe:/a:novell:opensuse:chromium-debuginfo", "p-cpe:/a:novell:opensuse:chromium-debugsource", "p-cpe:/a:novell:opensuse:libre2-0", "p-cpe:/a:novell:opensuse:libre2-0-32bit", "p-cpe:/a:novell:opensuse:libre2-0-debuginfo", "p-cpe:/a:novell:opensuse:libre2-0-debuginfo-32bit", "p-cpe:/a:novell:opensuse:re2-debugsource", "p-cpe:/a:novell:opensuse:re2-devel", "cpe:/o:novell:opensuse:42.3"], "id": "OPENSUSE-2018-103.NASL", "href": "https://www.tenable.com/plugins/nessus/106432", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2018-103.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(106432);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2017-15420\", \"CVE-2018-6031\", \"CVE-2018-6032\", \"CVE-2018-6033\", \"CVE-2018-6034\", \"CVE-2018-6035\", \"CVE-2018-6036\", \"CVE-2018-6037\", \"CVE-2018-6038\", \"CVE-2018-6039\", \"CVE-2018-6040\", \"CVE-2018-6041\", \"CVE-2018-6042\", \"CVE-2018-6043\", \"CVE-2018-6045\", \"CVE-2018-6046\", \"CVE-2018-6047\", \"CVE-2018-6048\", \"CVE-2018-6049\", \"CVE-2018-6050\", \"CVE-2018-6051\", \"CVE-2018-6052\", \"CVE-2018-6053\", \"CVE-2018-6054\");\n\n script_name(english:\"openSUSE Security Update : chromium (openSUSE-2018-103)\");\n script_summary(english:\"Check for the openSUSE-2018-103 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for chromium to 64.0.3282.119 fixes several issues.\n\nThese security issues were fixed :\n\n - CVE-2018-6031: Use after free in PDFium (boo#1077571)\n\n - CVE-2018-6032: Same origin bypass in Shared Worker\n (boo#1077571)\n\n - CVE-2018-6033: Race when opening downloaded files\n (boo#1077571)\n\n - CVE-2018-6034: Integer overflow in Blink (boo#1077571)\n\n - CVE-2018-6035: Insufficient isolation of devtools from\n extensions (boo#1077571)\n\n - CVE-2018-6036: Integer underflow in WebAssembly\n (boo#1077571)\n\n - CVE-2018-6037: Insufficient user gesture requirements in\n autofill (boo#1077571)\n\n - CVE-2018-6038: Heap buffer overflow in WebGL\n (boo#1077571)\n\n - CVE-2018-6039: XSS in DevTools (boo#1077571)\n\n - CVE-2018-6040: Content security policy bypass\n (boo#1077571)\n\n - CVE-2018-6041: URL spoof in Navigation (boo#1077571)\n\n - CVE-2018-6042: URL spoof in OmniBox (boo#1077571)\n\n - CVE-2018-6043: Insufficient escaping with external URL\n handlers (boo#1077571)\n\n - CVE-2018-6045: Insufficient isolation of devtools from\n extensions (boo#1077571)\n\n - CVE-2018-6046: Insufficient isolation of devtools from\n extensions (boo#1077571)\n\n - CVE-2018-6047: Cross origin URL leak in WebGL\n (boo#1077571)\n\n - CVE-2018-6048: Referrer policy bypass in Blink\n (boo#1077571)\n\n - CVE-2017-15420: URL spoofing in Omnibox (boo#1077571)\n\n - CVE-2018-6049: UI spoof in Permissions (boo#1077571)\n\n - CVE-2018-6050: URL spoof in OmniBox (boo#1077571)\n\n - CVE-2018-6051: Referrer leak in XSS Auditor\n (boo#1077571)\n\n - CVE-2018-6052: Incomplete no-referrer policy\n implementation (boo#1077571)\n\n - CVE-2018-6053: Leak of page thumbnails in New Tab Page\n (boo#1077571)\n\n - CVE-2018-6054: Use after free in WebUI (boo#1077571)\n\nRe was updated to version 2018-01-01 (boo#1073323)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1073323\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1077571\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1077722\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected chromium packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libre2-0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libre2-0-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libre2-0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libre2-0-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:re2-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:re2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/01/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/01/29\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE42\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"42.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE42.3\", reference:\"libre2-0-20180101-9.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"libre2-0-debuginfo-20180101-9.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"re2-debugsource-20180101-9.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"re2-devel-20180101-9.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", cpu:\"x86_64\", reference:\"chromedriver-64.0.3282.119-135.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", cpu:\"x86_64\", reference:\"chromedriver-debuginfo-64.0.3282.119-135.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", cpu:\"x86_64\", reference:\"chromium-64.0.3282.119-135.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", cpu:\"x86_64\", reference:\"chromium-debuginfo-64.0.3282.119-135.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", cpu:\"x86_64\", reference:\"chromium-debugsource-64.0.3282.119-135.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", cpu:\"x86_64\", reference:\"libre2-0-32bit-20180101-9.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", cpu:\"x86_64\", reference:\"libre2-0-debuginfo-32bit-20180101-9.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libre2-0 / libre2-0-32bit / libre2-0-debuginfo / etc\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-02-05T14:14:49", "description": "The version of Google Chrome installed on the remote Windows host is prior to 64.0.3282.119. It is, therefore, affected by multiple security vulnerabilities as noted in Chrome stable channel update release notes for January 24th, 2018. Please refer to the release notes for additional information.\n\nNote that Nessus has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-01-30T00:00:00", "type": "nessus", "title": "Google Chrome < 64.0.3282.119 Multiple Vulnerabilities (macOS)", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15420", "CVE-2018-6031", "CVE-2018-6032", "CVE-2018-6033", "CVE-2018-6034", "CVE-2018-6035", "CVE-2018-6036", "CVE-2018-6037", "CVE-2018-6038", "CVE-2018-6039", "CVE-2018-6040", "CVE-2018-6041", "CVE-2018-6042", "CVE-2018-6043", "CVE-2018-6045", "CVE-2018-6046", "CVE-2018-6047", "CVE-2018-6048", "CVE-2018-6049", "CVE-2018-6050", "CVE-2018-6051", "CVE-2018-6052", "CVE-2018-6053", "CVE-2018-6054"], "modified": "2019-11-08T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "MACOSX_GOOGLE_CHROME_64_0_3282_119.NASL", "href": "https://www.tenable.com/plugins/nessus/106486", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(106486);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/11/08\");\n\n script_cve_id(\n \"CVE-2017-15420\",\n \"CVE-2018-6031\",\n \"CVE-2018-6032\",\n \"CVE-2018-6033\",\n \"CVE-2018-6034\",\n \"CVE-2018-6035\",\n \"CVE-2018-6036\",\n \"CVE-2018-6037\",\n \"CVE-2018-6038\",\n \"CVE-2018-6039\",\n \"CVE-2018-6040\",\n \"CVE-2018-6041\",\n \"CVE-2018-6042\",\n \"CVE-2018-6043\",\n \"CVE-2018-6045\",\n \"CVE-2018-6046\",\n \"CVE-2018-6047\",\n \"CVE-2018-6048\",\n \"CVE-2018-6049\",\n \"CVE-2018-6050\",\n \"CVE-2018-6051\",\n \"CVE-2018-6052\",\n \"CVE-2018-6053\",\n \"CVE-2018-6054\"\n );\n script_bugtraq_id(102098);\n\n script_name(english:\"Google Chrome < 64.0.3282.119 Multiple Vulnerabilities (macOS)\");\n script_summary(english:\"Checks the version of Google Chrome.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A web browser installed on the remote Windows host is affected by\nmultiple security vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote Windows host is\nprior to 64.0.3282.119. It is, therefore, affected by multiple\nsecurity vulnerabilities as noted in Chrome stable channel update\nrelease notes for January 24th, 2018. Please refer to the\nrelease notes for additional information.\n\nNote that Nessus has not attempted to exploit these issues but has\ninstead relied only on the application's self-reported version number.\");\n # https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?26e44d0b\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome version 64.0.3282.119 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-6054\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/01/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/01/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/01/30\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_google_chrome_installed.nbin\");\n script_require_keys(\"MacOSX/Google Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"MacOSX/Google Chrome/Installed\");\n\ngoogle_chrome_check_version(fix:'64.0.3282.119', severity:SECURITY_WARNING);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-02-06T14:16:38", "description": "Several vulnerabilities have been discovered in the chromium web browser.\n\n - CVE-2017-15420 Drew Springall discovered a URL spoofing issue.\n\n - CVE-2017-15429 A cross-site scripting issue was discovered in the v8 JavaScript library.\n\n - CVE-2018-6031 A use-after-free issue was discovered in the pdfium library.\n\n - CVE-2018-6032 Jun Kokatsu discovered a way to bypass the same origin policy.\n\n - CVE-2018-6033 Juho Nurminen discovered a race condition when opening downloaded files.\n\n - CVE-2018-6034 Tobias Klein discovered an integer overflow issue.\n\n - CVE-2018-6035 Rob Wu discovered a way for extensions to access devtools.\n\n - CVE-2018-6036 UK's National Cyber Security Centre discovered an integer overflow issue.\n\n - CVE-2018-6037 Paul Stone discovered an issue in the autofill feature.\n\n - CVE-2018-6038 cloudfuzzer discovered a buffer overflow issue.\n\n - CVE-2018-6039 Juho Nurminen discovered a cross-site scripting issue in the developer tools.\n\n - CVE-2018-6040 WenXu Wu discovered a way to bypass the content security policy.\n\n - CVE-2018-6041 Luan Herrera discovered a URL spoofing issue.\n\n - CVE-2018-6042 Khalil Zhani discovered a URL spoofing issue.\n\n - CVE-2018-6043 A character escaping issue was discovered.\n\n - CVE-2018-6045 Rob Wu discovered a way for extensions to access devtools.\n\n - CVE-2018-6046 Rob Wu discovered a way for extensions to access devtools.\n\n - CVE-2018-6047 Masato Kinugawa discovered an information leak issue.\n\n - CVE-2018-6048 Jun Kokatsu discovered a way to bypass the referrer policy.\n\n - CVE-2018-6049 WenXu Wu discovered a user interface spoofing issue.\n\n - CVE-2018-6050 Jonathan Kew discovered a URL spoofing issue.\n\n - CVE-2018-6051 Antonio Sanso discovered an information leak issue.\n\n - CVE-2018-6052 Tanner Emek discovered that the referrer policy implementation was incomplete.\n\n - CVE-2018-6053 Asset Kabdenov discovered an information leak issue.\n\n - CVE-2018-6054 Rob Wu discovered a use-after-free issue.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-02-01T00:00:00", "type": "nessus", "title": "Debian DSA-4103-1 : chromium-browser - security update", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15420", "CVE-2017-15429", "CVE-2018-6031", "CVE-2018-6032", "CVE-2018-6033", "CVE-2018-6034", "CVE-2018-6035", "CVE-2018-6036", "CVE-2018-6037", "CVE-2018-6038", "CVE-2018-6039", "CVE-2018-6040", "CVE-2018-6041", "CVE-2018-6042", "CVE-2018-6043", "CVE-2018-6045", "CVE-2018-6046", "CVE-2018-6047", "CVE-2018-6048", "CVE-2018-6049", "CVE-2018-6050", "CVE-2018-6051", "CVE-2018-6052", "CVE-2018-6053", "CVE-2018-6054"], "modified": "2019-07-15T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:chromium-browser", "cpe:/o:debian:debian_linux:9.0"], "id": "DEBIAN_DSA-4103.NASL", "href": "https://www.tenable.com/plugins/nessus/106537", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-4103. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(106537);\n script_version(\"3.8\");\n script_cvs_date(\"Date: 2019/07/15 14:20:30\");\n\n script_cve_id(\"CVE-2017-15420\", \"CVE-2017-15429\", \"CVE-2018-6031\", \"CVE-2018-6032\", \"CVE-2018-6033\", \"CVE-2018-6034\", \"CVE-2018-6035\", \"CVE-2018-6036\", \"CVE-2018-6037\", \"CVE-2018-6038\", \"CVE-2018-6039\", \"CVE-2018-6040\", \"CVE-2018-6041\", \"CVE-2018-6042\", \"CVE-2018-6043\", \"CVE-2018-6045\", \"CVE-2018-6046\", \"CVE-2018-6047\", \"CVE-2018-6048\", \"CVE-2018-6049\", \"CVE-2018-6050\", \"CVE-2018-6051\", \"CVE-2018-6052\", \"CVE-2018-6053\", \"CVE-2018-6054\");\n script_xref(name:\"DSA\", value:\"4103\");\n\n script_name(english:\"Debian DSA-4103-1 : chromium-browser - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities have been discovered in the chromium web\nbrowser.\n\n - CVE-2017-15420\n Drew Springall discovered a URL spoofing issue.\n\n - CVE-2017-15429\n A cross-site scripting issue was discovered in the v8\n JavaScript library.\n\n - CVE-2018-6031\n A use-after-free issue was discovered in the pdfium\n library.\n\n - CVE-2018-6032\n Jun Kokatsu discovered a way to bypass the same origin\n policy.\n\n - CVE-2018-6033\n Juho Nurminen discovered a race condition when opening\n downloaded files.\n\n - CVE-2018-6034\n Tobias Klein discovered an integer overflow issue.\n\n - CVE-2018-6035\n Rob Wu discovered a way for extensions to access\n devtools.\n\n - CVE-2018-6036\n UK's National Cyber Security Centre discovered an\n integer overflow issue.\n\n - CVE-2018-6037\n Paul Stone discovered an issue in the autofill feature.\n\n - CVE-2018-6038\n cloudfuzzer discovered a buffer overflow issue.\n\n - CVE-2018-6039\n Juho Nurminen discovered a cross-site scripting issue in\n the developer tools.\n\n - CVE-2018-6040\n WenXu Wu discovered a way to bypass the content security\n policy.\n\n - CVE-2018-6041\n Luan Herrera discovered a URL spoofing issue.\n\n - CVE-2018-6042\n Khalil Zhani discovered a URL spoofing issue.\n\n - CVE-2018-6043\n A character escaping issue was discovered.\n\n - CVE-2018-6045\n Rob Wu discovered a way for extensions to access\n devtools.\n\n - CVE-2018-6046\n Rob Wu discovered a way for extensions to access\n devtools.\n\n - CVE-2018-6047\n Masato Kinugawa discovered an information leak issue.\n\n - CVE-2018-6048\n Jun Kokatsu discovered a way to bypass the referrer\n policy.\n\n - CVE-2018-6049\n WenXu Wu discovered a user interface spoofing issue.\n\n - CVE-2018-6050\n Jonathan Kew discovered a URL spoofing issue.\n\n - CVE-2018-6051\n Antonio Sanso discovered an information leak issue.\n\n - CVE-2018-6052\n Tanner Emek discovered that the referrer policy\n implementation was incomplete.\n\n - CVE-2018-6053\n Asset Kabdenov discovered an information leak issue.\n\n - CVE-2018-6054\n Rob Wu discovered a use-after-free issue.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15420\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15429\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6031\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6032\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6033\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6034\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6035\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6036\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6037\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6038\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6039\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6040\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6041\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6042\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6043\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6045\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6046\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6047\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6048\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6049\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6050\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6051\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6052\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6053\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6054\"\n );\n # https://security-tracker.debian.org/tracker/source-package/chromium-browser\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?e33901a2\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/stretch/chromium-browser\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2018/dsa-4103\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the chromium-browser packages.\n\nFor the oldstable distribution (jessie), security support for chromium\nhas been discontinued.\n\nFor the stable distribution (stretch), these problems have been fixed\nin version 64.0.3282.119-1~deb9u1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:chromium-browser\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:9.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/08/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/01/31\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/02/01\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"9.0\", prefix:\"chromedriver\", reference:\"64.0.3282.119-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"chromium\", reference:\"64.0.3282.119-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"chromium-driver\", reference:\"64.0.3282.119-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"chromium-l10n\", reference:\"64.0.3282.119-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"chromium-shell\", reference:\"64.0.3282.119-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"chromium-widevine\", reference:\"64.0.3282.119-1~deb9u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-02-05T14:16:54", "description": "Google Chrome Releases reports :\n\nSeveral security fixes in this release, including :\n\n- [780450] High CVE-2018-6031: Use after free in PDFium. Reported by Anonymous on 2017-11-01\n\n- [787103] High CVE-2018-6032: Same origin bypass in Shared Worker.\nReported by Jun Kokatsu (@shhnjk) on 2017-11-20\n\n- [793620] High CVE-2018-6033: Race when opening downloaded files.\nReported by Juho Nurminen on 2017-12-09\n\n- [784183] Medium CVE-2018-6034: Integer overflow in Blink. Reported by Tobias Klein (www.trapkit.de) on 2017-11-12\n\n- [797500] Medium CVE-2018-6035: Insufficient isolation of devtools from extensions. Reported by Rob Wu on 2017-12-23\n\n- [797500] Medium CVE-2018-6035: Insufficient isolation of devtools from extensions. Reported by Rob Wu on 2017-12-23\n\n- [753645] Medium CVE-2018-6037: Insufficient user gesture requirements in autofill. Reported by Paul Stone of Context Information Security on 2017-08-09\n\n- [774174] Medium CVE-2018-6038: Heap buffer overflow in WebGL.\nReported by cloudfuzzer on 2017-10-12\n\n- [775527] Medium CVE-2018-6039: XSS in DevTools. Reported by Juho Nurminen on 2017-10-17\n\n- [778658] Medium CVE-2018-6040: Content security policy bypass.\nReported by WenXu Wu of Tencent's Xuanwu Lab on 2017-10-26\n\n- [760342] Medium CVE-2018-6041: URL spoof in Navigation. Reported by Luan Herrera on 2017-08-29\n\n- [773930] Medium CVE-2018-6042: URL spoof in OmniBox. Reported by Khalil Zhani on 2017-10-12\n\n- [785809] Medium CVE-2018-6043: Insufficient escaping with external URL handlers. Reported by 0x09AL on 2017-11-16\n\n- [797497] Medium CVE-2018-6045: Insufficient isolation of devtools from extensions. Reported by Rob Wu on 2017-12-23\n\n- [798163] Medium CVE-2018-6046: Insufficient isolation of devtools from extensions. Reported by Rob Wu on 2017-12-31\n\n- [799847] Medium CVE-2018-6047: Cross origin URL leak in WebGL.\nReported by Masato Kinugawa on 2018-01-08\n\n- [763194] Low CVE-2018-6048: Referrer policy bypass in Blink.\nReported by Jun Kokatsu (@shhnjk) on 2017-09-08\n\n- [771848] Low CVE-2017-15420: URL spoofing in Omnibox. Reported by Drew Springall (@_aaspring_) on 2017-10-05\n\n- [774438] Low CVE-2018-6049: UI spoof in Permissions. Reported by WenXu Wu of Tencent's Xuanwu Lab on 2017-10-13\n\n- [774842] Low CVE-2018-6050: URL spoof in OmniBox. Reported by Jonathan Kew on 2017-10-15\n\n- [441275] Low CVE-2018-6051: Referrer leak in XSS Auditor. Reported by Antonio Sanso (@asanso) on 2014-12-11\n\n- [615608] Low CVE-2018-6052: Incomplete no-referrer policy implementation. Reported by Tanner Emek on 2016-05-28\n\n- [758169] Low CVE-2018-6053: Leak of page thumbnails in New Tab Page.\nReported by Asset Kabdenov on 2017-08-23\n\n- [797511] Low CVE-2018-6054: Use after free in WebUI. Reported by Rob Wu on 2017-12-24", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-02-28T00:00:00", "type": "nessus", "title": "FreeBSD : chromium -- multiple vulnerabilities (8e986b2b-1baa-11e8-a944-54ee754af08e)", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15420", "CVE-2018-6031", "CVE-2018-6032", "CVE-2018-6033", "CVE-2018-6034", "CVE-2018-6035", "CVE-2018-6036", "CVE-2018-6037", "CVE-2018-6038", "CVE-2018-6039", "CVE-2018-6040", "CVE-2018-6041", "CVE-2018-6042", "CVE-2018-6043", "CVE-2018-6045", "CVE-2018-6046", "CVE-2018-6047", "CVE-2018-6048", "CVE-2018-6049", "CVE-2018-6050", "CVE-2018-6051", "CVE-2018-6052", "CVE-2018-6053", "CVE-2018-6054"], "modified": "2019-07-10T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:chromium", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_8E986B2B1BAA11E8A94454EE754AF08E.NASL", "href": "https://www.tenable.com/plugins/nessus/107044", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2019 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(107044);\n script_version(\"3.6\");\n script_cvs_date(\"Date: 2019/07/10 16:04:13\");\n\n script_cve_id(\"CVE-2017-15420\", \"CVE-2018-6031\", \"CVE-2018-6032\", \"CVE-2018-6033\", \"CVE-2018-6034\", \"CVE-2018-6035\", \"CVE-2018-6036\", \"CVE-2018-6037\", \"CVE-2018-6038\", \"CVE-2018-6039\", \"CVE-2018-6040\", \"CVE-2018-6041\", \"CVE-2018-6042\", \"CVE-2018-6043\", \"CVE-2018-6045\", \"CVE-2018-6046\", \"CVE-2018-6047\", \"CVE-2018-6048\", \"CVE-2018-6049\", \"CVE-2018-6050\", \"CVE-2018-6051\", \"CVE-2018-6052\", \"CVE-2018-6053\", \"CVE-2018-6054\");\n\n script_name(english:\"FreeBSD : chromium -- multiple vulnerabilities (8e986b2b-1baa-11e8-a944-54ee754af08e)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Google Chrome Releases reports :\n\nSeveral security fixes in this release, including :\n\n- [780450] High CVE-2018-6031: Use after free in PDFium. Reported by\nAnonymous on 2017-11-01\n\n- [787103] High CVE-2018-6032: Same origin bypass in Shared Worker.