Google Chrome < 71.0.3578.80 Multiple Vulnerabilities
2018-12-10T00:00:00
ID GOOGLE_CHROME_71_0_3578_80.NASL Type nessus Reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2021-03-02T00:00:00
Description
The version of Google Chrome installed on the remote Windows host is
prior to 71.0.3578.80. It is, therefore, affected by multiple
vulnerabilities as noted in Google Chrome stable channel update
release notes for 2018/12/04. Please refer to the release notes for
additional information. Note that Nessus has not attempted to exploit
these issues but has instead relied only on the application's self-
reported version number.
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(119558);
script_version("1.5");
script_cvs_date("Date: 2019/11/01");
script_cve_id(
"CVE-2018-17480",
"CVE-2018-17481",
"CVE-2018-18335",
"CVE-2018-18336",
"CVE-2018-18337",
"CVE-2018-18338",
"CVE-2018-18339",
"CVE-2018-18340",
"CVE-2018-18341",
"CVE-2018-18342",
"CVE-2018-18343",
"CVE-2018-18344",
"CVE-2018-18345",
"CVE-2018-18346",
"CVE-2018-18347",
"CVE-2018-18348",
"CVE-2018-18349",
"CVE-2018-18350",
"CVE-2018-18351",
"CVE-2018-18352",
"CVE-2018-18353",
"CVE-2018-18354",
"CVE-2018-18355",
"CVE-2018-18356",
"CVE-2018-18357",
"CVE-2018-18358",
"CVE-2018-18359"
);
script_name(english:"Google Chrome < 71.0.3578.80 Multiple Vulnerabilities");
script_summary(english:"Checks the version of Google Chrome.");
script_set_attribute(attribute:"synopsis", value:
"A web browser installed on the remote Windows host is affected by
multiple vulnerabilities");
script_set_attribute(attribute:"description", value:
"The version of Google Chrome installed on the remote Windows host is
prior to 71.0.3578.80. It is, therefore, affected by multiple
vulnerabilities as noted in Google Chrome stable channel update
release notes for 2018/12/04. Please refer to the release notes for
additional information. Note that Nessus has not attempted to exploit
these issues but has instead relied only on the application's self-
reported version number.");
# https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?084b0392");
script_set_attribute(attribute:"solution", value:
"Upgrade to Google Chrome version 71.0.3578.80 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-18359");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"vuln_publication_date", value:"2018/12/04");
script_set_attribute(attribute:"patch_publication_date", value:"2018/12/04");
script_set_attribute(attribute:"plugin_publication_date", value:"2018/12/10");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:google:chrome");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("google_chrome_installed.nasl");
script_require_keys("SMB/Google_Chrome/Installed");
exit(0);
}
include("google_chrome_version.inc");
get_kb_item_or_exit("SMB/Google_Chrome/Installed");
installs = get_kb_list("SMB/Google_Chrome/*");
google_chrome_check_version(installs:installs, fix:'71.0.3578.80', severity:SECURITY_WARNING, xss:FALSE, xsrf:FALSE);
{"id": "GOOGLE_CHROME_71_0_3578_80.NASL", "bulletinFamily": "scanner", "title": "Google Chrome < 71.0.3578.80 Multiple Vulnerabilities", "description": "The version of Google Chrome installed on the remote Windows host is\nprior to 71.0.3578.80. It is, therefore, affected by multiple\nvulnerabilities as noted in Google Chrome stable channel update\nrelease notes for 2018/12/04. Please refer to the release notes for\nadditional information. Note that Nessus has not attempted to exploit\nthese issues but has instead relied only on the application's self-\nreported version