\nReported by Jun Kokatsu (@shhnjk) on 2017-11-20\n\n- [793620] High CVE-2018-6033: Race when opening downloaded files.\nReported by Juho Nurminen on 2017-12-09\n\n- [784183] Medium CVE-2018-6034: Integer overflow in Blink. Reported\nby Tobias Klein (www.trapkit.de) on 2017-11-12\n\n- [797500] Medium CVE-2018-6035: Insufficient isolation of devtools\nfrom extensions. Reported by Rob Wu on 2017-12-23\n\n- [797500] Medium CVE-2018-6035: Insufficient isolation of devtools\nfrom extensions. Reported by Rob Wu on 2017-12-23\n\n- [753645] Medium CVE-2018-6037: Insufficient user gesture\nrequirements in autofill. Reported by Paul Stone of Context\nInformation Security on 2017-08-09\n\n- [774174] Medium CVE-2018-6038: Heap buffer overflow in WebGL.\nReported by cloudfuzzer on 2017-10-12\n\n- [775527] Medium CVE-2018-6039: XSS in DevTools. Reported by Juho\nNurminen on 2017-10-17\n\n- [778658] Medium CVE-2018-6040: Content security policy bypass.\nReported by WenXu Wu of Tencent's Xuanwu Lab on 2017-10-26\n\n- [760342] Medium CVE-2018-6041: URL spoof in Navigation. Reported by\nLuan Herrera on 2017-08-29\n\n- [773930] Medium CVE-2018-6042: URL spoof in OmniBox. Reported by\nKhalil Zhani on 2017-10-12\n\n- [785809] Medium CVE-2018-6043: Insufficient escaping with external\nURL handlers. Reported by 0x09AL on 2017-11-16\n\n- [797497] Medium CVE-2018-6045: Insufficient isolation of devtools\nfrom extensions. Reported by Rob Wu on 2017-12-23\n\n- [798163] Medium CVE-2018-6046: Insufficient isolation of devtools\nfrom extensions. Reported by Rob Wu on 2017-12-31\n\n- [799847] Medium CVE-2018-6047: Cross origin URL leak in WebGL.\nReported by Masato Kinugawa on 2018-01-08\n\n- [763194] Low CVE-2018-6048: Referrer policy bypass in Blink.\nReported by Jun Kokatsu (@shhnjk) on 2017-09-08\n\n- [771848] Low CVE-2017-15420: URL spoofing in Omnibox. Reported by\nDrew Springall (@_aaspring_) on 2017-10-05\n\n- [774438] Low CVE-2018-6049: UI spoof in Permissions. Reported by\nWenXu Wu of Tencent's Xuanwu Lab on 2017-10-13\n\n- [774842] Low CVE-2018-6050: URL spoof in OmniBox. Reported by\nJonathan Kew on 2017-10-15\n\n- [441275] Low CVE-2018-6051: Referrer leak in XSS Auditor. Reported\nby Antonio Sanso (@asanso) on 2014-12-11\n\n- [615608] Low CVE-2018-6052: Incomplete no-referrer policy\nimplementation. Reported by Tanner Emek on 2016-05-28\n\n- [758169] Low CVE-2018-6053: Leak of page thumbnails in New Tab Page.\nReported by Asset Kabdenov on 2017-08-23\n\n- [797511] Low CVE-2018-6054: Use after free in WebUI. Reported by Rob\nWu on 2017-12-24\"\n );\n # https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?26e44d0b\"\n );\n # https://vuxml.freebsd.org/freebsd/8e986b2b-1baa-11e8-a944-54ee754af08e.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?efc939e5\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/08/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/02/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/02/28\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"chromium<64.0.3282.119\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-01-11T14:36:48", "description": "The version of Google Chrome installed on the remote Windows host is prior to 64.0.3282.119. It is, therefore, affected by multiple security vulnerabilities as noted in Chrome stable channel update release notes for January 24th, 2018. Please refer to the release notes for additional information.\n\nNote that Nessus has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-01-30T00:00:00", "type": "nessus", "title": "Google Chrome < 64.0.3282.119 Multiple Vulnerabilities (Spectre)", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15420", "CVE-2017-5715", "CVE-2017-5753", "CVE-2018-6031", "CVE-2018-6032", "CVE-2018-6033", "CVE-2018-6034", "CVE-2018-6035", "CVE-2018-6036", "CVE-2018-6037", "CVE-2018-6038", "CVE-2018-6039", "CVE-2018-6040", "CVE-2018-6041", "CVE-2018-6042", "CVE-2018-6043", "CVE-2018-6045", "CVE-2018-6046", "CVE-2018-6047", "CVE-2018-6048", "CVE-2018-6049", "CVE-2018-6050", "CVE-2018-6051", "CVE-2018-6052", "CVE-2018-6053", "CVE-2018-6054"], "modified": "2022-04-11T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "GOOGLE_CHROME_64_0_3282_119.NASL", "href": "https://www.tenable.com/plugins/nessus/106485", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(106485);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/04/11\");\n\n script_cve_id(\n \"CVE-2017-5715\",\n \"CVE-2017-5753\",\n \"CVE-2017-15420\",\n \"CVE-2018-6031\",\n \"CVE-2018-6032\",\n \"CVE-2018-6033\",\n \"CVE-2018-6034\",\n \"CVE-2018-6035\",\n \"CVE-2018-6036\",\n \"CVE-2018-6037\",\n \"CVE-2018-6038\",\n \"CVE-2018-6039\",\n \"CVE-2018-6040\",\n \"CVE-2018-6041\",\n \"CVE-2018-6042\",\n \"CVE-2018-6043\",\n \"CVE-2018-6045\",\n \"CVE-2018-6046\",\n \"CVE-2018-6047\",\n \"CVE-2018-6048\",\n \"CVE-2018-6049\",\n \"CVE-2018-6050\",\n \"CVE-2018-6051\",\n \"CVE-2018-6052\",\n \"CVE-2018-6053\",\n \"CVE-2018-6054\"\n );\n script_bugtraq_id(102098);\n script_xref(name:\"IAVA\", value:\"2018-A-0020\");\n\n script_name(english:\"Google Chrome < 64.0.3282.119 Multiple Vulnerabilities (Spectre)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A web browser installed on the remote Windows host is affected by\nmultiple security vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote Windows host is\nprior to 64.0.3282.119. It is, therefore, affected by multiple\nsecurity vulnerabilities as noted in Chrome stable channel update\nrelease notes for January 24th, 2018. Please refer to the\nrelease notes for additional information.\n\nNote that Nessus has not attempted to exploit these issues but has\ninstead relied only on the application's self-reported version number.\");\n # https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?26e44d0b\");\n script_set_attribute(attribute:\"see_also\", value:\"https://spectreattack.com/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome version 64.0.3282.119 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-6054\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:\"CANVAS\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/01/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/01/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/01/30\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_set_attribute(attribute:\"thorough_tests\", value:\"true\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"google_chrome_installed.nasl\");\n script_require_keys(\"SMB/Google_Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"SMB/Google_Chrome/Installed\");\ninstalls = get_kb_list(\"SMB/Google_Chrome/*\");\n\ngoogle_chrome_check_version(installs:installs, fix:'64.0.3282.119', severity:SECURITY_WARNING);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "openvas": [{"lastseen": "2019-07-04T19:02:13", "description": "Several vulnerabilities have been discovered in the chromium web browser.\n\nCVE-2017-15407\nNed Williamson discovered an out-of-bounds write issue.\n\nCVE-2017-15408\nKe Liu discovered a heap overflow issue in the pdfium library.\n\nCVE-2017-15409\nAn out-of-bounds write issue was discovered in the skia library.\n\nCVE-2017-15410\nLuat Nguyen discovered a use-after-free issue in the pdfium library.\n\nCVE-2017-15411\nLuat Nguyen discovered a use-after-free issue in the pdfium library.\n\nCVE-2017-15413\nGaurav Dewan discovered a type confusion issue.\n\nCVE-2017-15415\nViktor Brange discovered an information disclosure issue.\n\nCVE-2017-15416\nNed Williamson discovered an out-of-bounds read issue.\n\nCVE-2017-15417\nMax May discovered an information disclosure issue in the skia\nlibrary.\n\nCVE-2017-15418\nKushal Arvind Shah discovered an uninitialized value in the skia\nlibrary.\n\nCVE-2017-15419\nJun Kokatsu discoved an information disclosure issue.\n\nCVE-2017-15420\nWenXu Wu discovered a URL spoofing issue.\n\nCVE-2017-15423\nGreg Hudson discovered an issue in the boringssl library.\n\nCVE-2017-15424\nKhalil Zhani discovered a URL spoofing issue.\n\nCVE-2017-15425\nxisigr discovered a URL spoofing issue.\n\nCVE-2017-15426\nWenXu Wu discovered a URL spoofing issue.\n\nCVE-2017-15427\nJunaid Farhan discovered an issue with the omnibox.", "cvss3": {}, "published": "2017-12-12T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 4064-1 (chromium-browser - security update)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-15417", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15427", "CVE-2017-15407", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15415", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-15420"], "modified": "2019-07-04T00:00:00", "id": "OPENVAS:1361412562310704064", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310704064", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Auto-generated from advisory DSA 4064-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2017 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License as published by\n# the Free Software Foundation; either version 2 of the License, or\n# (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.704064\");\n script_version(\"2019-07-04T09:25:28+0000\");\n script_cve_id(\"CVE-2017-15407\", \"CVE-2017-15408\", \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\", \"CVE-2017-15413\", \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15417\", \"CVE-2017-15418\", \"CVE-2017-15419\", \"CVE-2017-15420\", \"CVE-2017-15423\", \"CVE-2017-15424\", \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2017-15427\");\n script_name(\"Debian Security Advisory DSA 4064-1 (chromium-browser - security update)\");\n script_tag(name:\"last_modification\", value:\"2019-07-04 09:25:28 +0000 (Thu, 04 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2017-12-12 00:00:00 +0100 (Tue, 12 Dec 2017)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"https://www.debian.org/security/2017/dsa-4064.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2017 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB9\");\n script_tag(name:\"affected\", value:\"chromium-browser on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the stable distribution (stretch), these problems have been fixed in\nversion 63.0.3239.84-1~deb9u1.\n\nWe recommend that you upgrade your chromium-browser packages.\");\n\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/chromium-browser\");\n script_tag(name:\"summary\", value:\"Several vulnerabilities have been discovered in the chromium web browser.\n\nCVE-2017-15407\nNed Williamson discovered an out-of-bounds write issue.\n\nCVE-2017-15408\nKe Liu discovered a heap overflow issue in the pdfium library.\n\nCVE-2017-15409\nAn out-of-bounds write issue was discovered in the skia library.\n\nCVE-2017-15410\nLuat Nguyen discovered a use-after-free issue in the pdfium library.\n\nCVE-2017-15411\nLuat Nguyen discovered a use-after-free issue in the pdfium library.\n\nCVE-2017-15413\nGaurav Dewan discovered a type confusion issue.\n\nCVE-2017-15415\nViktor Brange discovered an information disclosure issue.\n\nCVE-2017-15416\nNed Williamson discovered an out-of-bounds read issue.\n\nCVE-2017-15417\nMax May discovered an information disclosure issue in the skia\nlibrary.\n\nCVE-2017-15418\nKushal Arvind Shah discovered an uninitialized value in the skia\nlibrary.\n\nCVE-2017-15419\nJun Kokatsu discoved an information disclosure issue.\n\nCVE-2017-15420\nWenXu Wu discovered a URL spoofing issue.\n\nCVE-2017-15423\nGreg Hudson discovered an issue in the boringssl library.\n\nCVE-2017-15424\nKhalil Zhani discovered a URL spoofing issue.\n\nCVE-2017-15425\nxisigr discovered a URL spoofing issue.\n\nCVE-2017-15426\nWenXu Wu discovered a URL spoofing issue.\n\nCVE-2017-15427\nJunaid Farhan discovered an issue with the omnibox.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"chromedriver\", ver:\"63.0.3239.84-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"chromium\", ver:\"63.0.3239.84-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"chromium-driver\", ver:\"63.0.3239.84-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"chromium-l10n\", ver:\"63.0.3239.84-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"chromium-shell\", ver:\"63.0.3239.84-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"chromium-widevine\", ver:\"63.0.3239.84-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-31T18:27:08", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2017-12-09T00:00:00", "type": "openvas", "title": "openSUSE: Security Advisory for chromium (openSUSE-SU-2017:3244-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-15417", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15415", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-15420"], "modified": "2020-01-31T00:00:00", "id": "OPENVAS:1361412562310851660", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310851660", "sourceData": "# Copyright (C) 2017 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.851660\");\n script_version(\"2020-01-31T08:23:39+0000\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:23:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2017-12-09 07:39:49 +0100 (Sat, 09 Dec 2017)\");\n script_cve_id(\"CVE-2017-15408\", \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\",\n \"CVE-2017-15412\", \"CVE-2017-15413\", \"CVE-2017-15415\", \"CVE-2017-15416\",\n \"CVE-2017-15417\", \"CVE-2017-15418\", \"CVE-2017-15419\", \"CVE-2017-15420\",\n \"CVE-2017-15422\", \"CVE-2017-15423\", \"CVE-2017-15424\", \"CVE-2017-15425\",\n \"CVE-2017-15426\", \"CVE-2017-15427\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"openSUSE: Security Advisory for chromium (openSUSE-SU-2017:3244-1)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'chromium'\n package(s) announced via the referenced advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"This update to Chromium 63.0.3239.84 fixes the following security issues:\n\n - CVE-2017-15408: Heap buffer overflow in PDFium\n\n - CVE-2017-15409: Out of bounds write in Skia\n\n - CVE-2017-15410: Use after free in PDFium\n\n - CVE-2017-15411: Use after free in PDFium\n\n - CVE-2017-15412: Use after free in libXML\n\n - CVE-2017-15413: Type confusion in WebAssembly\n\n - CVE-2017-15415: Pointer information disclosure in IPC call\n\n - CVE-2017-15416: Out of bounds read in Blink\n\n - CVE-2017-15417: Cross origin information disclosure in Skia\n\n - CVE-2017-15418: Use of uninitialized value in Skia\n\n - CVE-2017-15419: Cross origin leak of redirect URL in Blink\n\n - CVE-2017-15420: URL spoofing in Omnibox\n\n - CVE-2017-15422: Integer overflow in ICU\n\n - CVE-2017-15423: Issue with SPAKE implementation in BoringSSL\n\n - CVE-2017-15424: URL Spoof in Omnibox\n\n - CVE-2017-15425: URL Spoof in Omnibox\n\n - CVE-2017-15426: URL Spoof in Omnibox\n\n - CVE-2017-15427: Insufficient blocking of JavaScript in Omnibox\");\n\n script_tag(name:\"affected\", value:\"chromium on openSUSE Leap 42.3, openSUSE Leap 42.2\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2017:3244-1\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=(openSUSELeap42\\.2|openSUSELeap42\\.3)\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap42.2\") {\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver\", rpm:\"chromedriver~63.0.3239.84~104.41.1\", rls:\"openSUSELeap42.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver-debuginfo\", rpm:\"chromedriver-debuginfo~63.0.3239.84~104.41.1\", rls:\"openSUSELeap42.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium\", rpm:\"chromium~63.0.3239.84~104.41.1\", rls:\"openSUSELeap42.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debuginfo\", rpm:\"chromium-debuginfo~63.0.3239.84~104.41.1\", rls:\"openSUSELeap42.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debugsource\", rpm:\"chromium-debugsource~63.0.3239.84~104.41.1\", rls:\"openSUSELeap42.2\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"openSUSELeap42.3\") {\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver\", rpm:\"chromedriver~63.0.3239.84~127.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver-debuginfo\", rpm:\"chromedriver-debuginfo~63.0.3239.84~127.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium\", rpm:\"chromium~63.0.3239.84~127.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debuginfo\", rpm:\"chromium-debuginfo~63.0.3239.84~127.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debugsource\", rpm:\"chromium-debugsource~63.0.3239.84~127.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-19T22:09:58", "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2017-12-07T00:00:00", "type": "openvas", "title": "Google Chrome Security Updates(stable-channel-update-for-desktop-2017-12)-Windows", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-15417", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15407", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15415", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15430", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-15420"], "modified": "2019-07-17T00:00:00", "id": "OPENVAS:1361412562310812235", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310812235", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Security Updates(stable-channel-update-for-desktop-2017-12)-Windows\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.812235\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2017-15407\", \"CVE-2017-15408\", \"CVE-2017-15409\", \"CVE-2017-15410\",\n \"CVE-2017-15411\", \"CVE-2017-15412\", \"CVE-2017-15413\", \"CVE-2017-15415\",\n \"CVE-2017-15416\", \"CVE-2017-15417\", \"CVE-2017-15418\", \"CVE-2017-15419\",\n \"CVE-2017-15420\", \"CVE-2017-15422\", \"CVE-2017-15423\", \"CVE-2017-15424\",\n \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2017-15427\", \"CVE-2017-15430\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2017-12-07 10:28:49 +0530 (Thu, 07 Dec 2017)\");\n script_name(\"Google Chrome Security Updates(stable-channel-update-for-desktop-2017-12)-Windows\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The multiple flaws exists due to,\n\n - An out of bounds write error in in QUIC.\n\n - A heap buffer overflow error in PDFium.\n\n - An out of bounds write error in Skia.\n\n - An use after free error in PDFium.\n\n - An use after free error in libXML.\n\n - A type confusion error in WebAssembly.\n\n - Pointer information disclosure error in IPC call.\n\n - An out of bounds read error in Blink.\n\n - Cross origin information disclosure in Skia.\n\n - Use of uninitialized value in Skia.\n\n - Cross origin leak of redirect URL in Blink.\n\n - Multiple URL spoofing errors in Omnibox.\n\n - An integer overflow error in ICU.\n\n - An issue with SPAKE implementation in BoringSSL.\n\n - An insufficient blocking of JavaScript in Omnibox.\n\n - An unsafe navigation in Chromecast Plugin.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of these\n vulnerabilities will allow remote attackers to execute arbitrary script,\n conduct spoofing attacks, data corruption or denial of service and\n information leak.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version\n prior to 63.0.3239.84 on Windows\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 63.0.3239.84 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_xref(name:\"URL\", value:\"https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_portable_win.nasl\");\n script_mandatory_keys(\"GoogleChrome/Win/Ver\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE )) exit(0);\nvers = infos['version'];\npath = infos['location'];\n\nif(version_is_less(version:vers, test_version:\"63.0.3239.84\"))\n{\n report = report_fixed_ver( installed_version:vers, fixed_version:\"63.0.3239.84\", install_path:path );\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-19T22:09:53", "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2017-12-07T00:00:00", "type": "openvas", "title": "Google Chrome Security Updates(stable-channel-update-for-desktop-2017-12)-Linux", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-15417", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15407", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15415", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15430", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-15420"], "modified": "2019-07-17T00:00:00", "id": "OPENVAS:1361412562310812236", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310812236", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Security Updates(stable-channel-update-for-desktop-2017-12)-Linux\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.812236\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2017-15407\", \"CVE-2017-15408\", \"CVE-2017-15409\", \"CVE-2017-15410\",\n \"CVE-2017-15411\", \"CVE-2017-15412\", \"CVE-2017-15413\", \"CVE-2017-15415\",\n \"CVE-2017-15416\", \"CVE-2017-15417\", \"CVE-2017-15418\", \"CVE-2017-15419\",\n \"CVE-2017-15420\", \"CVE-2017-15422\", \"CVE-2017-15423\", \"CVE-2017-15424\",\n \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2017-15427\", \"CVE-2017-15430\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2017-12-07 10:28:49 +0530 (Thu, 07 Dec 2017)\");\n script_name(\"Google Chrome Security Updates(stable-channel-update-for-desktop-2017-12)-Linux\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The multiple flaws exists due to,\n\n - An out of bounds write error in in QUIC.\n\n - A heap buffer overflow error in PDFium.\n\n - An out of bounds write error in Skia.\n\n - An use after free error in PDFium.\n\n - An use after free error in libXML.\n\n - A type confusion error in WebAssembly.\n\n - Pointer information disclosure error in IPC call.\n\n - An out of bounds read error in Blink.\n\n - Cross origin information disclosure in Skia.\n\n - Use of uninitialized value in Skia.\n\n - Cross origin leak of redirect URL in Blink.\n\n - Multiple URL spoofing errors in Omnibox.\n\n - An integer overflow error in ICU.\n\n - An issue with SPAKE implementation in BoringSSL.\n\n - An insufficient blocking of JavaScript in Omnibox.\n\n - An unsafe navigation in Chromecast Plugin.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of these\n vulnerabilities will allow remote attackers to execute arbitrary script,\n conduct spoofing attacks, data corruption or denial of service and\n information leak.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version prior to 63.0.3239.84 on Linux\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 63.0.3239.84 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_lin.nasl\");\n script_mandatory_keys(\"Google-Chrome/Linux/Ver\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE )) exit(0);\nvers = infos['version'];\npath = infos['location'];\n\nif(version_is_less(version:vers, test_version:\"63.0.3239.84\"))\n{\n report = report_fixed_ver( installed_version:vers, fixed_version:\"63.0.3239.84\", install_path:path );\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:33:00", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2018-01-05T00:00:00", "type": "openvas", "title": "Fedora Update for chromium FEDORA-2017-c2645aa935", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-15417", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15429", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15407", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15415", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-15420"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310873974", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310873974", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2017_c2645aa935_chromium_fc27.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for chromium FEDORA-2017-c2645aa935\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.873974\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-01-05 23:59:42 +0100 (Fri, 05 Jan 2018)\");\n script_cve_id(\"CVE-2017-15412\", \"CVE-2017-15422\", \"CVE-2017-15407\", \"CVE-2017-15408\",\n \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\", \"CVE-2017-15413\",\n \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15417\", \"CVE-2017-15418\",\n \"CVE-2017-15419\", \"CVE-2017-15420\", \"CVE-2017-15423\", \"CVE-2017-15424\",\n \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2017-15427\", \"CVE-2017-15429\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for chromium FEDORA-2017-c2645aa935\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'chromium'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"chromium on Fedora 27\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_xref(name:\"FEDORA\", value:\"2017-c2645aa935\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDKVCC2YPMOARJA2KQ3Y7FNIN2JW46EH\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC27\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC27\")\n{\n\n if ((res = isrpmvuln(pkg:\"chromium\", rpm:\"chromium~63.0.3239.108~1.fc27\", rls:\"FC27\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-19T22:09:48", "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2017-12-07T00:00:00", "type": "openvas", "title": "Google Chrome Security Updates(stable-channel-update-for-desktop-2017-12)-MAC OS X", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-15417", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15407", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15415", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15430", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-15420"], "modified": "2019-07-17T00:00:00", "id": "OPENVAS:1361412562310812237", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310812237", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Security Updates(stable-channel-update-for-desktop-2017-12)-MAC OS X\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.812237\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2017-15407\", \"CVE-2017-15408\", \"CVE-2017-15409\", \"CVE-2017-15410\",\n \"CVE-2017-15411\", \"CVE-2017-15412\", \"CVE-2017-15413\", \"CVE-2017-15415\",\n \"CVE-2017-15416\", \"CVE-2017-15417\", \"CVE-2017-15418\", \"CVE-2017-15419\",\n \"CVE-2017-15420\", \"CVE-2017-15422\", \"CVE-2017-15423\", \"CVE-2017-15424\",\n \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2017-15427\", \"CVE-2017-15430\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2017-12-07 10:28:49 +0530 (Thu, 07 Dec 2017)\");\n script_name(\"Google Chrome Security Updates(stable-channel-update-for-desktop-2017-12)-MAC OS X\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The multiple flaws exists due to,\n\n - An out of bounds write error in in QUIC.\n\n - A heap buffer overflow error in PDFium.\n\n - An out of bounds write error in Skia.\n\n - An use after free error in PDFium.\n\n - An use after free error in libXML.\n\n - A type confusion error in WebAssembly.\n\n - Pointer information disclosure error in IPC call.\n\n - An out of bounds read error in Blink.\n\n - Cross origin information disclosure in Skia.\n\n - Use of uninitialized value in Skia.\n\n - Cross origin leak of redirect URL in Blink.\n\n - Multiple URL spoofing errors in Omnibox.\n\n - An integer overflow error in ICU.\n\n - An issue with SPAKE implementation in BoringSSL.\n\n - An insufficient blocking of JavaScript in Omnibox.\n\n - An unsafe navigation in Chromecast Plugin.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of these\n vulnerabilities will allow remote attackers to execute arbitrary script,\n conduct spoofing attacks, data corruption or denial of service an\n information leak.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version\n prior to 63.0.3239.84 on MAC OS X\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 63.0.3239.84 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_macosx.nasl\");\n script_mandatory_keys(\"GoogleChrome/MacOSX/Version\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE )) exit(0);\nvers = infos['version'];\npath = infos['location'];\n\nif(version_is_less(version:vers, test_version:\"63.0.3239.84\"))\n{\n report = report_fixed_ver( installed_version:vers, fixed_version:\"63.0.3239.84\", install_path:path );\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:32:58", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2018-01-06T00:00:00", "type": "openvas", "title": "Fedora Update for chromium FEDORA-2017-ea44f172e3", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-5128", "CVE-2017-15417", "CVE-2017-5132", "CVE-2017-5131", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15395", "CVE-2017-15390", "CVE-2017-15429", "CVE-2017-15391", "CVE-2017-5133", "CVE-2017-15419", "CVE-2017-15399", "CVE-2017-15392", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-5125", "CVE-2017-15389", "CVE-2017-15387", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15407", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-5126", "CVE-2017-15412", "CVE-2017-15393", "CVE-2017-15415", "CVE-2017-5127", "CVE-2017-15398", "CVE-2017-15386", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15388", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-5129", "CVE-2017-15420", "CVE-2017-15394", "CVE-2017-5130", "CVE-2017-5124"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310873977", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310873977", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2017_ea44f172e3_chromium_fc26.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for chromium FEDORA-2017-ea44f172e3\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.873977\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-01-06 00:00:45 +0100 (Sat, 06 Jan 2018)\");\n script_cve_id(\"CVE-2017-15412\", \"CVE-2017-15422\", \"CVE-2017-15407\", \"CVE-2017-15408\",\n \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\", \"CVE-2017-15413\",\n \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15417\", \"CVE-2017-15418\",\n \"CVE-2017-15419\", \"CVE-2017-15420\", \"CVE-2017-15423\", \"CVE-2017-15424\",\n \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2017-15427\", \"CVE-2017-15429\",\n \"CVE-2017-15398\", \"CVE-2017-15399\", \"CVE-2017-15386\", \"CVE-2017-15387\",\n \"CVE-2017-15388\", \"CVE-2017-15389\", \"CVE-2017-15390\", \"CVE-2017-15391\",\n \"CVE-2017-15392\", \"CVE-2017-15393\", \"CVE-2017-15394\", \"CVE-2017-15395\",\n \"CVE-2017-5124\", \"CVE-2017-5125\", \"CVE-2017-5126\", \"CVE-2017-5127\",\n \"CVE-2017-5133\", \"CVE-2017-5131\", \"CVE-2017-5130\", \"CVE-2017-5132\",\n \"CVE-2017-5129\", \"CVE-2017-5128\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for chromium FEDORA-2017-ea44f172e3\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'chromium'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"chromium on Fedora 26\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_xref(name:\"FEDORA\", value:\"2017-ea44f172e3\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TCX6RNONWP5H4F6S2D3GX2IVGKVND34L\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC26\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC26\")\n{\n\n if ((res = isrpmvuln(pkg:\"chromium\", rpm:\"chromium~63.0.3239.108~1.fc26\", rls:\"FC26\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:33:08", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2018-02-26T00:00:00", "type": "openvas", "title": "Fedora Update for qt5-qtwebengine FEDORA-2018-e08d828ed9", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-6034", "CVE-2017-15409", "CVE-2018-6033", "CVE-2017-15423", "CVE-2018-6031", "CVE-2018-6053", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15422", "CVE-2018-6038", "CVE-2017-15407", "CVE-2018-6054", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15415", "CVE-2018-6036", "CVE-2018-6037", "CVE-2018-6047", "CVE-2018-6041", "CVE-2018-6042", "CVE-2018-6040", "CVE-2017-15426", "CVE-2017-15416", "CVE-2017-15424", "CVE-2018-6050", "CVE-2018-6048", "CVE-2018-6052", "CVE-2018-6051"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310874144", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310874144", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2018_e08d828ed9_qt5-qtwebengine_fc27.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for qt5-qtwebengine FEDORA-2018-e08d828ed9\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.874144\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-02-26 08:17:34 +0100 (Mon, 26 Feb 2018)\");\n script_cve_id(\"CVE-2017-15407\", \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\",\n \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15418\", \"CVE-2017-15419\",\n \"CVE-2017-15422\", \"CVE-2017-15423\", \"CVE-2017-15424\", \"CVE-2017-15425\",\n \"CVE-2017-15426\", \"CVE-2018-6031\", \"CVE-2018-6033\", \"CVE-2018-6034\",\n \"CVE-2018-6036\", \"CVE-2018-6037\", \"CVE-2018-6038\", \"CVE-2018-6040\",\n \"CVE-2018-6041\", \"CVE-2018-6042\", \"CVE-2018-6047\", \"CVE-2018-6048\",\n \"CVE-2018-6050\", \"CVE-2018-6051\", \"CVE-2018-6052\", \"CVE-2018-6053\",\n \"CVE-2018-6054\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for qt5-qtwebengine FEDORA-2018-e08d828ed9\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'qt5-qtwebengine'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"qt5-qtwebengine on Fedora 27\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_xref(name:\"FEDORA\", value:\"2018-e08d828ed9\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LGDSXXPN73LMQRMWCOGQL5XQFGUWIC7D\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC27\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC27\")\n{\n\n if ((res = isrpmvuln(pkg:\"qt5-qtwebengine\", rpm:\"qt5-qtwebengine~5.10.1~1.fc27\", rls:\"FC27\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:32:57", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2018-02-28T00:00:00", "type": "openvas", "title": "Fedora Update for qt5-qtwebengine FEDORA-2018-c0d3db441f", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-6034", "CVE-2017-15409", "CVE-2018-6033", "CVE-2017-15423", "CVE-2018-6031", "CVE-2018-6053", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15422", "CVE-2018-6038", "CVE-2017-15407", "CVE-2018-6054", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15415", "CVE-2018-6036", "CVE-2018-6037", "CVE-2018-6047", "CVE-2018-6041", "CVE-2018-6042", "CVE-2018-6040", "CVE-2017-15426", "CVE-2017-15416", "CVE-2017-15424", "CVE-2018-6050", "CVE-2018-6048", "CVE-2018-6052", "CVE-2018-6051"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310874155", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310874155", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2018_c0d3db441f_qt5-qtwebengine_fc26.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for qt5-qtwebengine FEDORA-2018-c0d3db441f\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.874155\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-02-28 08:38:39 +0100 (Wed, 28 Feb 2018)\");\n script_cve_id(\"CVE-2017-15407\", \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\",\n \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15418\", \"CVE-2017-15419\",\n \"CVE-2017-15422\", \"CVE-2017-15423\", \"CVE-2017-15424\", \"CVE-2017-15425\",\n \"CVE-2017-15426\", \"CVE-2018-6031\", \"CVE-2018-6033\", \"CVE-2018-6034\",\n \"CVE-2018-6036\", \"CVE-2018-6037\", \"CVE-2018-6038\", \"CVE-2018-6040\",\n \"CVE-2018-6041\", \"CVE-2018-6042\", \"CVE-2018-6047\", \"CVE-2018-6048\",\n \"CVE-2018-6050\", \"CVE-2018-6051\", \"CVE-2018-6052\", \"CVE-2018-6053\",\n \"CVE-2018-6054\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for qt5-qtwebengine FEDORA-2018-c0d3db441f\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'qt5-qtwebengine'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"qt5-qtwebengine on Fedora 26\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_xref(name:\"FEDORA\", value:\"2018-c0d3db441f\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMXSXUQWLJLP4VC53CAE7HL3ZUFJZY6I\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC26\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC26\")\n{\n\n if ((res = isrpmvuln(pkg:\"qt5-qtwebengine\", rpm:\"qt5-qtwebengine~5.10.1~1.fc26\", rls:\"FC26\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:32:54", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2018-03-28T00:00:00", "type": "openvas", "title": "Fedora Update for chromium FEDORA-2018-faff5f661e", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-6069", "CVE-2018-6078", "CVE-2017-15417", "CVE-2018-6081", "CVE-2017-15409", "CVE-2018-6080", "CVE-2018-6083", "CVE-2017-15423", "CVE-2018-6082", "CVE-2018-6057", "CVE-2018-6070", "CVE-2018-6074", "CVE-2018-6059", "CVE-2017-15419", "CVE-2017-15425", "CVE-2018-6056", "CVE-2017-15410", "CVE-2018-6073", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15407", "CVE-2018-6061", "CVE-2017-15418", "CVE-2017-15411", "CVE-2018-6072", "CVE-2017-15412", "CVE-2017-15415", "CVE-2018-6058", "CVE-2018-6068", "CVE-2018-6065", "CVE-2018-6062", "CVE-2018-6067", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2018-6071", "CVE-2017-15396", "CVE-2018-6406", "CVE-2018-6066", "CVE-2018-6075", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-15420", "CVE-2018-6064", "CVE-2018-6077", "CVE-2018-6076", "CVE-2018-6079", "CVE-2018-6060", "CVE-2018-6063"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310874300", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310874300", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2018_faff5f661e_chromium_fc27.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for chromium FEDORA-2018-faff5f661e\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.874300\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-03-28 09:00:16 +0200 (Wed, 28 Mar 2018)\");\n script_cve_id(\"CVE-2017-15396\", \"CVE-2017-15407\", \"CVE-2017-15408\", \"CVE-2017-15409\",\n \"CVE-2017-15410\", \"CVE-2017-15411\", \"CVE-2017-15412\", \"CVE-2017-15413\",\n \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15417\", \"CVE-2017-15418\",\n \"CVE-2017-15419\", \"CVE-2017-15420\", \"CVE-2017-15422\", \"CVE-2018-6056\",\n \"CVE-2018-6406\", \"CVE-2018-6057\", \"CVE-2018-6058\", \"CVE-2018-6059\",\n \"CVE-2018-6060\", \"CVE-2018-6061\", \"CVE-2018-6062\", \"CVE-2018-6063\",\n \"CVE-2018-6064\", \"CVE-2018-6065\", \"CVE-2018-6066\", \"CVE-2018-6067\",\n \"CVE-2018-6068\", \"CVE-2018-6069\", \"CVE-2018-6070\", \"CVE-2018-6071\",\n \"CVE-2018-6083\", \"CVE-2018-6082\", \"CVE-2018-6081\", \"CVE-2018-6080\",\n \"CVE-2018-6079\", \"CVE-2018-6078\", \"CVE-2018-6077\", \"CVE-2018-6076\",\n \"CVE-2018-6075\", \"CVE-2018-6074\", \"CVE-2018-6073\", \"CVE-2018-6072\",\n \"CVE-2017-15427\", \"CVE-2017-15426\", \"CVE-2017-15425\", \"CVE-2017-15424\",\n \"CVE-2017-15423\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for chromium FEDORA-2018-faff5f661e\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'chromium'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"chromium on Fedora 27\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_xref(name:\"FEDORA\", value:\"2018-faff5f661e\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XCBSSV5ZSWY3Q4NKEKL22B4MOSHCBKVN\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC27\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC27\")\n{\n\n if ((res = isrpmvuln(pkg:\"chromium\", rpm:\"chromium~65.0.3325.181~1.fc27\", rls:\"FC27\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-04T18:56:23", "description": "Several vulnerabilities have been discovered in the chromium web browser.\n\nCVE-2017-15420\nDrew Springall discovered a URL spoofing issue.\n\nCVE-2017-15429\nA cross-site scripting issue was discovered in the v8 javascript\nlibrary.\n\nCVE-2018-6031\nA use-after-free issue was discovered in the pdfium library.\n\nCVE-2018-6032\nJun Kokatsu discovered a way to bypass the same origin policy.\n\nCVE-2018-6033\nJuho Nurminen discovered a race condition when opening downloaded\nfiles.\n\nCVE-2018-6034\nTobias Klein discovered an integer overflow issue.\n\nCVE-2018-6035\nRob Wu discovered a way for extensions to access devtools.\n\nCVE-2018-6036\nUK", "cvss3": {}, "published": "2018-01-31T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 4103-1 (chromium-browser - security update)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-6043", "CVE-2018-6034", "CVE-2018-6033", "CVE-2018-6031", "CVE-2018-6035", "CVE-2017-15429", "CVE-2018-6045", "CVE-2018-6053", "CVE-2018-6032", "CVE-2018-6038", "CVE-2018-6054", "CVE-2018-6036", "CVE-2018-6046", "CVE-2018-6037", "CVE-2018-6047", "CVE-2018-6041", "CVE-2018-6039", "CVE-2018-6042", "CVE-2018-6040", "CVE-2018-6049", "CVE-2018-6050", "CVE-2017-15420", "CVE-2018-6048", "CVE-2018-6052", "CVE-2018-6051"], "modified": "2019-07-04T00:00:00", "id": "OPENVAS:1361412562310704103", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310704103", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Auto-generated from advisory DSA 4103-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2018 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License as published by\n# the Free Software Foundation; either version 2 of the License, or\n# (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.704103\");\n script_version(\"2019-07-04T09:25:28+0000\");\n script_cve_id(\"CVE-2017-15420\", \"CVE-2017-15429\", \"CVE-2018-6031\", \"CVE-2018-6032\", \"CVE-2018-6033\", \"CVE-2018-6034\", \"CVE-2018-6035\", \"CVE-2018-6036\", \"CVE-2018-6037\", \"CVE-2018-6038\", \"CVE-2018-6039\", \"CVE-2018-6040\", \"CVE-2018-6041\", \"CVE-2018-6042\", \"CVE-2018-6043\", \"CVE-2018-6045\", \"CVE-2018-6046\", \"CVE-2018-6047\", \"CVE-2018-6048\", \"CVE-2018-6049\", \"CVE-2018-6050\", \"CVE-2018-6051\", \"CVE-2018-6052\", \"CVE-2018-6053\", \"CVE-2018-6054\");\n script_name(\"Debian Security Advisory DSA 4103-1 (chromium-browser - security update)\");\n script_tag(name:\"last_modification\", value:\"2019-07-04 09:25:28 +0000 (Thu, 04 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-01-31 00:00:00 +0100 (Wed, 31 Jan 2018)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"https://www.debian.org/security/2018/dsa-4103.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2018 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB9\");\n script_tag(name:\"affected\", value:\"chromium-browser on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the oldstable distribution (jessie), security support for chromium\nhas been discontinued.\n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 64.0.3282.119-1~deb9u1.\n\nWe recommend that you upgrade your chromium-browser packages.\");\n\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/chromium-browser\");\n script_tag(name:\"summary\", value:\"Several vulnerabilities have been discovered in the chromium web browser.\n\nCVE-2017-15420\nDrew Springall discovered a URL spoofing issue.\n\nCVE-2017-15429\nA cross-site scripting issue was discovered in the v8 javascript\nlibrary.\n\nCVE-2018-6031\nA use-after-free issue was discovered in the pdfium library.\n\nCVE-2018-6032\nJun Kokatsu discovered a way to bypass the same origin policy.\n\nCVE-2018-6033\nJuho Nurminen discovered a race condition when opening downloaded\nfiles.\n\nCVE-2018-6034\nTobias Klein discovered an integer overflow issue.\n\nCVE-2018-6035\nRob Wu discovered a way for extensions to access devtools.\n\nCVE-2018-6036\nUK's National Cyber Security Centre discovered an integer overflow\nissue.\n\nCVE-2018-6037\nPaul Stone discovered an issue in the autofill feature.\n\nCVE-2018-6038\ncloudfuzzer discovered a buffer overflow issue.\n\nCVE-2018-6039\nJuho Nurminen discovered a cross-site scripting issue in the\ndeveloper tools.\n\nCVE-2018-6040\nWenXu Wu discovered a way to bypass the content security policy.\n\nCVE-2018-6041\nLuan Herrera discovered a URL spoofing issue.\n\nCVE-2018-6042\nKhalil Zhani discovered a URL spoofing issue.\n\nCVE-2018-6043\nA character escaping issue was discovered.\n\nCVE-2018-6045\nRob Wu discovered a way for extensions to access devtools.\n\nCVE-2018-6046\nRob Wu discovered a way for extensions to access devtools.\n\nCVE-2018-6047\nMasato Kinugawa discovered an information leak issue.\n\nCVE-2018-6048\nJun Kokatsu discovered a way to bypass the referrer policy.\n\nCVE-2018-6049\nWenXu Wu discovered a user interface spoofing issue.\n\nCVE-2018-6050\nJonathan Kew discovered a URL spoofing issue.\n\nCVE-2018-6051\nAntonio Sanso discovered an information leak issue.