number.", "published": "2018-12-10T00:00:00", "modified": "2021-03-02T00:00:00", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "href": "https://www.tenable.com/plugins/nessus/119558", "reporter": "This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["http://www.nessus.org/u?084b0392"], "cvelist": ["CVE-2018-18348", "CVE-2018-18354", "CVE-2018-18349", "CVE-2018-18355", "CVE-2018-18358", "CVE-2018-18346", "CVE-2018-18352", "CVE-2018-18347", "CVE-2018-18340", "CVE-2018-18339", "CVE-2018-18357", "CVE-2018-18337", "CVE-2018-17481", "CVE-2018-18351", "CVE-2018-18336", "CVE-2018-18343", "CVE-2018-18342", "CVE-2018-18344", "CVE-2018-18359", "CVE-2018-18335", "CVE-2018-17480", "CVE-2018-18338", "CVE-2018-18345", "CVE-2018-18353", "CVE-2018-18341", "CVE-2018-18356", "CVE-2018-18350"], "type": "nessus", "lastseen": "2021-03-01T03:24:35", "edition": 26, "viewCount": 21, "enchantments": {"dependencies": {"references": [{"type": "openvas", "idList": ["OPENVAS:1361412562310704352", "OPENVAS:1361412562310852183", "OPENVAS:1361412562310852166", "OPENVAS:1361412562310875411", "OPENVAS:1361412562310852318", "OPENVAS:1361412562310814366", "OPENVAS:1361412562310852302", "OPENVAS:1361412562310814568", "OPENVAS:1361412562310814364", "OPENVAS:1361412562310814365"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2019:0250-1", "OPENSUSE-SU-2019:0202-1", "OPENSUSE-SU-2018:4056-1", "OPENSUSE-SU-2019:0248-1", "OPENSUSE-SU-2018:4142-1", "OPENSUSE-SU-2018:4122-1", "OPENSUSE-SU-2018:4143-1"]}, {"type": "freebsd", "idList": ["546D4DD4-10EA-11E9-B407-080027EF1A23", "720590DF-10EB-11E9-B407-080027EF1A23"]}, {"type": "kaspersky", "idList": ["KLA11416", "KLA11425", "KLA11734", "KLA11379", "KLA11391"]}, {"type": "archlinux", "idList": ["ASA-201812-2", "ASA-201902-23"]}, {"type": "nessus", "idList": ["GENTOO_GLSA-201908-18.NASL", "FREEBSD_PKG_546D4DD410EA11E9B407080027EF1A23.NASL", "MACOSX_GOOGLE_CHROME_71_0_3578_80.NASL", "OPENSUSE-2019-977.NASL", "FEDORA_2019-348547A32D.NASL", "OPENSUSE-2018-1521.NASL", "REDHAT-RHSA-2018-3803.NASL", "FEDORA_2019-859384E002.NASL", "DEBIAN_DSA-4352.NASL", "OPENSUSE-2018-1557.NASL"]}, {"type": "redhat", "idList": ["RHSA-2018:3803", "RHSA-2019:0373"]}, {"type": "fedora", "idList": ["FEDORA:B9CAE6075F01", "FEDORA:321C46062CBF"]}, {"type": "debian", "idList": ["DEBIAN:DSA-4352-1:4B281", "DEBIAN:DLA-1677-1:027F0"]}, {"type": "cve", "idList": ["CVE-2018-18358", "CVE-2018-18354", "CVE-2018-18340", "CVE-2018-18353", "CVE-2018-18343", "CVE-2018-18337", "CVE-2018-18338", "CVE-2018-17481", "CVE-2018-18351", "CVE-2018-18339"]}, {"type": "threatpost", "idList": ["THREATPOST:C27BDB046EB4CC077E8F09F986E83F95"]}, {"type": "slackware", "idList": ["SSA-2019-044-01", "SSA-2019-045-01"]}, {"type": "centos", "idList": ["CESA-2019:0374", "CESA-2019:0373"]}, {"type": "oraclelinux", "idList": ["ELSA-2019-0373", "ELSA-2019-0374"]}], "modified": "2021-03-01T03:24:35", "rev": 2}, "score": {"value": 6.9, "vector": "NONE", "modified": "2021-03-01T03:24:35", "rev": 2}, "vulnersScore": 6.9}, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(119558);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/11/01\");\n\n script_cve_id(\n \"CVE-2018-17480\",\n \"CVE-2018-17481\",\n \"CVE-2018-18335\",\n \"CVE-2018-18336\",\n \"CVE-2018-18337\",\n \"CVE-2018-18338\",\n \"CVE-2018-18339\",\n \"CVE-2018-18340\",\n \"CVE-2018-18341\",\n \"CVE-2018-18342\",\n \"CVE-2018-18343\",\n \"CVE-2018-18344\",\n \"CVE-2018-18345\",\n \"CVE-2018-18346\",\n \"CVE-2018-18347\",\n \"CVE-2018-18348\",\n \"CVE-2018-18349\",\n \"CVE-2018-18350\",\n \"CVE-2018-18351\",\n \"CVE-2018-18352\",\n \"CVE-2018-18353\",\n \"CVE-2018-18354\",\n \"CVE-2018-18355\",\n \"CVE-2018-18356\",\n \"CVE-2018-18357\",\n \"CVE-2018-18358\",\n \"CVE-2018-18359\"\n );\n\n script_name(english:\"Google Chrome < 71.0.3578.80 Multiple Vulnerabilities\");\n script_summary(english:\"Checks the version of Google Chrome.