\n\nCVE-2018-6052\nTanner Emek discovered that the referrer policy implementation\nwas incomplete.\n\nCVE-2018-6053\nAsset Kabdenov discovered an information leak issue.\n\nCVE-2018-6054\nRob Wu discovered a use-after-free issue.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"chromedriver\", ver:\"64.0.3282.119-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"chromium\", ver:\"64.0.3282.119-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"chromium-driver\", ver:\"64.0.3282.119-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"chromium-l10n\", ver:\"64.0.3282.119-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"chromium-shell\", ver:\"64.0.3282.119-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"chromium-widevine\", ver:\"64.0.3282.119-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-03-14T17:56:38", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2018-01-29T00:00:00", "type": "openvas", "title": "openSUSE: Security Advisory for chromium (openSUSE-SU-2018:0259-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-6043", "CVE-2018-6034", "CVE-2018-6033", "CVE-2018-6031", "CVE-2018-6035", "CVE-2018-6045", "CVE-2018-6053", "CVE-2018-6032", "CVE-2018-6038", "CVE-2018-6054", "CVE-2018-6036", "CVE-2018-6046", "CVE-2018-6037", "CVE-2018-6047", "CVE-2018-6041", "CVE-2018-6039", "CVE-2018-6042", "CVE-2018-6040", "CVE-2018-6049", "CVE-2018-6050", "CVE-2017-15420", "CVE-2018-6048", "CVE-2018-6052", "CVE-2018-6051"], "modified": "2020-01-31T00:00:00", "id": "OPENVAS:1361412562310851692", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310851692", "sourceData": "# Copyright (C) 2018 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.851692\");\n script_version(\"2020-01-31T08:23:39+0000\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:23:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2018-01-29 07:47:09 +0100 (Mon, 29 Jan 2018)\");\n script_cve_id(\"CVE-2017-15420\", \"CVE-2018-6031\", \"CVE-2018-6032\", \"CVE-2018-6033\",\n \"CVE-2018-6034\", \"CVE-2018-6035\", \"CVE-2018-6036\", \"CVE-2018-6037\",\n \"CVE-2018-6038\", \"CVE-2018-6039\", \"CVE-2018-6040\", \"CVE-2018-6041\",\n \"CVE-2018-6042\", \"CVE-2018-6043\", \"CVE-2018-6045\", \"CVE-2018-6046\",\n \"CVE-2018-6047\", \"CVE-2018-6048\", \"CVE-2018-6049\", \"CVE-2018-6050\",\n \"CVE-2018-6051\", \"CVE-2018-6052\", \"CVE-2018-6053\", \"CVE-2018-6054\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"openSUSE: Security Advisory for chromium (openSUSE-SU-2018:0259-1)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'chromium'\n package(s) announced via the referenced advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"This update for chromium to 64.0.3282.119 fixes several issues.\n\n These security issues were fixed:\n\n - CVE-2018-6031: Use after free in PDFium (boo#1077571)\n\n - CVE-2018-6032: Same origin bypass in Shared Worker (boo#1077571)\n\n - CVE-2018-6033: Race when opening downloaded files (boo#1077571)\n\n - CVE-2018-6034: Integer overflow in Blink (boo#1077571)\n\n - CVE-2018-6035: Insufficient isolation of devtools from extensions\n (boo#1077571)\n\n - CVE-2018-6036: Integer underflow in WebAssembly (boo#1077571)\n\n - CVE-2018-6037: Insufficient user gesture requirements in autofill\n (boo#1077571)\n\n - CVE-2018-6038: Heap buffer overflow in WebGL (boo#1077571)\n\n - CVE-2018-6039: XSS in DevTools (boo#1077571)\n\n - CVE-2018-6040: Content security policy bypass (boo#1077571)\n\n - CVE-2018-6041: URL spoof in Navigation (boo#1077571)\n\n - CVE-2018-6042: URL spoof in OmniBox (boo#1077571)\n\n - CVE-2018-6043: Insufficient escaping with external URL handlers\n (boo#1077571)\n\n - CVE-2018-6045: Insufficient isolation of devtools from extensions\n (boo#1077571)\n\n - CVE-2018-6046: Insufficient isolation of devtools from extensions\n (boo#1077571)\n\n - CVE-2018-6047: Cross origin URL leak in WebGL (boo#1077571)\n\n - CVE-2018-6048: Referrer policy bypass in Blink (boo#1077571)\n\n - CVE-2017-15420: URL spoofing in Omnibox (boo#1077571)\n\n - CVE-2018-6049: UI spoof in Permissions (boo#1077571)\n\n - CVE-2018-6050: URL spoof in OmniBox (boo#1077571)\n\n - CVE-2018-6051: Referrer leak in XSS Auditor (boo#1077571)\n\n - CVE-2018-6052: Incomplete no-referrer policy implementation (boo#1077571)\n\n - CVE-2018-6053: Leak of page thumbnails in New Tab Page (boo#1077571)\n\n - CVE-2018-6054: Use after free in WebUI (boo#1077571)\n\n Re was updated to version 2018-01-01 (boo#1073323)\");\n\n script_tag(name:\"affected\", value:\"chromium on openSUSE Leap 42.3\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2018:0259-1\");\n script_xref(name:\"URL\", value:\"https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00079.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSELeap42\\.3\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap42.3\") {\n if(!isnull(res = isrpmvuln(pkg:\"libre2-0\", rpm:\"libre2-0~20180101~9.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libre2-0-debuginfo\", rpm:\"libre2-0-debuginfo~20180101~9.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"re2-debugsource\", rpm:\"re2-debugsource~20180101~9.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"re2-devel\", rpm:\"re2-devel~20180101~9.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver\", rpm:\"chromedriver~64.0.3282.119~135.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver-debuginfo\", rpm:\"chromedriver-debuginfo~64.0.3282.119~135.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium\", rpm:\"chromium~64.0.3282.119~135.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debuginfo\", rpm:\"chromium-debuginfo~64.0.3282.119~135.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debugsource\", rpm:\"chromium-debugsource~64.0.3282.119~135.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libre2-0-32bit\", rpm:\"libre2-0-32bit~20180101~9.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libre2-0-debuginfo-32bit\", rpm:\"libre2-0-debuginfo-32bit~20180101~9.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "osv": [{"lastseen": "2022-07-21T08:24:18", "description": "\nSeveral vulnerabilities have been discovered in the chromium web browser.\n\n\n* [CVE-2017-15407](https://security-tracker.debian.org/tracker/CVE-2017-15407)\nNed Williamson discovered an out-of-bounds write issue.\n* [CVE-2017-15408](https://security-tracker.debian.org/tracker/CVE-2017-15408)\nKe Liu discovered a heap overflow issue in the pdfium library.\n* [CVE-2017-15409](https://security-tracker.debian.org/tracker/CVE-2017-15409)\nAn out-of-bounds write issue was discovered in the skia library.\n* [CVE-2017-15410](https://security-tracker.debian.org/tracker/CVE-2017-15410)\nLuat Nguyen discovered a use-after-free issue in the pdfium library.\n* [CVE-2017-15411](https://security-tracker.debian.org/tracker/CVE-2017-15411)\nLuat Nguyen discovered a use-after-free issue in the pdfium library.\n* [CVE-2017-15413](https://security-tracker.debian.org/tracker/CVE-2017-15413)\nGaurav Dewan discovered a type confusion issue.\n* [CVE-2017-15415](https://security-tracker.debian.org/tracker/CVE-2017-15415)\nViktor Brange discovered an information disclosure issue.\n* [CVE-2017-15416](https://security-tracker.debian.org/tracker/CVE-2017-15416)\nNed Williamson discovered an out-of-bounds read issue.\n* [CVE-2017-15417](https://security-tracker.debian.org/tracker/CVE-2017-15417)\nMax May discovered an information disclosure issue in the skia\n library.\n* [CVE-2017-15418](https://security-tracker.debian.org/tracker/CVE-2017-15418)\nKushal Arvind Shah discovered an uninitialized value in the skia\n library.\n* [CVE-2017-15419](https://security-tracker.debian.org/tracker/CVE-2017-15419)\nJun Kokatsu discoved an information disclosure issue.\n* [CVE-2017-15420](https://security-tracker.debian.org/tracker/CVE-2017-15420)\nWenXu Wu discovered a URL spoofing issue.\n* [CVE-2017-15423](https://security-tracker.debian.org/tracker/CVE-2017-15423)\nGreg Hudson discovered an issue in the boringssl library.\n* [CVE-2017-15424](https://security-tracker.debian.org/tracker/CVE-2017-15424)\nKhalil Zhani discovered a URL spoofing issue.\n* [CVE-2017-15425](https://security-tracker.debian.org/tracker/CVE-2017-15425)\nxisigr discovered a URL spoofing issue.\n* [CVE-2017-15426](https://security-tracker.debian.org/tracker/CVE-2017-15426)\nWenXu Wu discovered a URL spoofing issue.\n* [CVE-2017-15427](https://security-tracker.debian.org/tracker/CVE-2017-15427)\nJunaid Farhan discovered an issue with the omnibox.\n\n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 63.0.3239.84-1~deb9u1.\n\n\nWe recommend that you upgrade your chromium-browser packages.\n\n\nFor the detailed security status of chromium-browser please refer to\nits security tracker page at:\n[\\\nhttps://security-tracker.debian.org/tracker/chromium-browser](https://security-tracker.debian.org/tracker/chromium-browser)\n\n\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2017-12-12T00:00:00", "type": "osv", "title": "chromium-browser - security update", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15417", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15427", "CVE-2017-15407", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15415", "CVE-2017-15428", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-15420"], "modified": "2022-07-21T05:49:41", "id": "OSV:DSA-4064-1", "href": "https://osv.dev/vulnerability/DSA-4064-1", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-07-21T08:24:13", "description": "\nSeveral vulnerabilities have been discovered in the chromium web browser.\n\n\n* [CVE-2017-15420](https://security-tracker.debian.org/tracker/CVE-2017-15420)\nDrew Springall discovered a URL spoofing issue.\n* [CVE-2017-15429](https://security-tracker.debian.org/tracker/CVE-2017-15429)\nA cross-site scripting issue was discovered in the v8 javascript\n library.\n* [CVE-2018-6031](https://security-tracker.debian.org/tracker/CVE-2018-6031)\nA use-after-free issue was discovered in the pdfium library.\n* [CVE-2018-6032](https://security-tracker.debian.org/tracker/CVE-2018-6032)\nJun Kokatsu discovered a way to bypass the same origin policy.\n* [CVE-2018-6033](https://security-tracker.debian.org/tracker/CVE-2018-6033)\nJuho Nurminen discovered a race condition when opening downloaded\n files.\n* [CVE-2018-6034](https://security-tracker.debian.org/tracker/CVE-2018-6034)\nTobias Klein discovered an integer overflow issue.\n* [CVE-2018-6035](https://security-tracker.debian.org/tracker/CVE-2018-6035)\nRob Wu discovered a way for extensions to access devtools.\n* [CVE-2018-6036](https://security-tracker.debian.org/tracker/CVE-2018-6036)\nUK's National Cyber Security Centre discovered an integer overflow\n issue.\n* [CVE-2018-6037](https://security-tracker.debian.org/tracker/CVE-2018-6037)\nPaul Stone discovered an issue in the autofill feature.\n* [CVE-2018-6038](https://security-tracker.debian.org/tracker/CVE-2018-6038)\ncloudfuzzer discovered a buffer overflow issue.\n* [CVE-2018-6039](https://security-tracker.debian.org/tracker/CVE-2018-6039)\nJuho Nurminen discovered a cross-site scripting issue in the\n developer tools.\n* [CVE-2018-6040](https://security-tracker.debian.org/tracker/CVE-2018-6040)\nWenXu Wu discovered a way to bypass the content security policy.\n* [CVE-2018-6041](https://security-tracker.debian.org/tracker/CVE-2018-6041)\nLuan Herrera discovered a URL spoofing issue.\n* [CVE-2018-6042](https://security-tracker.debian.org/tracker/CVE-2018-6042)\nKhalil Zhani discovered a URL spoofing issue.\n* [CVE-2018-6043](https://security-tracker.debian.org/tracker/CVE-2018-6043)\nA character escaping issue was discovered.\n* [CVE-2018-6045](https://security-tracker.debian.org/tracker/CVE-2018-6045)\nRob Wu discovered a way for extensions to access devtools.\n* [CVE-2018-6046](https://security-tracker.debian.org/tracker/CVE-2018-6046)\nRob Wu discovered a way for extensions to access devtools.\n* [CVE-2018-6047](https://security-tracker.debian.org/tracker/CVE-2018-6047)\nMasato Kinugawa discovered an information leak issue.\n* [CVE-2018-6048](https://security-tracker.debian.org/tracker/CVE-2018-6048)\nJun Kokatsu discovered a way to bypass the referrer policy.\n* [CVE-2018-6049](https://security-tracker.debian.org/tracker/CVE-2018-6049)\nWenXu Wu discovered a user interface spoofing issue.\n* [CVE-2018-6050](https://security-tracker.debian.org/tracker/CVE-2018-6050)\nJonathan Kew discovered a URL spoofing issue.\n* [CVE-2018-6051](https://security-tracker.debian.org/tracker/CVE-2018-6051)\nAntonio Sanso discovered an information leak issue.\n* [CVE-2018-6052](https://security-tracker.debian.org/tracker/CVE-2018-6052)\nTanner Emek discovered that the referrer policy implementation\n was incomplete.\n* [CVE-2018-6053](https://security-tracker.debian.org/tracker/CVE-2018-6053)\nAsset Kabdenov discovered an information leak issue.\n* [CVE-2018-6054](https://security-tracker.debian.org/tracker/CVE-2018-6054)\nRob Wu discovered a use-after-free issue.\n\n\nFor the oldstable distribution (jessie), security support for chromium\nhas been discontinued.\n\n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 64.0.3282.119-1~deb9u1.\n\n\nWe recommend that you upgrade your chromium-browser packages.\n\n\nFor the detailed security status of chromium-browser please refer to\nits security tracker page at:\n[\\\nhttps://security-tracker.debian.org/tracker/chromium-browser](https://security-tracker.debian.org/tracker/chromium-browser)\n\n\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-01-31T00:00:00", "type": "osv", "title": "chromium-browser - security update", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-6043", "CVE-2018-6034", "CVE-2018-6033", "CVE-2018-6031", "CVE-2018-6035", "CVE-2017-15429", "CVE-2018-6045", "CVE-2018-6053", "CVE-2018-6032", "CVE-2018-6038", "CVE-2018-6054", "CVE-2018-6036", "CVE-2018-6046", "CVE-2018-6055", "CVE-2018-6119", "CVE-2018-6037", "CVE-2018-6047", "CVE-2018-6041", "CVE-2018-6039", "CVE-2018-6042", "CVE-2018-6040", "CVE-2018-6049", "CVE-2018-6050", "CVE-2017-15420", "CVE-2018-6048", "CVE-2018-6052", "CVE-2018-6051"], "modified": "2022-07-21T05:49:44", "id": "OSV:DSA-4103-1", "href": "https://osv.dev/vulnerability/DSA-4103-1", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "kaspersky": [{"lastseen": "2023-02-08T16:05:08", "description": "### *Detect date*:\n12/07/2017\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, obtain sensitive information, spoof user interface, bypass security restrictions and possibly to execute arbitrary code.\n\n### *Affected products*:\nGoogle Chrome versions earlier than 63.0.3239.84\n\n### *Solution*:\nUpdate to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk. \n[Download Google Chrome](<https://www.google.com/chrome/browser/desktop/>)\n\n### *Original advisories*:\n[Stable Channel Update for Desktop](<https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Google Chrome](<https://threats.kaspersky.com/en/product/Google-Chrome/>)\n\n### *CVE-IDS*:\n[CVE-2017-15422](<https://vulners.com/cve/CVE-2017-15422>)4.3Warning \n[CVE-2017-15423](<https://vulners.com/cve/CVE-2017-15423>)5.0Critical \n[CVE-2017-15424](<https://vulners.com/cve/CVE-2017-15424>)4.3Warning \n[CVE-2017-15425](<https://vulners.com/cve/CVE-2017-15425>)4.3Warning \n[CVE-2017-15426](<https://vulners.com/cve/CVE-2017-15426>)4.3Warning \n[CVE-2017-15427](<https://vulners.com/cve/CVE-2017-15427>)4.3Warning \n[CVE-2017-15407](<https://vulners.com/cve/CVE-2017-15407>)6.8High \n[CVE-2017-15408](<https://vulners.com/cve/CVE-2017-15408>)6.8High \n[CVE-2017-15409](<https://vulners.com/cve/CVE-2017-15409>)6.8High \n[CVE-2017-15410](<https://vulners.com/cve/CVE-2017-15410>)6.8High \n[CVE-2017-15411](<https://vulners.com/cve/CVE-2017-15411>)6.8High \n[CVE-2017-15412](<https://vulners.com/cve/CVE-2017-15412>)6.8High \n[CVE-2017-15413](<https://vulners.com/cve/CVE-2017-15413>)6.8High \n[CVE-2017-15415](<https://vulners.com/cve/CVE-2017-15415>)4.3Warning \n[CVE-2017-15416](<https://vulners.com/cve/CVE-2017-15416>)4.3Warning \n[CVE-2017-15417](<https://vulners.com/cve/CVE-2017-15417>)2.6Warning \n[CVE-2017-15418](<https://vulners.com/cve/CVE-2017-15418>)4.3Warning \n[CVE-2017-15419](<https://vulners.com/cve/CVE-2017-15419>)4.3Warning \n[CVE-2017-15420](<https://vulners.com/cve/CVE-2017-15420>)4.3Warning", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2017-12-07T00:00:00", "type": "kaspersky", "title": "KLA11152 Multiple vulnerabilities in Google Chrome", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427"], "modified": "2020-06-03T00:00:00", "id": "KLA11152", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11152/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-02-08T16:04:25", "description": "### *Detect date*:\n01/24/2018\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions, spoof user interface, obtain sensitive information and perform cross-site scripting attack.\n\n### *Affected products*:\nGoogle Chrome earlier than 64.0.3282.119\n\n### *Solution*:\nUpdate to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk. \n[Download Google Chrome](<https://www.google.com/chrome/browser/desktop/>)\n\n### *Original advisories*:\n[CHROMIUM-ISSUE-773952](<https://bugs.chromium.org/p/chromium/issues/detail?id=773952>) \n[CHROMIUM-ISSUE-773161](<https://bugs.chromium.org/p/chromium/issues/detail?id=773161>) \n[Stable Channel Update for Desktop](<https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Google Chrome](<https://threats.kaspersky.com/en/product/Google-Chrome/>)\n\n### *CVE-IDS*:\n[CVE-2017-15420](<https://vulners.com/cve/CVE-2017-15420>)4.3Warning \n[CVE-2018-6031](<https://vulners.com/cve/CVE-2018-6031>)6.8High \n[CVE-2018-6032](<https://vulners.com/cve/CVE-2018-6032>)4.3Warning \n[CVE-2018-6033](<https://vulners.com/cve/CVE-2018-6033>)6.8High \n[CVE-2018-6034](<https://vulners.com/cve/CVE-2018-6034>)5.8High \n[CVE-2018-6035](<https://vulners.com/cve/CVE-2018-6035>)6.8High \n[CVE-2018-6036](<https://vulners.com/cve/CVE-2018-6036>)4.3Warning \n[CVE-2018-6037](<https://vulners.com/cve/CVE-2018-6037>)4.3Warning \n[CVE-2018-6038](<https://vulners.com/cve/CVE-2018-6038>)4.3Warning \n[CVE-2018-6039](<https://vulners.com/cve/CVE-2018-6039>)4.3Warning \n[CVE-2018-6040](<https://vulners.com/cve/CVE-2018-6040>)4.3Warning \n[CVE-2018-6041](<https://vulners.com/cve/CVE-2018-6041>)4.3Warning \n[CVE-2018-6042](<https://vulners.com/cve/CVE-2018-6042>)4.3Warning \n[CVE-2018-6043](<https://vulners.com/cve/CVE-2018-6043>)6.8High \n[CVE-2018-6045](<https://vulners.com/cve/CVE-2018-6045>)4.3Warning \n[CVE-2018-6046](<https://vulners.com/cve/CVE-2018-6046>)4.3Warning \n[CVE-2018-6047](<https://vulners.com/cve/CVE-2018-6047>)4.3Warning \n[CVE-2018-6048](<https://vulners.com/cve/CVE-2018-6048>)4.3Warning \n[CVE-2018-6049](<https://vulners.com/cve/CVE-2018-6049>)4.3Warning \n[CVE-2018-6050](<https://vulners.com/cve/CVE-2018-6050>)4.3Warning \n[CVE-2018-6051](<https://vulners.com/cve/CVE-2018-6051>)4.3Warning \n[CVE-2018-6052](<https://vulners.com/cve/CVE-2018-6052>)4.3Warning \n[CVE-2018-6053](<https://vulners.com/cve/CVE-2018-6053>)4.3Warning \n[CVE-2018-6054](<https://vulners.com/cve/CVE-2018-6054>)6.8High", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-01-24T00:00:00", "type": "kaspersky", "title": "KLA11185 Multiple vulnerabilities in Google Chrome", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15420", "CVE-2018-6031", "CVE-2018-6032", "CVE-2018-6033", "CVE-2018-6034", "CVE-2018-6035", "CVE-2018-6036", "CVE-2018-6037", "CVE-2018-6038", "CVE-2018-6039", "CVE-2018-6040", "CVE-2018-6041", "CVE-2018-6042", "CVE-2018-6043", "CVE-2018-6045", "CVE-2018-6046", "CVE-2018-6047", "CVE-2018-6048", "CVE-2018-6049", "CVE-2018-6050", "CVE-2018-6051", "CVE-2018-6052", "CVE-2018-6053", "CVE-2018-6054"], "modified": "2020-06-03T00:00:00", "id": "KLA11185", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11185/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "archlinux": [{"lastseen": "2021-07-28T14:34:05", "description": "Arch Linux Security Advisory ASA-201712-5\n=========================================\n\nSeverity: Critical\nDate : 2017-12-07\nCVE-ID : CVE-2017-15407 CVE-2017-15408 CVE-2017-15409 CVE-2017-15410\nCVE-2017-15411 CVE-2017-15412 CVE-2017-15413 CVE-2017-15415\nCVE-2017-15416 CVE-2017-15417 CVE-2017-15418 CVE-2017-15419\nCVE-2017-15420 CVE-2017-15422 CVE-2017-15423 CVE-2017-15424\nCVE-2017-15425 CVE-2017-15426 CVE-2017-15427\nPackage : chromium\nType : multiple issues\nRemote : Yes\nLink : https://security.archlinux.org/AVG-544\n\nSummary\n=======\n\nThe package chromium before version 63.0.3239.84-1 is vulnerable to\nmultiple issues including arbitrary code execution, content spoofing,\ninformation disclosure and access restriction bypass.\n\nResolution\n==========\n\nUpgrade to 63.0.3239.84-1.\n\n# pacman -Syu \"chromium>=63.0.3239.84-1\"\n\nThe problems have been fixed upstream in version 63.0.3239.84.\n\nWorkaround\n==========\n\nNone.\n\nDescription\n===========\n\n- CVE-2017-15407 (arbitrary code execution)\n\nAn out of bounds write has been found in the QUIC component of the\nChromium browser before 63.0.3239.84.\n\n- CVE-2017-15408 (arbitrary code execution)\n\nA heap-based buffer overflow has been found in the PDFium component of\nthe Chromium browser before 63.0.3239.84.\n\n- CVE-2017-15409 (arbitrary code execution)\n\nAn out of bounds write has been found in the Skia component of the\nChromium browser before 63.0.3239.84.\n\n- CVE-2017-15410 (arbitrary code execution)\n\nA use after free has been found in the PDFium component of the Chromium\nbrowser before 63.0.3239.84.\n\n- CVE-2017-15411 (arbitrary code execution)\n\nA use after free has been found in the PDFium component of the Chromium\nbrowser before 63.0.3239.84.\n\n- CVE-2017-15412 (arbitrary code execution)\n\nA use after free has been found in the libxml component of the Chromium\nbrowser before 63.0.3239.84.\n\n- CVE-2017-15413 (arbitrary code execution)\n\nA type confusion has been found in the WebAssembly component of the\nChromium browser before 63.0.3239.84.\n\n- CVE-2017-15415 (information disclosure)\n\nA pointer information disclosure has been found in the IPC call\ncomponent of the Chromium browser before 63.0.3239.84.\n\n- CVE-2017-15416 (information disclosure)\n\nAn out of bounds read has been found in the Blink component of the\nChromium browser before 63.0.3239.84.\n\n- CVE-2017-15417 (information disclosure)\n\nA cross-origin information disclosure has been found in the Skia\ncomponent of the Chromium browser before 63.0.3239.84.\n\n- CVE-2017-15418 (information disclosure)\n\nA use of uninitialized value has been found in the Skia component of\nthe Chromium browser before 63.0.3239.84.\n\n- CVE-2017-15419 (information disclosure)\n\nA cross-origin leak of redirect URL has been found in the Blink\ncomponent of the Chromium browser before 63.0.3239.84.\n\n- CVE-2017-15420 (content spoofing)\n\nA URL spoofing issue has been found in the Omnibox component of the\nChromium browser before 63.0.3239.84.\n\n- CVE-2017-15422 (arbitrary code execution)\n\nAn integer overflow has been found in the ICU component of the Chromium\nbrowser before 63.0.3239.84.\n\n- CVE-2017-15423 (information disclosure)\n\nAn information disclosure issue has been found in the SPAKE\nimplementation of the BoringSSL component of the Chromium browser\nbefore 63.0.3239.84.\n\n- CVE-2017-15424 (content spoofing)\n\nA URL spoofing issue has been found in the Omnibox component of the\nChromium browser before 63.0.3239.84.\n\n- CVE-2017-15425 (content spoofing)\n\nA URL spoofing issue has been found in the Omnibox component of the\nChromium browser before 63.0.3239.84.\n\n- CVE-2017-15426 (content spoofing)\n\nA URL spoofing issue has been found in the Omnibox component of the\nChromium browser before 63.0.3239.84.\n\n- CVE-2017-15427 (access restriction bypass)\n\nAn insufficient blocking of Javascript issue has been found in the\nOmnibox component of the Chromium browser before 63.0.3239.84.\n\nImpact\n======\n\nA remote attacker can execute arbitrary code on the affected host,\nspoof the URL, access sensitive information and bypass security\nmeasures.\n\nReferences\n==========\n\nhttps://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html\nhttps://crbug.com/778505\nhttps://crbug.com/762374\nhttps://crbug.com/763972\nhttps://crbug.com/765921\nhttps://crbug.com/770148\nhttps://crbug.com/727039\nhttps://crbug.com/766666\nhttps://crbug.com/765512\nhttps://crbug.com/779314\nhttps://crbug.com/699028\nhttps://crbug.com/765858\nhttps://crbug.com/780312\nhttps://crbug.com/777419\nhttps://crbug.com/774382\nhttps://github.com/google/boringssl/commit/696c13bd6ab78011adfe7b775519c8b7cc82b604\nhttps://crbug.com/778101\nhttps://crbug.com/756226\nhttps://crbug.com/756456\nhttps://crbug.com/756735\nhttps://crbug.com/768910\nhttps://security.archlinux.org/CVE-2017-15407\nhttps://security.archlinux.org/CVE-2017-15408\nhttps://security.archlinux.org/CVE-2017-15409\nhttps://security.archlinux.org/CVE-2017-15410\nhttps://security.archlinux.org/CVE-2017-15411\nhttps://security.archlinux.org/CVE-2017-15412\nhttps://security.archlinux.org/CVE-2017-15413\nhttps://security.archlinux.org/CVE-2017-15415\nhttps://security.archlinux.org/CVE-2017-15416\nhttps://security.archlinux.org/CVE-2017-15417\nhttps://security.archlinux.org/CVE-2017-15418\nhttps://security.archlinux.org/CVE-2017-15419\nhttps://security.archlinux.org/CVE-2017-15420\nhttps://security.archlinux.org/CVE-2017-15422\nhttps://security.archlinux.org/CVE-2017-15423\nhttps://security.archlinux.org/CVE-2017-15424\nhttps://security.archlinux.org/CVE-2017-15425\nhttps://security.archlinux.org/CVE-2017-15426\nhttps://security.archlinux.org/CVE-2017-15427", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2017-12-07T00:00:00", "type": "archlinux", "title": "[ASA-201712-5] chromium: multiple issues", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427"], "modified": "2017-12-07T00:00:00", "id": "ASA-201712-5", "href": "https://security.archlinux.org/ASA-201712-5", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "redhat": [{"lastseen": "2021-10-19T20:36:02", "description": "Chromium is an open-source web browser, powered by WebKit (Blink).\n\nThis update upgrades Chromium to version 63.0.3239.84.\n\nSecurity Fix(es):\n\n* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2017-15407, CVE-2017-15408, CVE-2017-15409, CVE-2017-15410, CVE-2017-15411, CVE-2017-15412, CVE-2017-15413, CVE-2017-15415, CVE-2017-15416, CVE-2017-15417, CVE-2017-15418, CVE-2017-15419, CVE-2017-15420, CVE-2017-15422, CVE-2017-15423, CVE-2017-15424, CVE-2017-15425, CVE-2017-15426, CVE-2017-15427)", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2017-12-07T19:20:02", "type": "redhat", "title": "(RHSA-2017:3401) Critical: chromium-browser security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427"], "modified": "2018-06-07T14:21:49", "id": "RHSA-2017:3401", "href": "https://access.redhat.com/errata/RHSA-2017:3401", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "suse": [{"lastseen": "2017-12-08T15:45:31", "description": "This update to Chromium 63.0.3239.84 fixes the following security issues:\n\n - CVE-2017-15408: Heap buffer overflow in PDFium\n - CVE-2017-15409: Out of bounds write in Skia\n - CVE-2017-15410: Use after free in PDFium\n - CVE-2017-15411: Use after free in PDFium\n - CVE-2017-15412: Use after free in libXML\n - CVE-2017-15413: Type confusion in WebAssembly\n - CVE-2017-15415: Pointer information disclosure in IPC call\n - CVE-2017-15416: Out of bounds read in Blink\n - CVE-2017-15417: Cross origin information disclosure in Skia\n - CVE-2017-15418: Use of uninitialized value in Skia\n - CVE-2017-15419: Cross origin leak of redirect URL in Blink\n - CVE-2017-15420: URL spoofing in Omnibox\n - CVE-2017-15422: Integer overflow in ICU\n - CVE-2017-15423: Issue with SPAKE implementation in BoringSSL\n - CVE-2017-15424: URL Spoof in Omnibox\n - CVE-2017-15425: URL Spoof in Omnibox\n - CVE-2017-15426: URL Spoof in Omnibox\n - CVE-2017-15427: Insufficient blocking of JavaScript in Omnibox\n\n", "cvss3": {}, "published": "2017-12-08T12:15:33", "type": "suse", "title": "Security update for chromium (important)", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2017-15417", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15415", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-15420"], "modified": "2017-12-08T12:15:33", "id": "OPENSUSE-SU-2017:3244-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2017-12/msg00021.html", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2017-12-08T15:45:32", "description": "This update to Chromium 63.0.3239.84 fixes the following security issues:\n\n - CVE-2017-5124: UXSS with MHTML\n - CVE-2017-5125: Heap overflow in Skia\n - CVE-2017-5126: Use after free in PDFium\n - CVE-2017-5127: Use after free in PDFium\n - CVE-2017-5128: Heap overflow in WebGL\n - CVE-2017-5129: Use after free in WebAudio\n - CVE-2017-5132: Incorrect stack manipulation in WebAssembly.\n - CVE-2017-5130: Heap overflow in libxml2\n - CVE-2017-5131: Out of bounds write in Skia\n - CVE-2017-5133: Out of bounds write in Skia\n - CVE-2017-15386: UI spoofing in Blink\n - CVE-2017-15387: Content security bypass\n - CVE-2017-15388: Out of bounds read in Skia\n - CVE-2017-15389: URL spoofing in OmniBox\n - CVE-2017-15390: URL spoofing in OmniBox\n - CVE-2017-15391: Extension limitation bypass in Extensions.\n - CVE-2017-15392: Incorrect registry key handling in PlatformIntegration\n - CVE-2017-15393: Referrer leak in Devtools\n - CVE-2017-15394: URL spoofing in extensions UI\n - CVE-2017-15395: Null pointer dereference in ImageCapture\n - CVE-2017-15396: Stack overflow in V8\n - CVE-2017-15398: Stack buffer overflow in QUIC\n - CVE-2017-15399: Use after free in V8\n - CVE-2017-15408: Heap buffer overflow in PDFium\n - CVE-2017-15409: Out of bounds write in Skia\n - CVE-2017-15410: Use after free in PDFium\n - CVE-2017-15411: Use after free in PDFium\n - CVE-2017-15412: Use after free in libXML\n - CVE-2017-15413: Type confusion in WebAssembly\n - CVE-2017-15415: Pointer information disclosure in IPC call\n - CVE-2017-15416: Out of bounds read in Blink\n - CVE-2017-15417: Cross origin information disclosure in Skia\n - CVE-2017-15418: Use of uninitialized value in Skia\n - CVE-2017-15419: Cross origin leak of redirect URL in Blink\n - CVE-2017-15420: URL spoofing in Omnibox\n - CVE-2017-15422: Integer overflow in ICU\n - CVE-2017-15423: Issue with SPAKE implementation in BoringSSL\n - CVE-2017-15424: URL Spoof in Omnibox\n - CVE-2017-15425: URL Spoof in Omnibox\n - CVE-2017-15426: URL Spoof in Omnibox\n - CVE-2017-15427: Insufficient blocking of JavaScript in Omnibox\n\n The following tracked bug fixes are included:\n\n - sandbox crash fixes (bsc#1064298)\n\n", "cvss3": {}, "published": "2017-12-08T12:15:59", "type": "suse", "title": "Security update for chromium (important)", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2017-5128", "CVE-2017-15417", "CVE-2017-5132", "CVE-2017-5131", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15395", "CVE-2017-15390", "CVE-2017-15391", "CVE-2017-5133", "CVE-2017-15419", "CVE-2017-15399", "CVE-2017-15392", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-5125", "CVE-2017-15389", "CVE-2017-15387", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-5126", "CVE-2017-15412", "CVE-2017-15393", "CVE-2017-15415", "CVE-2017-5127", "CVE-2017-15398", "CVE-2017-15386", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15396", "CVE-2017-15388", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-5129", "CVE-2017-15420", "CVE-2017-15394", "CVE-2017-5130", "CVE-2017-5124"], "modified": "2017-12-08T12:15:59", "id": "OPENSUSE-SU-2017:3245-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2017-12/msg00022.html", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2018-01-28T20:53:50", "description": "This update for chromium to 64.0.3282.119 fixes several issues.\n\n These security issues were fixed:\n\n - CVE-2018-6031: Use after free in PDFium (boo#1077571)\n - CVE-2018-6032: Same origin bypass in Shared Worker (boo#1077571)\n - CVE-2018-6033: Race when opening downloaded files (boo#1077571)\n - CVE-2018-6034: Integer overflow in Blink (boo#1077571)\n - CVE-2018-6035: Insufficient isolation of devtools from extensions\n (boo#1077571)\n - CVE-2018-6036: Integer underflow in WebAssembly (boo#1077571)\n - CVE-2018-6037: Insufficient user gesture requirements in autofill\n (boo#1077571)\n - CVE-2018-6038: Heap buffer overflow in WebGL (boo#1077571)\n - CVE-2018-6039: XSS in DevTools (boo#1077571)\n - CVE-2018-6040: Content security policy bypass (boo#1077571)\n - CVE-2018-6041: URL spoof in Navigation (boo#1077571)\n - CVE-2018-6042: URL spoof in OmniBox (boo#1077571)\n - CVE-2018-6043: Insufficient escaping with external URL handlers\n (boo#1077571)\n - CVE-2018-6045: Insufficient isolation of devtools from extensions\n (boo#1077571)\n - CVE-2018-6046: Insufficient isolation of devtools from extensions\n (boo#1077571)\n - CVE-2018-6047: Cross origin URL leak in WebGL (boo#1077571)\n - CVE-2018-6048: Referrer policy bypass in Blink (boo#1077571)\n - CVE-2017-15420: URL spoofing in Omnibox (boo#1077571)\n - CVE-2018-6049: UI spoof in Permissions (boo#1077571)\n - CVE-2018-6050: URL spoof in OmniBox (boo#1077571)\n - CVE-2018-6051: Referrer leak in XSS Auditor (boo#1077571)\n - CVE-2018-6052: Incomplete no-referrer policy implementation (boo#1077571)\n - CVE-2018-6053: Leak of page thumbnails in New Tab Page (boo#1077571)\n - CVE-2018-6054: Use after free in WebUI (boo#1077571)\n\n Re was updated to version 2018-01-01 (boo#1073323)\n\n", "cvss3": {}, "published": "2018-01-28T18:07:37", "type": "suse", "title": "Security update for chromium (important)", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2018-6043", "CVE-2018-6034", "CVE-2018-6033", "CVE-2018-6031", "CVE-2018-6035", "CVE-2018-6045", "CVE-2018-6053", "CVE-2018-6032", "CVE-2018-6038", "CVE-2018-6054", "CVE-2018-6036", "CVE-2018-6046", "CVE-2018-6037", "CVE-2018-6047", "CVE-2018-6041", "CVE-2018-6039", "CVE-2018-6042", "CVE-2018-6040", "CVE-2018-6049", "CVE-2018-6050", "CVE-2017-15420", "CVE-2018-6048", "CVE-2018-6052", "CVE-2018-6051"], "modified": "2018-01-28T18:07:37", "id": "OPENSUSE-SU-2018:0259-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00079.html", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2018-01-31T20:53:56", "description": "This update for chromium to 64.0.3282.119 fixes several issues.\n\n These security issues were fixed:\n\n - CVE-2018-6031: Use after free in PDFium (boo#1077571)\n - CVE-2018-6032: Same origin bypass in Shared Worker (boo#1077571)\n - CVE-2018-6033: Race when opening downloaded files (boo#1077571)\n - CVE-2018-6034: Integer overflow in Blink (boo#1077571)\n - CVE-2018-6035: Insufficient isolation of devtools from extensions\n (boo#1077571)\n - CVE-2018-6036: Integer underflow in WebAssembly (boo#1077571)\n - CVE-2018-6037: Insufficient user gesture requirements in autofill\n (boo#1077571)\n - CVE-2018-6038: Heap buffer overflow in WebGL (boo#1077571)\n - CVE-2018-6039: XSS in DevTools (boo#1077571)\n - CVE-2018-6040: Content security policy bypass (boo#1077571)\n - CVE-2018-6041: URL spoof in Navigation (boo#1077571)\n - CVE-2018-6042: URL spoof in OmniBox (boo#1077571)\n - CVE-2018-6043: Insufficient escaping with external URL handlers\n (boo#1077571)\n - CVE-2018-6045: Insufficient isolation of devtools from extensions\n (boo#1077571)\n - CVE-2018-6046: Insufficient isolation of devtools from extensions\n (boo#1077571)\n - CVE-2018-6047: Cross origin URL leak in WebGL (boo#1077571)\n - CVE-2018-6048: Referrer policy bypass in Blink (boo#1077571)\n - CVE-2017-15420: URL spoofing in Omnibox (boo#1077571)\n - CVE-2018-6049: UI spoof in Permissions (boo#1077571)\n - CVE-2018-6050: URL spoof in OmniBox (boo#1077571)\n - CVE-2018-6051: Referrer leak in XSS Auditor (boo#1077571)\n - CVE-2018-6052: Incomplete no-referrer policy implementation (boo#1077571)\n - CVE-2018-6053: Leak of page thumbnails in New Tab Page (boo#1077571)\n - CVE-2018-6054: Use after free in WebUI (boo#1077571)\n\n Re was updated to version 2018-01-01 (boo#1073323)\n\n", "cvss3": {}, "published": "2018-01-31T18:08:20", "type": "suse", "title": "Security update for chromium (important)", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2018-6043", "CVE-2018-6034", "CVE-2018-6033", "CVE-2018-6031", "CVE-2018-6035", "CVE-2018-6045", "CVE-2018-6053", "CVE-2018-6032", "CVE-2018-6038", "CVE-2018-6054", "CVE-2018-6036", "CVE-2018-6046", "CVE-2018-6037", "CVE-2018-6047", "CVE-2018-6041", "CVE-2018-6039", "CVE-2018-6042", "CVE-2018-6040", "CVE-2018-6049", "CVE-2018-6050", "CVE-2017-15420", "CVE-2018-6048", "CVE-2018-6052", "CVE-2018-6051"], "modified": "2018-01-31T18:08:20", "id": "OPENSUSE-SU-2018:0313-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00104.html", "cvss": {"score": 0.0, "vector": "NONE"}}], "mageia": [{"lastseen": "2022-04-18T11:19:34", "description": "This update provide an update the new Qt5 LTS version ( 5.9 ) \n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-05-11T20:13:13", "type": "mageia", "title": "Updated Qt5 packages fix security vulnerability\n", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15407", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426"], "modified": "2018-05-09T18:33:09", "id": "MGAA-2018-0067", "href": "https://advisories.mageia.org/MGAA-2018-0067.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "gentoo": [{"lastseen": "2022-01-17T19:04:41", "description": "### Background\n\nChromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. \n\nGoogle Chrome is one fast, simple, and secure browser for all your devices \n\n### Description\n\nMultiple vulnerabilities have been discovered in Chromium and Google Chrome. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA remote attacker could possibly execute arbitrary code with the privileges of the process, cause a Denial of Service condition, bypass content security controls, or conduct URL spoofing. \n\n### Workaround\n\nThere are no known workarounds at this time.\n\n### Resolution\n\nAll Chromium users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose\n \">=www-client/chromium-63.0.3239.108\"\n \n\nAll Google Chrome users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose\n \">=www-client/google-chrome-63.0.3239.108\"", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-01-07T00:00:00", "type": "gentoo", "title": "Chromium, Google Chrome: Multiple vulnerabilities ", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427", "CVE-2017-15429"], "modified": "2018-01-07T00:00:00", "id": "GLSA-201801-03", "href": "https://security.gentoo.org/glsa/201801-03", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "freebsd": [{"lastseen": "2022-01-19T15:51:31", "description": "\n\nGoogle Chrome Releases reports:\n\n37 security fixes in this release, including:\n\n[778505] Critical CVE-2017-15407: Out of bounds write in QUIC. Reported by\n\t Ned Williamson on 2017-10-26\n[762374] High CVE-2017-15408: Heap buffer overflow in PDFium. Reported by\n\t Ke Liu of Tencent's Xuanwu LAB on 2017-09-06\n[763972] High CVE-2017-15409: Out of bounds write in Skia. Reported by\n\t Anonymous on 2017-09-11\n[765921] High CVE-2017-15410: Use after free in PDFium. Reported by\n\t Luat Nguyen of KeenLab, Tencent on 2017-09-16\n[770148] High CVE-2017-15411: Use after free in PDFium. Reported by\n\t Luat Nguyen of KeenLab, Tencent on 2017-09-29\n[727039] High CVE-2017-15412: Use after free in libXML. Reported by\n\t Nick Wellnhofer on 2017-05-27\n[766666] High CVE-2017-15413: Type confusion in WebAssembly. Reported by\n\t Gaurav Dewan of Adobe Systems India Pvt. Ltd. on 2017-09-19\n[765512] Medium CVE-2017-15415: Pointer information disclosure in IPC call.\n\t Reported by Viktor Brange of Microsoft Offensive Security Research Team on 2017-09-15\n[779314] Medium CVE-2017-15416: Out of bounds read in Blink. Reported by\n\t Ned Williamson on 2017-10-28\n[699028] Medium CVE-2017-15417: Cross origin information disclosure in Skia.\n\t Reported by Max May on 2017-03-07\n[765858] Medium CVE-2017-15418: Use of uninitialized value in Skia. Reported by\n\t Kushal Arvind Shah of Fortinet's FortiGuard Labs on 2017-09-15\n[780312] Medium CVE-2017-15419: Cross origin leak of redirect URL in Blink.\n\t Reported by Jun Kokatsu on 2017-10-31\n[777419] Medium CVE-2017-15420: URL spoofing in Omnibox. Reported by\n\t WenXu Wu of Tencent's Xuanwu Lab on 2017-10-23\n[774382] Medium CVE-2017-15422: Integer overflow in ICU. Reported by\n\t Yuan Deng of Ant-financial Light-Year Security Lab on 2017-10-13\n[780484] Medium CVE-2017-15430: Unsafe navigation in Chromecast Plugin.\n\t Reported by jinmo123 on 2017-01-11\n[778101] Low CVE-2017-15423: Issue with SPAKE implementation in BoringSSL.\n\t Reported by Greg Hudson on 2017-10-25\n[756226] Low CVE-2017-15424: URL Spoof in Omnibox. Reported by\n\t Khalil Zhani on 2017-08-16\n[756456] Low CVE-2017-15425: URL Spoof in Omnibox. Reported by\n\t xisigr of Tencent's Xuanwu Lab on 2017-08-17\n[757735] Low CVE-2017-15426: URL Spoof in Omnibox. Reported by\n\t WenXu Wu of Tencent's Xuanwu Lab on 2017-08-18\n[768910] Low CVE-2017-15427: Insufficient blocking of Javascript in Omnibox.\n\t Reported by Junaid Farhan on 2017-09-26\n[792099] Various fixes from internal audits, fuzzing and other initiatives\n\n\n\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2017-12-06T00:00:00", "type": "freebsd", "title": "chromium -- multiple vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427", "CVE-2017-15430"], "modified": "2017-12-06T00:00:00", "id": "1D951E85-FFDB-11E7-8B91-E8E0B747A45A", "href": "https://vuxml.freebsd.org/freebsd/1d951e85-ffdb-11e7-8b91-e8e0b747a45a.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-01-19T15:51:31", "description": "\n\nGoogle Chrome Releases reports:\n\nSeveral security fixes in this release, including:\n\n[780450] High CVE-2018-6031: Use after free in PDFium. Reported by Anonymous on 2017-11-01\n[787103] High CVE-2018-6032: Same origin bypass in Shared Worker. Reported by Jun Kokatsu (@shhnjk) on 2017-11-20\n[793620] High CVE-2018-6033: Race when opening downloaded files. Reported by Juho Nurminen on 2017-12-09\n[784183] Medium CVE-2018-6034: Integer overflow in Blink. Reported by Tobias Klein (www.trapkit.de) on 2017-11-12\n[797500] Medium CVE-2018-6035: Insufficient isolation of devtools from extensions. Reported by Rob Wu on 2017-12-23\n[797500] Medium CVE-2018-6035: Insufficient isolation of devtools from extensions. Reported by Rob Wu on 2017-12-23\n[753645] Medium CVE-2018-6037: Insufficient user gesture requirements in autofill. Reported by Paul Stone of Context Information Security on\n 2017-08-09\n[774174] Medium CVE-2018-6038: Heap buffer overflow in WebGL. Reported by cloudfuzzer on 2017-10-12\n[775527] Medium CVE-2018-6039: XSS in DevTools. Reported by Juho Nurminen on 2017-10-17\n[778658] Medium CVE-2018-6040: Content security policy bypass. Reported by WenXu Wu of Tencent's Xuanwu Lab on 2017-10-26\n[760342] Medium CVE-2018-6041: URL spoof in Navigation. Reported by Luan Herrera on 2017-08-29\n[773930] Medium CVE-2018-6042: URL spoof in OmniBox. Reported by Khalil Zhani on 2017-10-12\n[785809] Medium CVE-2018-6043: Insufficient escaping with external URL handlers. Reported by 0x09AL on 2017-11-16\n[797497] Medium CVE-2018-6045: Insufficient isolation of devtools from extensions. Reported by Rob Wu on 2017-12-23\n[798163] Medium CVE-2018-6046: Insufficient isolation of devtools from extensions. Reported by Rob Wu on 2017-12-31\n[799847] Medium CVE-2018-6047: Cross origin URL leak in WebGL. Reported by Masato Kinugawa on 2018-01-08\n[763194] Low CVE-2018-6048: Referrer policy bypass in Blink. Reported by Jun Kokatsu (@shhnjk) on 2017-09-08\n[771848] Low CVE-2017-15420: URL spoofing in Omnibox. Reported by Drew Springall (@_aaspring_) on 2017-10-05\n[774438] Low CVE-2018-6049: UI spoof in Permissions. Reported by WenXu Wu of Tencent's Xuanwu Lab on 2017-10-13\n[774842] Low CVE-2018-6050: URL spoof in OmniBox. Reported by Jonathan Kew on 2017-10-15\n[441275] Low CVE-2018-6051: Referrer leak in XSS Auditor. Reported by Antonio Sanso (@asanso) on 2014-12-11\n[615608] Low CVE-2018-6052: Incomplete no-referrer policy implementation. Reported by Tanner Emek on 2016-05-28\n[758169] Low CVE-2018-6053: Leak of page thumbnails in New Tab Page. Reported by Asset Kabdenov on 2017-08-23\n[797511] Low CVE-2018-6054: Use after free in WebUI. Reported by Rob Wu on 2017-12-24\n\n\n\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2017-08-09T00:00:00", "type": "freebsd", "title": "chromium -- multiple vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15420", "CVE-2018-6031", "CVE-2018-6032", "CVE-2018-6033", "CVE-2018-6034", "CVE-2018-6035", "CVE-2018-6036", "CVE-2018-6037", "CVE-2018-6038", "CVE-2018-6039", "CVE-2018-6040", "CVE-2018-6041", "CVE-2018-6042", "CVE-2018-6043", "CVE-2018-6045", "CVE-2018-6046", "CVE-2018-6047", "CVE-2018-6048", "CVE-2018-6049", "CVE-2018-6050", "CVE-2018-6051", "CVE-2018-6052", "CVE-2018-6053", "CVE-2018-6054"], "modified": "2017-08-09T00:00:00", "id": "8E986B2B-1BAA-11E8-A944-54EE754AF08E", "href": "https://vuxml.freebsd.org/freebsd/8e986b2b-1baa-11e8-a944-54ee754af08e.