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A web browser installed on the remote Windows host is affected by\nmultiple vulnerabilities\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote Windows host is\nprior to 71.0.3578.80. It is, therefore, affected by multiple\nvulnerabilities as noted in Google Chrome stable channel update\nrelease notes for 2018/12/04. Please refer to the release notes for\nadditional information. Note that Nessus has not attempted to exploit\nthese issues but has instead relied only on the application's self-\nreported version number.\");\n # https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?084b0392\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome version 71.0.3578.80 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-18359\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/12/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/12/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/12/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"google_chrome_installed.nasl\");\n script_require_keys(\"SMB/Google_Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"SMB/Google_Chrome/Installed\");\ninstalls = get_kb_list(\"SMB/Google_Chrome/*\");\n\ngoogle_chrome_check_version(installs:installs, fix:'71.0.3578.80', severity:SECURITY_WARNING, xss:FALSE, xsrf:FALSE);\n", "naslFamily": "Windows", "pluginID": "119558", "cpe": ["cpe:/a:google:chrome"], "scheme": null, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}}
{"openvas": [{"lastseen": "2019-05-29T18:32:50", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-18348", "CVE-2018-18354", "CVE-2018-18349", "CVE-2018-18355", "CVE-2018-18358", "CVE-2018-18346", "CVE-2018-18352", "CVE-2018-18347", "CVE-2018-18340", "CVE-2018-18339", "CVE-2018-18357", "CVE-2018-18337", "CVE-2018-17481", "CVE-2018-18351", "CVE-2018-18336", "CVE-2018-18343", "CVE-2018-18342", "CVE-2018-18344", "CVE-2018-18359", "CVE-2018-18335", "CVE-2018-17480", "CVE-2018-18338", "CVE-2018-18345", "CVE-2018-18341", "CVE-2018-18356", "CVE-2018-18350"], "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "modified": "2019-05-17T00:00:00", "published": "2018-12-05T00:00:00", "id": "OPENVAS:1361412562310814365", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814365", "type": "openvas", "title": "Google Chrome Security Updates(stable-channel-update-for-desktop-2018-12)-Linux", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Security Updates(stable-channel-update-for-desktop-2018-12)-Linux\n#\n# Authors:\n# Vidita V Koushik <vidita@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814365\");\n script_version(\"2019-05-17T10:45:27+0000\");\n script_cve_id(\"CVE-2018-17480\", \"CVE-2018-17481\", \"CVE-2018-18335\", \"CVE-2018-18336\",\n \"CVE-2018-18337\", \"CVE-2018-18338\", \"CVE-2018-18339\", \"CVE-2018-18340\",\n \"CVE-2018-18341\", \"CVE-2018-18342\", \"CVE-2018-18343\", \"CVE-2018-18344\",\n \"CVE-2018-18345\", \"CVE-2018-18346\", \"CVE-2018-18347\", \"CVE-2018-18348\",\n \"CVE-2018-18349\", \"CVE-2018-18350\", \"CVE-2018-18351\", \"CVE-2018-18352\",\n \"CVE-2018-18354\", \"CVE-2018-18355\", \"CVE-2018-18356\", \"CVE-2018-18357\",\n \"CVE-2018-18358\", \"CVE-2018-18359\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-05-17 10:45:27 +0000 (Fri, 17 May 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-12-05 14:52:39 +0530 (Wed, 05 Dec 2018)\");\n script_name(\"Google Chrome Security Updates(stable-channel-update-for-desktop-2018-12)-Linux\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"The multiple flaws exist due to\n\n - Multiple out of bounds write error in V8.\n\n - Multiple use after free errors in PDFium, Blink, WebAudio, MediaRecorder,\n Skia and Extensions.