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "chrome": [{"lastseen": "2021-12-30T22:33:05", "description": "The Chrome team is delighted to announce the promotion of Chrome 63 to the stable channel for Windows, Mac and Linux. This will roll out over the coming days/weeks.\n\n\n\n\n\nChrome 63.0.3239.84 contains a number of fixes and improvements -- a list of changes is available in the[ log](<https://chromium.googlesource.com/chromium/src/+log/62.0.3202.94..63.0.3239.84?pretty=fuller&n=10000>). Watch out for upcoming[ Chrome](<https://chrome.blogspot.com/>) and[ Chromium](<https://blog.chromium.org/>) blog posts about new features and big efforts delivered in 63.\n\n** \n** \n\n\n**Security Fixes and Rewards**\n\nNote: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven't yet fixed.\n\n** \n** \n\n\nThis update includes [37](<https://bugs.chromium.org/p/chromium/issues/list?can=1&q=type%3Abug-security+os%3DAndroid%2Cios%2Clinux%2Cmac%2Cwindows%2Call+label%3ARelease-0-M63>) security fixes. Below, we highlight fixes that were contributed by external researchers. Please see the [Chrome Security Page](<http://sites.google.com/a/chromium.org/dev/Home/chromium-security>) for more information.\n\n** \n** \n\n\n[$10500][[778505](<https://crbug.com/778505>)] Critical CVE-2017-15407: Out of bounds write in QUIC. Reported by Ned Williamson on 2017-10-26\n\n[$6337][[762374](<https://crbug.com/762374>)] High CVE-2017-15408: Heap buffer overflow in PDFium. Reported by Ke Liu of Tencent's Xuanwu LAB on 2017-09-06\n\n[$5000][[763972](<https://crbug.com/763972>)] High CVE-2017-15409: Out of bounds write in Skia. Reported by Anonymous on 2017-09-11\n\n[$5000][[765921](<https://crbug.com/765921>)] High CVE-2017-15410: Use after free in PDFium. Reported by Lu\u1eadt Nguy\u1ec5n (@l4wio) of KeenLab, Tencent on 2017-09-16\n\n[$5000][[770148](<https://crbug.com/770148>)] High CVE-2017-15411: Use after free in PDFium. Reported by Lu\u1eadt Nguy\u1ec5n (@l4wio) of KeenLab, Tencent on 2017-09-29\n\n[$3500][[727039](<https://crbug.com/727039>)] High CVE-2017-15412: Use after free in libXML. Reported by Nick Wellnhofer on 2017-05-27\n\n[$500][[766666](<https://crbug.com/766666>)] High CVE-2017-15413: Type confusion in WebAssembly. Reported by Gaurav Dewan(@007gauravdewan) of Adobe Systems India Pvt. Ltd. on 2017-09-19\n\n[$3337][[765512](<https://crbug.com/765512>)] Medium CVE-2017-15415: Pointer information disclosure in IPC call. Reported by Viktor Brange of Microsoft Offensive Security Research Team on 2017-09-15\n\n[$2500][[779314](<https://crbug.com/779314>)] Medium CVE-2017-15416: Out of bounds read in Blink. Reported by Ned Williamson on 2017-10-28\n\n[$2000][[699028](<https://crbug.com/699028>)] Medium CVE-2017-15417: Cross origin information disclosure in Skia . Reported by Max May on 2017-03-07\n\n[$1000][[765858](<https://crbug.com/765858>)] Medium CVE-2017-15418: Use of uninitialized value in Skia. Reported by Kushal Arvind Shah of Fortinet's FortiGuard Labs on 2017-09-15\n\n[$1000][[780312](<https://crbug.com/780312>)] Medium CVE-2017-15419: Cross origin leak of redirect URL in Blink. Reported by Jun Kokatsu (@shhnjk) on 2017-10-31\n\n[$500][[777419](<https://crbug.com/777419>)] Medium CVE-2017-15420: URL spoofing in Omnibox. Reported by WenXu Wu of Tencent's Xuanwu Lab on 2017-10-23\n\n[$TBD][[774382](<https://crbug.com/774382>)] Medium CVE-2017-15422: Integer overflow in ICU. Reported by Yuan Deng of Ant-financial Light-Year Security Lab on 2017-10-13 \n[$500][[780484](<https://crbug.com/780484>)] Medium** **CVE-2017-15430: Unsafe navigation in Chromecast Plugin. _Reported by jinmo123 on 11/1/2017_\n\n[$500][[778101](<https://crbug.com/778101>)] Low CVE-2017-15423: Issue with SPAKE implementation in BoringSSL. Reported by Greg Hudson on 2017-10-25\n\n[$N/A][[756226](<https://crbug.com/756226>)] Low CVE-2017-15424: URL Spoof in Omnibox. Reported by Khalil Zhani on 2017-08-16\n\n[$N/A][[756456](<https://crbug.com/756456>)] Low CVE-2017-15425: URL Spoof in Omnibox. Reported by xisigr of Tencent's Xuanwu Lab on 2017-08-17\n\n[$N/A][[756735](<https://crbug.com/756735>)] Low CVE-2017-15426: URL Spoof in Omnibox. Reported by WenXu Wu of Tencent's Xuanwu Lab on 2017-08-18\n\n[$N/A][[768910](<https://crbug.com/768910>)] Low CVE-2017-15427: Insufficient blocking of JavaScript in Omnibox. Reported by Junaid Farhan (fb.me/junaid.farhan.54) on 2017-09-26\n\n** \n** \n\n\nWe would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel. \n\nAs usual, our ongoing internal security work was responsible for a wide range of fixes:\n\n * [[792099](<https://crbug.com/792099>)] Various fixes from internal audits, fuzzing and other initiatives\n\nMany of our security bugs are detected using [AddressSanitizer](<http://code.google.com/p/address-sanitizer/wiki/AddressSanitizer>), [MemorySanitizer](<https://code.google.com/p/memory-sanitizer/wiki/MemorySanitizer>), [UndefinedBehaviorSanitizer](<https://www.chromium.org/developers/testing/undefinedbehaviorsanitizer>), [Control Flow Integrity](<https://sites.google.com/a/chromium.org/dev/developers/testing/control-flow-integrity>), [libFuzzer](<https://sites.google.com/a/chromium.org/dev/developers/testing/libfuzzer>), or [AFL](<http://lcamtuf.coredump.cx/afl/>). \n\n\nA list of all changes is available in the [log](<https://chromium.googlesource.com/chromium/src/+log/62.0.3202.94..63.0.3239.84?pretty=fuller&n=10000>).Interested in switching release channels?[ Find out how](<https://www.chromium.org/getting-involved/dev-channel>). If you find a new issue, please let us know by[ filing a bug](<https://crbug.com/>). The [community help forum](<https://productforums.google.com/forum/#!forum/chrome>) is also a great place to reach out for help or learn about common issues.\n\n\n\n\n\n\n\nKrishna Govind\n\nGoogle Chrome", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2017-12-06T00:00:00", "type": "chrome", "title": "Stable Channel Update for Desktop", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427", "CVE-2017-15430"], "modified": "2017-12-06T00:00:00", "id": "GCSA-6993857189147290065", "href": "https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-30T22:33:05", "description": "The Chrome team is delighted to announce the promotion of Chrome 64 to the stable channel for Windows, Mac and Linux. This will roll out over the coming days/weeks. \n\nChrome 64.0.3282.119 contains a number of fixes and improvements -- a list of changes is available in the[ log](<https://chromium.googlesource.com/chromium/src/+log/63.0.3239.132..64.0.3282.119?pretty=fuller&n=10000>). Watch out for upcoming[ Chrome](<https://chrome.blogspot.com/>) and[ Chromium](<https://blog.chromium.org/>) blog posts about new features and big efforts delivered in 64. \n\n\n**Security Fixes and Rewards** \n\nNote: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven't yet fixed. \n\nThis update includes [53](<https://bugs.chromium.org/p/chromium/issues/list?can=1&q=type%3Abug-security+label%3ARelease-0-M64+-component%3AOS&colspec=ID+Pri+M+Stars+ReleaseBlock+Component+Status+Owner+Summary+OS+Modified&x=m&y=releaseblock&cells=ids>) security fixes. Below, we highlight fixes that were contributed by external researchers. Please see the [Chrome Security Page](<http://sites.google.com/a/chromium.org/dev/Home/chromium-security>) for more information. \n\n[$3000][[780450](<https://crbug.com/780450>)] High CVE-2018-6031: Use after free in PDFium. Reported by Anonymous on 2017-11-01 \n[$2000][[787103](<https://crbug.com/787103>)] High CVE-2018-6032: Same origin bypass in Shared Worker. Reported by Jun Kokatsu (@shhnjk) on 2017-11-20 \n[$1000][[793620](<https://crbug.com/793620>)] High CVE-2018-6033: Race when opening downloaded files. Reported by Juho Nurminen on 2017-12-09 \n[$4000][[784183](<https://crbug.com/784183>)] Medium CVE-2018-6034: Integer overflow in Blink. Reported by Tobias Klein (www.trapkit.de) on 2017-11-12 \n[$2500][[797500](<https://crbug.com/797500>)] Medium CVE-2018-6035: Insufficient isolation of devtools from extensions. Reported by Rob Wu on 2017-12-23 \n[$2000][[789952](<https://crbug.com/789952>)] Medium CVE-2018-6036: Integer underflow in WebAssembly. Reported by The UK's National Cyber Security Centre (NCSC) on 2017-11-30 \n[$1000][[753645](<https://crbug.com/753645>)] Medium CVE-2018-6037: Insufficient user gesture requirements in autofill. Reported by Paul Stone of Context Information Security on 2017-08-09 \n[$1000][[774174](<https://crbug.com/774174>)] Medium CVE-2018-6038: Heap buffer overflow in WebGL. Reported by cloudfuzzer on 2017-10-12 \n[$1000][[775527](<https://crbug.com/775527>)] Medium CVE-2018-6039: XSS in DevTools. Reported by Juho Nurminen on 2017-10-17 \n[$1000][[778658](<https://crbug.com/778658>)] Medium CVE-2018-6040: Content security policy bypass. Reported by WenXu Wu of Tencent's Xuanwu Lab on 2017-10-26 \n[$500][[760342](<https://crbug.com/760342>)] Medium CVE-2018-6041: URL spoof in Navigation. Reported by Luan Herrera on 2017-08-29 \n[$500][[773930](<https://crbug.com/773930>)] Medium CVE-2018-6042: URL spoof in OmniBox. Reported by Khalil Zhani on 2017-10-12 \n[$500][[785809](<https://crbug.com/785809>)] Medium CVE-2018-6043: Insufficient escaping with external URL handlers. Reported by 0x09AL on 2017-11-16 \n[$TBD][[797497](<https://crbug.com/797497>)] Medium CVE-2018-6045: Insufficient isolation of devtools from extensions. Reported by Rob Wu on 2017-12-23 \n[$TBD][[798163](<https://crbug.com/798163>)] Medium CVE-2018-6046: Insufficient isolation of devtools from extensions. Reported by Rob Wu on 2017-12-31 \n[$TBD][[799847](<https://crbug.com/799847>)] Medium CVE-2018-6047: Cross origin URL leak in WebGL. Reported by Masato Kinugawa on 2018-01-08 \n[$500][[763194](<https://crbug.com/763194>)] Low CVE-2018-6048: Referrer policy bypass in Blink. Reported by Jun Kokatsu (@shhnjk) on 2017-09-08 \n[$500][[771848](<https://crbug.com/771848>)] Low CVE-2017-15420: URL spoofing in Omnibox. Reported by Drew Springall (@_aaspring_) on 2017-10-05 \n[$500][[774438](<https://crbug.com/774438>)] Low CVE-2018-6049: UI spoof in Permissions. Reported by WenXu Wu of Tencent's Xuanwu Lab on 2017-10-13 \n[$500][[774842](<https://crbug.com/774842>)] Low CVE-2018-6050: URL spoof in OmniBox. Reported by Jonathan Kew on 2017-10-15 \n[$N/a][[441275](<https://crbug.com/441275>)] Low CVE-2018-6051: Referrer leak in XSS Auditor. Reported by Antonio Sanso (@asanso) on 2014-12-11 \n[$N/A][[615608](<https://crbug.com/615608>)] Low CVE-2018-6052: Incomplete no-referrer policy implementation. Reported by Tanner Emek on 2016-05-28 \n[$N/A][[758169](<https://crbug.com/758169>)] Low CVE-2018-6053: Leak of page thumbnails in New Tab Page. Reported by Asset Kabdenov on 2017-08-23 \n[$N/A][[797511](<https://crbug.com/797511>)] Low CVE-2018-6054: Use after free in WebUI. Reported by Rob Wu on 2017-12-24 \n\nWe would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel. \n\nAs usual, our ongoing internal security work was responsible for a wide range of fixes: \n\n\n\n * [[805285](<https://crbug.com/805285>)] Various fixes from internal audits, fuzzing and other initiatives\n\nThis release contains additional mitigations against [speculative side-channel attack techniques](<https://blog.google/topics/google-cloud/what-google-cloud-g-suite-and-chrome-customers-need-know-about-industry-wide-cpu-vulnerability/>).\n\n\nMany of our security bugs are detected using [AddressSanitizer](<http://code.google.com/p/address-sanitizer/wiki/AddressSanitizer>), [MemorySanitizer](<https://code.google.com/p/memory-sanitizer/wiki/MemorySanitizer>), [UndefinedBehaviorSanitizer](<https://www.chromium.org/developers/testing/undefinedbehaviorsanitizer>), [Control Flow Integrity](<https://sites.google.com/a/chromium.org/dev/developers/testing/control-flow-integrity>), [libFuzzer](<https://sites.google.com/a/chromium.org/dev/developers/testing/libfuzzer>), or [AFL](<http://lcamtuf.coredump.cx/afl/>). \n\nThank you, \nAbdul Syed", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-01-24T00:00:00", "type": "chrome", "title": "Stable Channel Update for Desktop", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15420", "CVE-2018-6031", "CVE-2018-6032", "CVE-2018-6033", "CVE-2018-6034", "CVE-2018-6035", "CVE-2018-6036", "CVE-2018-6037", "CVE-2018-6038", "CVE-2018-6039", "CVE-2018-6040", "CVE-2018-6041", "CVE-2018-6042", "CVE-2018-6043", "CVE-2018-6045", "CVE-2018-6046", "CVE-2018-6047", "CVE-2018-6048", "CVE-2018-6049", "CVE-2018-6050", "CVE-2018-6051", "CVE-2018-6052", "CVE-2018-6053", "CVE-2018-6054"], "modified": "2018-01-24T00:00:00", "id": "GCSA-9103668740237956942", "href": "https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "fedora": [{"lastseen": "2020-12-21T08:17:54", "description": "Chromium is an open-source web browser, powered by WebKit (Blink). ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-01-01T22:20:38", "type": "fedora", "title": "[SECURITY] Fedora 27 Update: chromium-63.0.3239.108-1.fc27", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427", "CVE-2017-15429"], "modified": "2018-01-01T22:20:38", "id": "FEDORA:2E8D96005552", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/UDKVCC2YPMOARJA2KQ3Y7FNIN2JW46EH/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:54", "description": "Chromium is an open-source web browser, powered by WebKit (Blink). ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-01-01T22:22:45", "type": "fedora", "title": "[SECURITY] Fedora 26 Update: chromium-63.0.3239.108-1.fc26", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15386", "CVE-2017-15387", "CVE-2017-15388", "CVE-2017-15389", "CVE-2017-15390", "CVE-2017-15391", "CVE-2017-15392", "CVE-2017-15393", "CVE-2017-15394", "CVE-2017-15395", "CVE-2017-15398", "CVE-2017-15399", "CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427", "CVE-2017-15429", "CVE-2017-5124", "CVE-2017-5125", "CVE-2017-5126", "CVE-2017-5127", "CVE-2017-5128", "CVE-2017-5129", "CVE-2017-5130", "CVE-2017-5131", "CVE-2017-5132", "CVE-2017-5133"], "modified": "2018-01-01T22:22:45", "id": "FEDORA:EC7F86046254", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/TCX6RNONWP5H4F6S2D3GX2IVGKVND34L/", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:54", "description": "Qt5 - QtWebEngine components. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-02-25T21:14:12", "type": "fedora", "title": "[SECURITY] Fedora 27 Update: qt5-qtwebengine-5.10.1-1.fc27", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15407", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15415", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15425", "CVE-2017-15426", "CVE-2018-6031", "CVE-2018-6033", "CVE-2018-6034", "CVE-2018-6036", "CVE-2018-6037", "CVE-2018-6038", "CVE-2018-6040", "CVE-2018-6041", "CVE-2018-6042", "CVE-2018-6047", "CVE-2018-6048", "CVE-2018-6050", "CVE-2018-6051", "CVE-2018-6052", "CVE-2018-6053", "CVE-2018-6054"], "modified": "2018-02-25T21:14:12", "id": "FEDORA:CAFF160478EB", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/LGDSXXPN73LMQRMWCOGQL5XQFGUWIC7D/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:54", "description": "Qt5 - QtWebEngine components. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-02-27T16:58:43", "type": "fedora", "title": "[SECURITY] Fedora 26 Update: qt5-qtwebengine-5.10.1-1.fc26", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15407", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15415", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15425", "CVE-2017-15426", "CVE-2018-6031", "CVE-2018-6033", "CVE-2018-6034", "CVE-2018-6036", "CVE-2018-6037", "CVE-2018-6038", "CVE-2018-6040", "CVE-2018-6041", "CVE-2018-6042", "CVE-2018-6047", "CVE-2018-6048", "CVE-2018-6050", "CVE-2018-6051", "CVE-2018-6052", "CVE-2018-6053", "CVE-2018-6054"], "modified": "2018-02-27T16:58:43", "id": "FEDORA:5CFCF60A5875", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/TMXSXUQWLJLP4VC53CAE7HL3ZUFJZY6I/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:54", "description": "Chromium is an open-source web browser, powered by WebKit (Blink). ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-03-30T13:40:00", "type": "fedora", "title": "[SECURITY] Fedora 28 Update: chromium-65.0.3325.181-1.fc28", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15396", "CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427", "CVE-2018-6056", "CVE-2018-6057", "CVE-2018-6058", "CVE-2018-6059", "CVE-2018-6060", "CVE-2018-6061", "CVE-2018-6062", "CVE-2018-6063", "CVE-2018-6064", "CVE-2018-6065", "CVE-2018-6066", "CVE-2018-6067", "CVE-2018-6068", "CVE-2018-6069", "CVE-2018-6070", "CVE-2018-6071", "CVE-2018-6072", "CVE-2018-6073", "CVE-2018-6074", "CVE-2018-6075", "CVE-2018-6076", "CVE-2018-6077", "CVE-2018-6078", "CVE-2018-6079", "CVE-2018-6080", "CVE-2018-6081", "CVE-2018-6082", "CVE-2018-6083", "CVE-2018-6406"], "modified": "2018-03-30T13:40:00", "id": "FEDORA:855A9625F2AD", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/ZOWNVIEOYMNSUHRE2HFKDEWQD5CBMCB4/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:54", "description": "Chromium is an open-source web browser, powered by WebKit (Blink). ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-03-27T20:18:19", "type": "fedora", "title": "[SECURITY] Fedora 27 Update: chromium-65.0.3325.181-1.fc27", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15396", "CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427", "CVE-2018-6056", "CVE-2018-6057", "CVE-2018-6058", "CVE-2018-6059", "CVE-2018-6060", "CVE-2018-6061", "CVE-2018-6062", "CVE-2018-6063", "CVE-2018-6064", "CVE-2018-6065", "CVE-2018-6066", "CVE-2018-6067", "CVE-2018-6068", "CVE-2018-6069", "CVE-2018-6070", "CVE-2018-6071", "CVE-2018-6072", "CVE-2018-6073", "CVE-2018-6074", "CVE-2018-6075", "CVE-2018-6076", "CVE-2018-6077", "CVE-2018-6078", "CVE-2018-6079", "CVE-2018-6080", "CVE-2018-6081", "CVE-2018-6082", "CVE-2018-6083", "CVE-2018-6406"], "modified": "2018-03-27T20:18:19", "id": "FEDORA:0F54C60BE23D", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/XCBSSV5ZSWY3Q4NKEKL22B4MOSHCBKVN/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "ubuntucve": [{"lastseen": "2022-08-04T13:46:55", "description": "Type confusion in WebAssembly in V8 in Google Chrome prior to 63.0.3239.84\nallowed a remote attacker to potentially exploit heap corruption via a\ncrafted HTML page.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-08-28T00:00:00", "type": "ubuntucve", "title": "CVE-2017-15413", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15413"], "modified": "2018-08-28T00:00:00", "id": "UB:CVE-2017-15413", "href": "https://ubuntu.com/security/CVE-2017-15413", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-08-04T13:46:55", "description": "Inappropriate implementation in Skia canvas composite operations in Google\nChrome prior to 63.0.3239.84 allowed a remote attacker to leak cross-origin\ndata via a crafted HTML page.", "cvss3": {"exploitabilityScore": 1.6, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.3, "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2018-08-28T00:00:00", "type": "ubuntucve", "title": "CVE-2017-15417", "bulletinFamily": "info", "cvss2": {"severity": "LOW", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.6, "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15417"], "modified": "2018-08-28T00:00:00", "id": "UB:CVE-2017-15417", "href": "https://ubuntu.com/security/CVE-2017-15417", "cvss": {"score": 2.6, "vector": "AV:N/AC:H/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-08-04T13:46:54", "description": "Insufficient policy enforcement in Omnibox in Google Chrome prior to\n63.0.3239.84 allowed a socially engineered user to XSS themselves by\ndragging and dropping a javascript: URL into the URL bar.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 6.1, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2018-08-28T00:00:00", "type": "ubuntucve", "title": "CVE-2017-15427", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15427"], "modified": "2018-08-28T00:00:00", "id": "UB:CVE-2017-15427", "href": "https://ubuntu.com/security/CVE-2017-15427", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2022-08-04T13:46:56", "description": "Out-of-bounds Write in the QUIC networking stack in Google Chrome prior to\n63.0.3239.84 allowed a remote attacker to gain code execution via a\nmalicious server.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-08-28T00:00:00", "type": "ubuntucve", "title": "CVE-2017-15407", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15407"], "modified": "2018-08-28T00:00:00", "id": "UB:CVE-2017-15407", "href": "https://ubuntu.com/security/CVE-2017-15407", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-08-04T13:46:54", "description": "Heap buffer overflow in Blob API in Google Chrome prior to 63.0.3239.84\nallowed a remote attacker to potentially exploit heap corruption via a\ncrafted HTML page, aka a Blink out-of-bounds read.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2018-08-28T00:00:00", "type": "ubuntucve", "title": "CVE-2017-15416", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15416"], "modified": "2018-08-28T00:00:00", "id": "UB:CVE-2017-15416", "href": "https://ubuntu.com/security/CVE-2017-15416", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-08-04T13:46:55", "description": "Heap buffer overflow in Omnibox in Google Chrome prior to 63.0.3239.84\nallowed a remote attacker to potentially exploit heap corruption via a\ncrafted PDF file that is mishandled by PDFium.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-08-28T00:00:00", "type": "ubuntucve", "title": "CVE-2017-15408", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15408"], "modified": "2018-08-28T00:00:00", "id": "UB:CVE-2017-15408", "href": "https://ubuntu.com/security/CVE-2017-15408", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-08-04T13:46:53", "description": "Insufficient policy enforcement in Omnibox in Google Chrome prior to\n63.0.3239.84 allowed a remote attacker to perform domain spoofing via IDN\nhomographs in a crafted domain name.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2018-08-28T00:00:00", "type": "ubuntucve", "title": "CVE-2017-15424", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15424"], "modified": "2018-08-28T00:00:00", "id": "UB:CVE-2017-15424", "href": "https://ubuntu.com/security/CVE-2017-15424", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2022-08-04T13:46:56", "description": "Use after free in PDFium in Google Chrome prior to 63.0.3239.84 allowed a\nremote attacker to potentially exploit heap corruption via a crafted PDF\nfile.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-08-28T00:00:00", "type": "ubuntucve", "title": "CVE-2017-15410", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15410"], "modified": "2018-08-28T00:00:00", "id": "UB:CVE-2017-15410", "href": "https://ubuntu.com/security/CVE-2017-15410", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-08-04T13:46:56", "description": "Heap buffer overflow in Skia in Google Chrome prior to 63.0.3239.84 allowed\na remote attacker to potentially exploit heap corruption via a crafted HTML\npage.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-08-28T00:00:00", "type": "ubuntucve", "title": "CVE-2017-15409", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15409"], "modified": "2018-08-28T00:00:00", "id": "UB:CVE-2017-15409", "href": "https://ubuntu.com/security/CVE-2017-15409", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-08-04T13:46:54", "description": "Insufficient policy enforcement in Resource Timing API in Google Chrome\nprior to 63.0.3239.84 allowed a remote attacker to infer browsing history\nby triggering a leaked cross-origin URL via a crafted HTML page.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2018-08-28T00:00:00", "type": "ubuntucve", "title": "CVE-2017-15419", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15419"], "modified": "2018-08-28T00:00:00", "id": "UB:CVE-2017-15419", "href": "https://ubuntu.com/security/CVE-2017-15419", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-08-04T13:46:55", "description": "Use after free in PDFium in Google Chrome prior to 63.0.3239.84 allowed a\nremote attacker to potentially exploit heap corruption via a crafted PDF\nfile.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-08-28T00:00:00", "type": "ubuntucve", "title": "CVE-2017-15411", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15411"], "modified": "2018-08-28T00:00:00", "id": "UB:CVE-2017-15411", "href": "https://ubuntu.com/security/CVE-2017-15411", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-08-04T13:46:54", "description": "Inappropriate implementation in BoringSSL SPAKE2 in Google Chrome prior to\n63.0.3239.84 allowed a remote attacker to leak the low-order bits of\nSHA512(password) by inspecting protocol traffic.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.3, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 1.4}, "published": "2018-08-28T00:00:00", "type": "ubuntucve", "title": "CVE-2017-15423", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15423"], "modified": "2018-08-28T00:00:00", "id": "UB:CVE-2017-15423", "href": "https://ubuntu.com/security/CVE-2017-15423", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-08-04T13:46:53", "description": "Insufficient policy enforcement in Omnibox in Google Chrome prior to\n63.0.3239.84 allowed a remote attacker to perform domain spoofing via IDN\nhomographs in a crafted domain name.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2018-08-28T00:00:00", "type": "ubuntucve", "title": "CVE-2017-15426", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15426"], "modified": "2018-08-28T00:00:00", "id": "UB:CVE-2017-15426", "href": "https://ubuntu.com/security/CVE-2017-15426", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2022-08-04T13:46:54", "description": "Insufficient policy enforcement in Omnibox in Google Chrome prior to\n63.0.3239.84 allowed a remote attacker to perform domain spoofing via IDN\nhomographs in a crafted domain name.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2018-08-28T00:00:00", "type": "ubuntucve", "title": "CVE-2017-15425", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15425"], "modified": "2018-08-28T00:00:00", "id": "UB:CVE-2017-15425", "href": "https://ubuntu.com/security/CVE-2017-15425", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2022-08-04T13:46:54", "description": "Use of uninitialized memory in Skia in Google Chrome prior to 63.0.3239.84\nallowed a remote attacker to obtain potentially sensitive information from\nprocess memory via a crafted HTML page.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 4.3, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 1.4}, "published": "2018-08-28T00:00:00", "type": "ubuntucve", "title": "CVE-2017-15418", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15418"], "modified": "2018-08-28T00:00:00", "id": "UB:CVE-2017-15418", "href": "https://ubuntu.com/security/CVE-2017-15418", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-08-04T13:46:56", "description": "Incorrect serialization in IPC in Google Chrome prior to 63.0.3239.84\nallowed a remote attacker to leak the value of a pointer via a crafted HTML\npage.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2018-08-28T00:00:00", "type": "ubuntucve", "title": "CVE-2017-15415", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15415"], "modified": "2018-08-28T00:00:00", "id": "UB:CVE-2017-15415", "href": "https://ubuntu.com/security/CVE-2017-15415", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-08-04T13:46:54", "description": "Incorrect handling of back navigations in error pages in Navigation in\nGoogle Chrome prior to 63.0.3239.84 allowed a remote attacker to spoof the\ncontents of the Omnibox (URL bar) via a crafted HTML page.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2018-08-28T00:00:00", "type": "ubuntucve", "title": "CVE-2017-15420", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15420"], "modified": "2018-08-28T00:00:00", "id": "UB:CVE-2017-15420", "href": "https://ubuntu.com/security/CVE-2017-15420", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "debiancve": [{"lastseen": "2021-12-14T17:47:15", "description": "Type confusion in WebAssembly in V8 in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-08-28T19:29:00", "type": "debiancve", "title": "CVE-2017-15413", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15413"], "modified": "2018-08-28T19:29:00", "id": "DEBIANCVE:CVE-2017-15413", "href": "https://security-tracker.debian.org/tracker/CVE-2017-15413", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-14T17:47:15", "description": "Inappropriate implementation in Skia canvas composite operations in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to leak cross-origin data via a crafted HTML page.", "cvss3": {"exploitabilityScore": 1.6, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.3, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-08-28T19:29:00", "type": "debiancve", "title": "CVE-2017-15417", "bulletinFamily": "info", "cvss2": {"severity": "LOW", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.6, "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15417"], "modified": "2018-08-28T19:29:00", "id": "DEBIANCVE:CVE-2017-15417", "href": "https://security-tracker.debian.org/tracker/CVE-2017-15417", "cvss": {"score": 2.6, "vector": "AV:N/AC:H/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-12-14T17:47:15", "description": "Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a socially engineered user to XSS themselves by dragging and dropping a javascript: URL into the URL bar.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2018-08-28T19:29:00", "type": "debiancve", "title": "CVE-2017-15427", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15427"], "modified": "2018-08-28T19:29:00", "id": "DEBIANCVE:CVE-2017-15427", "href": "https://security-tracker.debian.org/tracker/CVE-2017-15427", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-12-14T17:47:15", "description": "Out-of-bounds Write in the QUIC networking stack in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to gain code execution via a malicious server.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-08-28T19:29:00", "type": "debiancve", "title": "CVE-2017-15407", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15407"], "modified": "2018-08-28T19:29:00", "id": "DEBIANCVE:CVE-2017-15407", "href": "https://security-tracker.debian.org/tracker/CVE-2017-15407", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-14T17:47:15", "description": "Heap buffer overflow in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file that is mishandled by PDFium.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-08-28T19:29:00", "type": "debiancve", "title": "CVE-2017-15408", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15408"], "modified": "2018-08-28T19:29:00", "id": "DEBIANCVE:CVE-2017-15408", "href": "https://security-tracker.debian.org/tracker/CVE-2017-15408", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-14T17:47:15", "description": "Heap buffer overflow in Blob API in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page, aka a Blink out-of-bounds read.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 6.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-08-28T19:29:00", "type": "debiancve", "title": "CVE-2017-15416", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15416"], "modified": "2018-08-28T19:29:00", "id": "DEBIANCVE:CVE-2017-15416", "href": "https://security-tracker.debian.org/tracker/CVE-2017-15416", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-12-14T17:47:15", "description": "Heap buffer overflow in Skia in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-08-28T19:29:00", "type": "debiancve", "title": "CVE-2017-15409", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15409"], "modified": "2018-08-28T19:29:00", "id": "DEBIANCVE:CVE-2017-15409", "href": "https://security-tracker.debian.org/tracker/CVE-2017-15409", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-14T17:47:15", "description": "Use after free in PDFium in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-08-28T19:29:00", "type": "debiancve", "title": "CVE-2017-15410", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15410"], "modified": "2018-08-28T19:29:00", "id": "DEBIANCVE:CVE-2017-15410", "href": "https://security-tracker.debian.org/tracker/CVE-2017-15410", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-14T17:47:15", "description": "Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "baseScore": 6.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-08-28T19:29:00", "type": "debiancve", "title": "CVE-2017-15424", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15424"], "modified": "2018-08-28T19:29:00", "id": "DEBIANCVE:CVE-2017-15424", "href": "https://security-tracker.debian.org/tracker/CVE-2017-15424", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-12-14T17:47:15", "description": "Use after free in PDFium in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-08-28T19:29:00", "type": "debiancve", "title": "CVE-2017-15411", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15411"], "modified": "2018-08-28T19:29:00", "id": "DEBIANCVE:CVE-2017-15411", "href": "https://security-tracker.debian.org/tracker/CVE-2017-15411", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-14T17:47:15", "description": "Insufficient policy enforcement in Resource Timing API in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to infer browsing history by triggering a leaked cross-origin URL via a crafted HTML page.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 6.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-08-28T19:29:00", "type": "debiancve", "title": "CVE-2017-15419", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15419"], "modified": "2018-08-28T19:29:00", "id": "DEBIANCVE:CVE-2017-15419", "href": "https://security-tracker.debian.org/tracker/CVE-2017-15419", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-12-14T17:47:15", "description": "Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "baseScore": 6.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-08-28T19:29:00", "type": "debiancve", "title": "CVE-2017-15426", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15426"], "modified": "2018-08-28T19:29:00", "id": "DEBIANCVE:CVE-2017-15426", "href": "https://security-tracker.debian.org/tracker/CVE-2017-15426", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-12-14T17:47:15", "description": "Inappropriate implementation in BoringSSL SPAKE2 in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to leak the low-order bits of SHA512(password) by inspecting protocol traffic.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.3, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 1.4}, "published": "2018-08-28T19:29:00", "type": "debiancve", "title": "CVE-2017-15423", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15423"], "modified": "2018-08-28T19:29:00", "id": "DEBIANCVE:CVE-2017-15423", "href": "https://security-tracker.debian.org/tracker/CVE-2017-15423", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-12-14T17:47:15", "description": "Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "baseScore": 6.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-08-28T19:29:00", "type": "debiancve", "title": "CVE-2017-15425", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15425"], "modified": "2018-08-28T19:29:00", "id": "DEBIANCVE:CVE-2017-15425", "href": "https://security-tracker.debian.org/tracker/CVE-2017-15425", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-12-14T17:47:15", "description": "Use of uninitialized memory in Skia in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 1.4}, "published": "2018-08-28T19:29:00", "type": "debiancve", "title": "CVE-2017-15418", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15418"], "modified": "2018-08-28T19:29:00", "id": "DEBIANCVE:CVE-2017-15418", "href": "https://security-tracker.debian.org/tracker/CVE-2017-15418", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-12-14T17:47:15", "description": "Incorrect serialization in IPC in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to leak the value of a pointer via a crafted HTML page.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 6.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-08-28T19:29:00", "type": "debiancve", "title": "CVE-2017-15415", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15415"], "modified": "2018-08-28T19:29:00", "id": "DEBIANCVE:CVE-2017-15415", "href": "https://security-tracker.debian.org/tracker/CVE-2017-15415", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-12-14T17:47:15", "description": "Incorrect handling of back navigations in error pages in Navigation in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "baseScore": 6.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-08-28T19:29:00", "type": "debiancve", "title": "CVE-2017-15420", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15420"], "modified": "2018-08-28T19:29:00", "id": "DEBIANCVE:CVE-2017-15420", "href": "https://security-tracker.debian.org/tracker/CVE-2017-15420", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "cve": [{"lastseen": "2023-02-08T15:52:59", "description": "Type confusion in WebAssembly in V8 in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-08-28T19:29:00", "type": "cve", "title": "CVE-2017-15413", "cwe": ["CWE-704"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15413"], "modified": "2018-10-25T01:59:00", "cpe": ["cpe:/o:debian:debian_linux:9.0", "cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0"], "id": "CVE-2017-15413", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15413", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2023-02-08T15:52:58", "description": "Inappropriate implementation in Skia canvas composite operations in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to leak cross-origin data via a crafted HTML page.", "cvss3": {"exploitabilityScore": 1.6, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.3, "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2018-08-28T19:29:00", "type": "cve", "title": "CVE-2017-15417", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.6, "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15417"], "modified": "2018-11-07T18:01:00", "cpe": ["cpe:/o:debian:debian_linux:9.0", "cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0"], "id": "CVE-2017-15417", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15417", "cvss": {"score": 2.6, "vector": "AV:N/AC:H/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2023-02-08T15:53:03", "description": "Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a socially engineered user to XSS themselves by dragging and dropping a javascript: URL into the URL bar.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 6.1, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2018-08-28T19:29:00", "type": "cve", "title": "CVE-2017-15427", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15427"], "modified": "2018-11-02T17:34:00", "cpe": ["cpe:/o:debian:debian_linux:9.0", "cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0"], "id": "CVE-2017-15427", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15427", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2023-02-08T15:52:58", "description": "Out-of-bounds Write in the QUIC networking stack in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to gain code execution via a malicious server.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-08-28T19:29:00", "type": "cve", "title": "CVE-2017-15407", "cwe": ["CWE-787"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15407"], "modified": "2018-11-20T18:13:00", "cpe": ["cpe:/o:debian:debian_linux:9.0", "cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0"], "id": "CVE-2017-15407", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15407", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2023-02-08T15:52:56", "description": "Heap buffer overflow in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file that is mishandled by PDFium.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-08-28T19:29:00", "type": "cve", "title": "CVE-2017-15408", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15408"], "modified": "2018-10-31T16:00:00", "cpe": ["cpe:/o:debian:debian_linux:9.0", "cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0"], "id": "CVE-2017-15408", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15408", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2023-02-08T15:52:58", "description": "Heap buffer overflow in Blob API in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page, aka a Blink out-of-bounds read.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2018-08-28T19:29:00", "type": "cve", "title": "CVE-2017-15416", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15416"], "modified": "2018-11-07T17:51:00", "cpe": ["cpe:/o:debian:debian_linux:9.0", "cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0"], "id": "CVE-2017-15416", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15416", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2023-02-08T15:52:56", "description": "Heap buffer overflow in Skia in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-08-28T19:29:00", "type": "cve", "title": "CVE-2017-15409", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15409"], "modified": "2018-10-31T15:59:00", "cpe": ["cpe:/o:debian:debian_linux:9.0", "cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0"], "id": "CVE-2017-15409", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15409", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2023-02-08T15:52:57", "description": "Use after free in PDFium in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-08-28T19:29:00", "type": "cve", "title": "CVE-2017-15410", "cwe": ["CWE-416"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15410"], "modified": "2018-10-30T16:48:00", "cpe": ["cpe:/o:debian:debian_linux:9.0", "cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0"], "id": "CVE-2017-15410", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15410", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2023-02-08T15:52:59", "description": "Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2018-08-28T19:29:00", "type": "cve", "title": "CVE-2017-15424", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15424"], "modified": "2018-10-30T16:47:00", "cpe": ["cpe:/o:debian:debian_linux:9.0", "cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0"], "id": "CVE-2017-15424", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15424", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2023-02-08T15:52:59", "description": "Use after free in PDFium in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-08-28T19:29:00", "type": "cve", "title": "CVE-2017-15411", "cwe": ["CWE-416"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15411"], "modified": "2018-10-30T16:48:00", "cpe": ["cpe:/o:debian:debian_linux:9.0", "cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0"], "id": "CVE-2017-15411", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15411", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2023-02-08T15:52:59", "description": "Insufficient policy enforcement in Resource Timing API in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to infer browsing history by triggering a leaked cross-origin URL via a crafted HTML page.