\n\n - Multiple heap buffer overflow errors in Skia, Canvas and Blink.\n\n - Inappropriate implementations in Extensions, Site Isolation, Navigation,\n Omnibox, Media, Network Authentication and PDFium.\n\n - Multiple issues in SQLite via WebSQL.\n\n - Incorrect security UI in Blink.\n\n - Insufficient policy enforcements in Blink, Navigation, URL Formatter,\n Proxy and Payments.\n\n - Insufficient data validation in Shell Integration.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow\n an attacker to execute arbitrary code in the context of the browser, obtain\n sensitive information, bypass security restrictions and perform unauthorized\n actions, or cause denial-of-service conditions\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version\n prior to 71.0.3578.80 on Linux\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 71.0.3578.80 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html\");\n script_xref(name:\"URL\", value:\"https://www.google.com/chrome\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_lin.nasl\");\n script_mandatory_keys(\"Google-Chrome/Linux/Ver\");\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE)) exit(0);\nchr_ver = infos['version'];\nchr_path = infos['location'];\n\nif(version_is_less(version:chr_ver, test_version:\"71.0.3578.80\"))\n{\n report = report_fixed_ver(installed_version:chr_ver, fixed_version:\"71.0.3578.80\", install_path:chr_path);\n security_message(data:report);\n exit(0);\n}\nexit(99);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:32:53", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-18348", "CVE-2018-18354", "CVE-2018-18349", "CVE-2018-18355", "CVE-2018-18358", "CVE-2018-18346", "CVE-2018-18352", "CVE-2018-18347", "CVE-2018-18340", "CVE-2018-18339", "CVE-2018-18357", "CVE-2018-18337", "CVE-2018-17481", "CVE-2018-18351", "CVE-2018-18336", "CVE-2018-18343", "CVE-2018-18342", "CVE-2018-18344", "CVE-2018-18359", "CVE-2018-18335", "CVE-2018-17480", "CVE-2018-18338", "CVE-2018-18345", "CVE-2018-18341", "CVE-2018-18356", "CVE-2018-18350"], "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "modified": "2019-05-17T00:00:00", "published": "2018-12-05T00:00:00", "id": "OPENVAS:1361412562310814364", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814364", "type": "openvas", "title": "Google Chrome Security Updates(stable-channel-update-for-desktop-2018-12)-Windows", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Security Updates(stable-channel-update-for-desktop-2018-12)-Windows\n#\n# Authors:\n# Vidita V Koushik <vidita@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814364\");\n script_version(\"2019-05-17T10:45:27+0000\");\n script_cve_id(\"CVE-2018-17480\", \"CVE-2018-17481\", \"CVE-2018-18335\", \"CVE-2018-18336\",\n \"CVE-2018-18337\", \"CVE-2018-18338\", \"CVE-2018-18339\", \"CVE-2018-18340\",\n \"CVE-2018-18341\", \"CVE-2018-18342\", \"CVE-2018-18343\", \"CVE-2018-18344\",\n \"CVE-2018-18345\", \"CVE-2018-18346\", \"CVE-2018-18347\", \"CVE-2018-18348\",\n \"CVE-2018-18349\", \"CVE-2018-18350\", \"CVE-2018-18351\", \"CVE-2018-18352\",\n \"CVE-2018-18354\", \"CVE-2018-18355\", \"CVE-2018-18356\", \"CVE-2018-18357\",\n \"CVE-2018-18358\", \"CVE-2018-18359\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-05-17 10:45:27 +0000 (Fri, 17 May 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-12-05 14:53:39 +0530 (Wed, 05 Dec 2018)\");\n script_name(\"Google Chrome Security Updates(stable-channel-update-for-desktop-2018-12)-Windows\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"The multiple flaws exist due to\n\n - Multiple out of bounds write error in V8.\n\n - Multiple use after free errors in PDFium, Blink, WebAudio, MediaRecorder,\n Skia and Extensions.\n\n - Multiple heap buffer overflow errors in Skia, Canvas and Blink.\n\n - Inappropriate implementations in Extensions, Site Isolation, Navigation, Omnibox,\n Media, Network Authentication and PDFium.\n\n - Multiple issues in SQLite via WebSQL.\n\n - Incorrect security UI in Blink.\n\n - Insufficient policy enforcements in Blink, Navigation, URL Formatter, Proxy and Payments.\n\n - Insufficient data validation in Shell Integration.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow\n an attacker to execute arbitrary code in the context of the browser, obtain\n sensitive information, bypass security restrictions and perform unauthorized\n actions, or cause denial-of-service conditions\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version\n prior to 71.0.3578.80 on Windows\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 71.0.3578.80 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_xref(name:\"URL\", value:\"https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html\");\n script_xref(name:\"URL\", value:\"https://www.google.com/chrome\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_win.nasl\");\n script_mandatory_keys(\"GoogleChrome/Win/Ver\");\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE)) exit(0);\nchr_ver = infos['version'];\nchr_path = infos['location'];\n\nif(version_is_less(version:chr_ver, test_version:\"71.0.3578.80\"))\n{\n report = report_fixed_ver(installed_version:chr_ver, fixed_version:\"71.0.3578.80\", install_path:chr_path);\n security_message(data:report);\n exit(0);\n}\nexit(99);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:32:52", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-18348", "CVE-2018-18354", "CVE-2018-18349", "CVE-2018-18355", "CVE-2018-18358", "CVE-2018-18346", "CVE-2018-18352", "CVE-2018-18347", "CVE-2018-18340", "CVE-2018-18339", "CVE-2018-18357", "CVE-2018-18337", "CVE-2018-17481", "CVE-2018-18351", "CVE-2018-18336", "CVE-2018-18343", "CVE-2018-18342", "CVE-2018-18344", "CVE-2018-18359", "CVE-2018-18335", "CVE-2018-17480", "CVE-2018-18338", "CVE-2018-18345", "CVE-2018-18341", "CVE-2018-18356", "CVE-2018-18350"], "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "modified": "2019-05-17T00:00:00", "published": "2018-12-05T00:00:00", "id": "OPENVAS:1361412562310814366", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814366", "type": "openvas", "title": "Google Chrome Security Updates(stable-channel-update-for-desktop-2018-12)-MAC OS X", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Security Updates(stable-channel-update-for-desktop-2018-12)-MAC OS X\n#\n# Authors:\n# Vidita V Koushik <vidita@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814366\");\n script_version(\"2019-05-17T10:45:27+0000\");\n script_cve_id(\"CVE-2018-17480\", \"CVE-2018-17481\", \"CVE-2018-18335\", \"CVE-2018-18336\",\n \"CVE-2018-18337\", \"CVE-2018-18338\", \"CVE-2018-18339\", \"CVE-2018-18340\",\n \"CVE-2018-18341\", \"CVE-2018-18342\", \"CVE-2018-18343\", \"CVE-2018-18344\",\n \"CVE-2018-18345\", \"CVE-2018-18346\", \"CVE-2018-18347\", \"CVE-2018-18348\",\n \"CVE-2018-18349\", \"CVE-2018-18350\", \"CVE-2018-18351\", \"CVE-2018-18352\",\n \"CVE-2018-18354\", \"CVE-2018-18355\", \"CVE-2018-18356\", \"CVE-2018-18357\",\n \"CVE-2018-18358\", \"CVE-2018-18359\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-05-17 10:45:27 +0000 (Fri, 17 May 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-12-05 14:55:39 +0530 (Wed, 05 Dec 2018)\");\n script_name(\"Google Chrome Security Updates(stable-channel-update-for-desktop-2018-12)-MAC OS X\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"The multiple flaws exists due to\n\n - Multiple out of bounds write error in V8.\n\n - Multiple use after free errors in PDFium, Blink, WebAudio, MediaRecorder,\n Skia and Extensions.