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2018-08-28T19:29:00", "type": "cve", "title": "CVE-2017-15419", "cwe": ["CWE-601"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15419"], "modified": "2018-11-07T14:55:00", "cpe": ["cpe:/o:debian:debian_linux:9.0", "cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0"], "id": "CVE-2017-15419", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15419", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2023-02-08T15:53:01", "description": "Inappropriate implementation in BoringSSL SPAKE2 in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to leak the low-order bits of SHA512(password) by inspecting protocol traffic.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.3, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 1.4}, "published": "2018-08-28T19:29:00", "type": "cve", "title": "CVE-2017-15423", "cwe": ["CWE-310"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15423"], "modified": "2018-11-02T17:37:00", "cpe": ["cpe:/o:debian:debian_linux:9.0", "cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0"], "id": "CVE-2017-15423", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15423", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2023-02-08T15:53:00", "description": "Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2018-08-28T19:29:00", "type": "cve", "title": "CVE-2017-15426", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15426"], "modified": "2018-10-30T16:47:00", "cpe": ["cpe:/o:debian:debian_linux:9.0", "cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0"], "id": "CVE-2017-15426", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15426", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2023-02-08T15:53:02", "description": "Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2018-08-28T19:29:00", "type": "cve", "title": "CVE-2017-15425", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15425"], "modified": "2018-10-30T16:47:00", "cpe": ["cpe:/o:debian:debian_linux:9.0", "cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0"], "id": "CVE-2017-15425", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15425", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2023-02-08T15:52:58", "description": "Use of uninitialized memory in Skia in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 4.3, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 1.4}, "published": "2018-08-28T19:29:00", "type": "cve", "title": "CVE-2017-15418", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15418"], "modified": "2018-10-24T14:30:00", "cpe": ["cpe:/o:debian:debian_linux:9.0", "cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0"], "id": "CVE-2017-15418", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15418", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2023-02-08T15:52:59", "description": "Incorrect serialization in IPC in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to leak the value of a pointer via a crafted HTML page.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2018-08-28T19:29:00", "type": "cve", "title": "CVE-2017-15415", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15415"], "modified": "2019-10-03T00:03:00", "cpe": ["cpe:/o:debian:debian_linux:9.0", "cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0"], "id": "CVE-2017-15415", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15415", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2023-02-08T15:53:00", "description": "Incorrect handling of back navigations in error pages in Navigation in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2018-08-28T19:29:00", "type": "cve", "title": "CVE-2017-15420", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15420"], "modified": "2019-01-09T19:29:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:debian:debian_linux:9.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0"], "id": "CVE-2017-15420", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15420", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"]}], "redhatcve": [{"lastseen": "2022-07-09T16:40:27", "description": "Type confusion in WebAssembly in V8 in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2017-12-07T10:20:51", "type": "redhatcve", "title": "CVE-2017-15413", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15413"], "modified": "2022-07-09T15:50:06", "id": "RH:CVE-2017-15413", "href": "https://access.redhat.com/security/cve/cve-2017-15413", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-07-09T16:40:24", "description": "Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a socially engineered user to XSS themselves by dragging and dropping a javascript: URL into the URL bar.\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 6.1, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2017-12-07T10:20:34", "type": "redhatcve", "title": "CVE-2017-15427", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15427"], "modified": "2022-07-09T15:50:25", "id": "RH:CVE-2017-15427", "href": "https://access.redhat.com/security/cve/cve-2017-15427", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2022-07-09T16:40:24", "description": "Inappropriate implementation in Skia canvas composite operations in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n", "cvss3": {"exploitabilityScore": 1.6, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.3, "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2017-12-07T10:22:04", "type": "redhatcve", "title": "CVE-2017-15417", "bulletinFamily": "info", "cvss2": {"severity": "LOW", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.6, "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15417"], "modified": "2022-07-09T15:50:12", "id": "RH:CVE-2017-15417", "href": "https://access.redhat.com/security/cve/cve-2017-15417", "cvss": {"score": 2.6, "vector": "AV:N/AC:H/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-07-09T16:40:25", "description": "Out-of-bounds Write in the QUIC networking stack in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to gain code execution via a malicious server.\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2017-12-07T10:23:25", "type": "redhatcve", "title": "CVE-2017-15407", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15407"], "modified": "2022-07-09T15:49:58", "id": "RH:CVE-2017-15407", "href": "https://access.redhat.com/security/cve/cve-2017-15407", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-07-09T16:40:23", "description": "Heap buffer overflow in Blob API in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page, aka a Blink out-of-bounds read.\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2017-12-07T10:22:19", "type": "redhatcve", "title": "CVE-2017-15416", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15416"], "modified": "2022-07-09T15:50:11", "id": "RH:CVE-2017-15416", "href": "https://access.redhat.com/security/cve/cve-2017-15416", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-07-09T16:40:27", "description": "Heap buffer overflow in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file that is mishandled by PDFium.\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2017-12-07T10:24:20", "type": "redhatcve", "title": "CVE-2017-15408", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15408"], "modified": "2022-07-09T15:49:59", "id": "RH:CVE-2017-15408", "href": "https://access.redhat.com/security/cve/cve-2017-15408", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-07-09T16:40:25", "description": "Use after free in PDFium in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2017-12-07T10:21:48", "type": "redhatcve", "title": "CVE-2017-15410", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15410"], "modified": "2022-07-09T15:50:01", "id": "RH:CVE-2017-15410", "href": "https://access.redhat.com/security/cve/cve-2017-15410", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-07-09T16:40:25", "description": "Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2017-12-07T10:24:50", "type": "redhatcve", "title": "CVE-2017-15424", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15424"], "modified": "2022-07-09T15:50:21", "id": "RH:CVE-2017-15424", "href": "https://access.redhat.com/security/cve/cve-2017-15424", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2022-07-09T16:40:23", "description": "Heap buffer overflow in Skia in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2017-12-07T10:24:35", "type": "redhatcve", "title": "CVE-2017-15409", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15409"], "modified": "2022-07-09T15:50:01", "id": "RH:CVE-2017-15409", "href": "https://access.redhat.com/security/cve/cve-2017-15409", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-07-09T16:40:22", "description": "Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2017-12-07T10:20:14", "type": "redhatcve", "title": "CVE-2017-15426", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15426"], "modified": "2022-07-09T15:50:22", "id": "RH:CVE-2017-15426", "href": "https://access.redhat.com/security/cve/cve-2017-15426", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2022-07-09T16:40:25", "description": "Inappropriate implementation in BoringSSL SPAKE2 in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to leak the low-order bits of SHA512(password) by inspecting protocol traffic.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.3, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 1.4}, "published": "2017-12-07T10:23:53", "type": "redhatcve", "title": "CVE-2017-15423", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15423"], "modified": "2022-07-09T15:50:20", "id": "RH:CVE-2017-15423", "href": "https://access.redhat.com/security/cve/cve-2017-15423", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-07-09T16:40:24", "description": "Use after free in PDFium in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2017-12-07T10:21:27", "type": "redhatcve", "title": "CVE-2017-15411", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15411"], "modified": "2022-07-09T15:50:05", "id": "RH:CVE-2017-15411", "href": "https://access.redhat.com/security/cve/cve-2017-15411", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-07-09T16:40:27", "description": "Insufficient policy enforcement in Resource Timing API in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to infer browsing history by triggering a leaked cross-origin URL via a crafted HTML page.\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2017-12-07T10:22:49", "type": "redhatcve", "title": "CVE-2017-15419", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15419"], "modified": "2022-07-09T15:50:15", "id": "RH:CVE-2017-15419", "href": "https://access.redhat.com/security/cve/cve-2017-15419", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-07-09T16:40:25", "description": "Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2017-12-07T10:25:06", "type": "redhatcve", "title": "CVE-2017-15425", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15425"], "modified": "2022-07-09T15:50:22", "id": "RH:CVE-2017-15425", "href": "https://access.redhat.com/security/cve/cve-2017-15425", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2022-07-09T16:40:24", "description": "Use of uninitialized memory in Skia in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 4.3, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 1.4}, "published": "2017-12-07T10:23:08", "type": "redhatcve", "title": "CVE-2017-15418", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15418"], "modified": "2022-07-09T15:50:12", "id": "RH:CVE-2017-15418", "href": "https://access.redhat.com/security/cve/cve-2017-15418", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-07-09T16:40:22", "description": "Incorrect serialization in IPC in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to leak the value of a pointer via a crafted HTML page.\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2017-12-07T10:22:34", "type": "redhatcve", "title": "CVE-2017-15415", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15415"], "modified": "2022-07-09T15:50:10", "id": "RH:CVE-2017-15415", "href": "https://access.redhat.com/security/cve/cve-2017-15415", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-07-09T16:40:27", "description": "Incorrect handling of back navigations in error pages in Navigation in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2017-12-07T10:24:06", "type": "redhatcve", "title": "CVE-2017-15420", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15420"], "modified": "2022-07-09T15:50:16", "id": "RH:CVE-2017-15420", "href": "https://access.redhat.com/security/cve/cve-2017-15420", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "threatpost": [{"lastseen": "2019-06-09T05:50:10", "description": "A side-channel vulnerability in Google Chrome and Mozilla Firefox allows drive-by de-anonymization of Facebook users.\n\nAn exploit would allow an attacker to pick up the profile picture, username and the \u201clikes\u201d of unsuspecting visitors who find themselves landing on a malicious website \u2013 with no additional user interaction.\n\nThe vulnerability ([CVE-2017-15417](<https://bugs.chromium.org/p/chromium/issues/detail?id=699028>)) lies in certain browser implementations of the \u201cmix-blend-mode\u201d [feature](<https://css-tricks.com/almanac/properties/m/mix-blend-mode/>) of Cascading Style Sheets 3 (CSS3), one of the core technologies for building web pages. Mix-blend-mode allows web designers to select how website content blends with background elements; the flaw within it allows visual content to leak from cross-origin IFrames.\n\nIn an [analysis](<https://www.evonide.com/side-channel-attacking-browsers-through-css3-features/>), Google security engineer Ruslan Habalov and white-hat [Dario Wei\u00dfer](<http://www.twitter.com/haxonaut>) said that for an exploit to work, the victim must be logged into Facebook. The visual data leak/attack could then be carried out when the user visits websites using IFrames containing social plugins and \u201clog in with Facebook\u201d buttons, which the researchers refer to as \u201cendpoints.\u201d\n\nA weaponized website can\u2019t access the content of IFrames directly, but attackers can determine a cross-origin IFrame\u2019s content embedded in a page by simply overlaying the target with a stack of <div> elements that have mix-blend-mode enabled.\n\nWeb designers use <div> elements <div> to group together HTML elements on a page, applying CSS styles to many elements at once. The overlay interacts with the underlying pixels, allowing an exploit to infer what the content is visually by measuring the time it takes to render an individual pixel: That time varies by color. By analyzing the different rendering times for each pixel, it\u2019s possible to determine the color of that pixel to reconstruct a visual representation of the targeted content.\n\n\u201cThe rendering of this stack can\u2026take a variable amount of time depending on the underlying pixel color inside the IFrame,\u201d Habalov explained in the post. \u201cBy moving this <div> \u2018scan\u2019 stack across the IFrame, forcing re-renderings and measuring the individual rendering times, it is possible to [lift the content out of the targeted IFrame].\u201d\n\nIn the case of Facebook, the researchers constructed a proof-of-concept HTML file containing a payload for the discovered bug.\n\n\u201cOpening this file is enough to load different Facebook endpoints inside IFrames and to start exploitation, which can be fully camouflaged,\u201d Habalov said. To the latter point, the PoC attack toggles an animated cat overlay which obscures the leakage.\n\nThe PoC attack, which Habalov said is \u201cinefficient,\u201d took about 20 seconds to reveal a user name, five minutes to leak a fuzzy version of a profile picture, and 500 milliseconds to check the like status for any given site.\n\n[](<https://media.threatpost.com/wp-content/uploads/sites/103/2018/06/01162328/facebook-de-anonymization.jpg>)\n\nThe attack also works to display the profile pictures of the victim\u2019s friends who have liked the same page as the victim did; and for leaking the user\u2019s [like status](<https://www.evonide.com/other/like_leak.gif>) of arbitrary pages.\n\nThe two only demonstrated the attack potential against Facebook, but Habalov said that \u201cthroughout the web there are tons of other sensitive resources which could be affected by attacks like this in a similar fashion.\u201d\n\nHe added, \u201cSide-channel vulnerabilities are very sneaky and sometimes hard to patch as was seen with the quite recent and ongoing [Meltdown/Spectre](<https://threatpost.com/new-microsoft-bug-bounty-program-looks-to-squash-the-next-spectre-meltdown/130523/>) discoveries. Similarly, it is no surprise that an ever-growing browser feature landscape and more demanding performance for all these features contributes even more to this core problematic in its own way. Particularly, mix-blend-mode is only the tip of the iceberg when it comes to the gigantic rendering feature amount CSS3 and webkit have already introduced.\u201d\n\nGoogle and Mozilla have both issued [patches](<https://bugs.chromium.org/p/chromium/issues/detail?id=699028>) for the flaw.\n", "cvss3": {}, "published": "2018-06-01T20:47:50", "type": "threatpost", "title": "Browser Side-Channel Flaw De-Anonymizes Facebook Data", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2017-15417", "CVE-2019-0841"], "modified": "2018-06-01T20:47:50", "id": "THREATPOST:BC7785C1AA5CE337FD6268A2941438EE", "href": "https://threatpost.com/browser-side-channel-flaw-de-anonymizes-facebook-data/132465/", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "debian": [{"lastseen": "2021-10-21T21:45:08", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4103-1 security@debian.org\nhttps://www.debian.org/security/ Michael Gilbert\nJanuary 31, 2018 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : chromium-browser\nCVE ID : CVE-2017-15420 CVE-2017-15429 CVE-2018-6031 CVE-2018-6032\n CVE-2018-6033 CVE-2018-6034 CVE-2018-6035 CVE-2018-6036\n CVE-2018-6037 CVE-2018-6038 CVE-2018-6039 CVE-2018-6040\n CVE-2018-6041 CVE-2018-6042 CVE-2018-6043 CVE-2018-6045\n CVE-2018-6046 CVE-2018-6047 CVE-2018-6048 CVE-2018-6049\n CVE-2018-6050 CVE-2018-6051 CVE-2018-6052 CVE-2018-6053\n CVE-2018-6054\n\nSeveral vulnerabilities have been discovered in the chromium web browser.\n\nCVE-2017-15420\n\n Drew Springall discovered a URL spoofing issue.\n\nCVE-2017-15429\n\n A cross-site scripting issue was discovered in the v8 javascript\n library.\n\nCVE-2018-6031\n\n A use-after-free issue was discovered in the pdfium library.\n\nCVE-2018-6032\n\n Jun Kokatsu discovered a way to bypass the same origin policy.\n\nCVE-2018-6033\n\n Juho Nurminen discovered a race condition when opening downloaded\n files.\n\nCVE-2018-6034\n\n Tobias Klein discovered an integer overflow issue.\n\nCVE-2018-6035\n\n Rob Wu discovered a way for extensions to access devtools.\n\nCVE-2018-6036\n\n UK's National Cyper Security Centre discovered an integer overflow\n issue.\n\nCVE-2018-6037\n\n Paul Stone discovered an issue in the autofill feature.\n\nCVE-2018-6038\n\n cloudfuzzer discovered a buffer overflow issue.\n\nCVE-2018-6039\n\n Juho Nurminen discovered a cross-site scripting issue in the\n developer tools.\n\nCVE-2018-6040\n\n WenXu Wu discovered a way to bypass the content security policy.\n\nCVE-2018-6041\n\n Luan Herrera discovered a URL spoofing issue.\n\nCVE-2018-6042\n\n Khalil Zhani discovered a URL spoofing issue.\n\nCVE-2018-6043\n\n A character escaping issue was discovered.\n\nCVE-2018-6045\n\n Rob Wu discovered a way for extensions to access devtools.\n\nCVE-2018-6046\n\n Rob Wu discovered a way for extensions to access devtools.\n\nCVE-2018-6047\n\n Masato Kinugawa discovered an information leak issue.\n\nCVE-2018-6048\n\n Jun Kokatsu discoverd a way to bypass the referrer policy.\n\nCVE-2018-6049\n\n WenXu Wu discovered a user interface spoofing issue.\n\nCVE-2018-6050\n\n Jonathan Kew discovered a URL spoofing issue.\n\nCVE-2018-6051\n\n Anonio Sanso discovered an information leak issue.\n\nCVE-2018-6052\n\n Tanner Emek discovered that the referrer policy implementation\n was incomplete.\n\nCVE-2018-6053\n\n Asset Kabdenov discoved an information leak issue.\n\nCVE-2018-6054\n\n Rob Wu discovered a use-after-free issue.\n\nFor the oldstable distribution (jessie), security support for chromium\nhas been discontinued.\n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 64.0.3282.119-1~deb9u1.\n\nWe recommend that you upgrade your chromium-browser packages.\n\nFor the detailed security status of chromium-browser please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/chromium-browser\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-02-01T02:59:02", "type": "debian", "title": "[SECURITY] [DSA 4103-1] chromium-browser security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15420", "CVE-2017-15429", "CVE-2018-6031", "CVE-2018-6032", "CVE-2018-6033", "CVE-2018-6034", "CVE-2018-6035", "CVE-2018-6036", "CVE-2018-6037", "CVE-2018-6038", "CVE-2018-6039", "CVE-2018-6040", "CVE-2018-6041", "CVE-2018-6042", "CVE-2018-6043", "CVE-2018-6045", "CVE-2018-6046", "CVE-2018-6047", "CVE-2018-6048", "CVE-2018-6049", "CVE-2018-6050", "CVE-2018-6051", "CVE-2018-6052", "CVE-2018-6053", "CVE-2018-6054"], "modified": "2018-02-01T02:59:02", "id": "DEBIAN:DSA-4103-1:4A64B", "href": "https://lists.debian.org/debian-security-announce/2018/msg00026.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}]}