\n\n - Multiple heap buffer overflow errors in Skia, Canvas and Blink.\n\n - Inappropriate implementations in Extensions, Site Isolation, Navigation,\n Omnibox, Media, Network Authentication and PDFium.\n\n - Multiple issues in SQLite via WebSQL.\n\n - Incorrect security UI in Blink.\n\n - Insufficient policy enforcements in Blink, Navigation, URL Formatter,\n Proxy and Payments.\n\n - Insufficient data validation in Shell Integration.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow\n an attacker to execute arbitrary code in the context of the browser, obtain\n sensitive information, bypass security restrictions and perform unauthorized\n actions, or cause denial-of-service conditions\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version\n prior to 71.0.3578.80 on MAC OS X\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 71.0.3578.80 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html\");\n script_xref(name:\"URL\", value:\"https://www.google.com/chrome\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_macosx.nasl\");\n script_mandatory_keys(\"GoogleChrome/MacOSX/Version\");\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE)) exit(0);\nchr_ver = infos['version'];\nchr_path = infos['location'];\n\nif(version_is_less(version:chr_ver, test_version:\"71.0.3578.80\"))\n{\n report = report_fixed_ver(installed_version:chr_ver, fixed_version:\"71.0.3578.80\", install_path:chr_path);\n security_message(data:report);\n exit(0);\n}\nexit(99);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-04T18:55:47", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-18348", "CVE-2018-18354", "CVE-2018-18349", "CVE-2018-18355", "CVE-2018-18358", "CVE-2018-18346", "CVE-2018-18352", "CVE-2018-18347", "CVE-2018-18340", "CVE-2018-18339", "CVE-2018-18357", "CVE-2018-18337", "CVE-2018-17481", "CVE-2018-18351", "CVE-2018-18336", "CVE-2018-18343", "CVE-2018-18342", "CVE-2018-18344", "CVE-2018-18359", "CVE-2018-18335", "CVE-2018-17480", "CVE-2018-18338", "CVE-2018-18345", "CVE-2018-18353", "CVE-2018-18341", "CVE-2018-18356", "CVE-2018-18350"], "description": "Several vulnerabilities have been discovered in the chromium web browser.\n\nCVE-2018-17480\nGuang Gong discovered an out-of-bounds write issue in the v8 javascript\nlibrary.\n\nCVE-2018-17481\nSeveral use-after-free issues were discovered in the pdfium library.\n\nCVE-2018-18335\nA buffer overflow issue was discovered in the skia library.\n\nCVE-2018-18336\nHuyna discovered a use-after-free issue in the pdfium library.\n\nCVE-2018-18337\ncloudfuzzer discovered a use-after-free issue in blink/webkit.\n\nCVE-2018-18338\nZhe Jin discovered a buffer overflow issue in the canvas renderer.\n\nCVE-2018-18339\ncloudfuzzer discovered a use-after-free issue in the WebAudio\nimplementation.\n\nCVE-2018-18340\nA use-after-free issue was discovered in the MediaRecorder implementation.\n\nCVE-2018-18341\ncloudfuzzer discovered a buffer overflow issue in blink/webkit.\n\nCVE-2018-18342\nGuang Gong discovered an out-of-bounds write issue in the v8 javascript\nlibrary.\n\nCVE-2018-18343\nTran Tien Hung discovered a use-after-free issue in the skia library.\n\nCVE-2018-18344\nJann Horn discovered an error in the Extensions implementation.\n\nCVE-2018-18345\nMasato Kinugawa and Jun Kokatsu discovered an error in the Site Isolation\nfeature.\n\nCVE-2018-18346\nLuan Herrera discovered an error in the user interface.\n\nCVE-2018-18347\nLuan Herrera discovered an error in the Navigation implementation.\n\nCVE-2018-18348\nAhmed Elsobky discovered an error in the omnibox implementation.\n\nCVE-2018-18349\nDavid Erceg discovered a policy enforcement error.\n\nCVE-2018-18350\nJun Kokatsu discovered a policy enforcement error.\n\nCVE-2018-18351\nJun Kokatsu discovered a policy enforcement error.\n\nCVE-2018-18352\nJun Kokatsu discovered an error in Media handling.\n\nCVE-2018-18353\nWenxu Wu discovered an error in the network authentication implementation.\n\nCVE-2018-18354\nWenxu Wu discovered an error related to integration with GNOME Shell.\n\nCVE-2018-18355\nevil1m0 discovered a policy enforcement error.\n\nCVE-2018-18356\nTran Tien Hung discovered a use-after-free issue in the skia library.\n\nCVE-2018-18357\nevil1m0 discovered a policy enforcement error.\n\nCVE-2018-18358\nJann Horn discovered a policy enforcement error.\n\nCVE-2018-18359\ncyrilliu discovered an out-of-bounds read issue in the v8 javascript\nlibrary.\n\nSeveral additional security relevant issues are also fixed in this update\nthat have not yet received CVE identifiers.", "modified": "2019-07-04T00:00:00", "published": "2018-12-07T00:00:00", "id": "OPENVAS:1361412562310704352", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310704352", "type": "openvas", "title": "Debian Security Advisory DSA 4352-1 (chromium-browser - security update)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Auto-generated from advisory DSA 4352-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2018 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License as published by\n# the Free Software Foundation; either version 2 of the License, or\n# (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.704352\");\n script_version(\"2019-07-04T09:25:28+0000\");\n script_cve_id(\"CVE-2018-17480\", \"CVE-2018-17481\", \"CVE-2018-18335\", \"CVE-2018-18336\", \"CVE-2018-18337\",\n \"CVE-2018-18338\", \"CVE-2018-18339\", \"CVE-2018-18340\", \"CVE-2018-18341\", \"CVE-2018-18342\",\n \"CVE-2018-18343\", \"CVE-2018-18344\", \"CVE-2018-18345\", \"CVE-2018-18346\", \"CVE-2018-18347\",\n \"CVE-2018-18348\", \"CVE-2018-18349\", \"CVE-2018-18350\", \"CVE-2018-18351\", \"CVE-2018-18352\",\n \"CVE-2018-18353\", \"CVE-2018-18354\", \"CVE-2018-18355\", \"CVE-2018-18356\", \"CVE-2018-18357\",\n \"CVE-2018-18358\", \"CVE-2018-18359\");\n script_name(\"Debian Security Advisory DSA 4352-1 (chromium-browser - security update)\");\n script_tag(name:\"last_modification\", value:\"2019-07-04 09:25:28 +0000 (Thu, 04 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-12-07 00:00:00 +0100 (Fri, 07 Dec 2018)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"https://www.debian.org/security/2018/dsa-4352.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2018 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB9\");\n script_tag(name:\"affected\", value:\"chromium-browser on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the stable distribution (stretch), these problems have been fixed in\nversion 71.0.3578.80-1~deb9u1.\n\nWe recommend that you upgrade your chromium-browser packages.\");\n\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/chromium-browser\");\n script_tag(name:\"summary\", value:\"Several vulnerabilities have been discovered in the chromium web browser.\n\nCVE-2018-17480\nGuang Gong discovered an out-of-bounds write issue in the v8 javascript\nlibrary.\n\nCVE-2018-17481\nSeveral use-after-free issues were discovered in the pdfium library.\n\nCVE-2018-18335\nA buffer overflow issue was discovered in the skia library.\n\nCVE-2018-18336\nHuyna discovered a use-after-free issue in the pdfium library.\n\nCVE-2018-18337\ncloudfuzzer discovered a use-after-free issue in blink/webkit.\n\nCVE-2018-18338\nZhe Jin discovered a buffer overflow issue in the canvas renderer.\n\nCVE-2018-18339\ncloudfuzzer discovered a use-after-free issue in the WebAudio\nimplementation.\n\nCVE-2018-18340\nA use-after-free issue was discovered in the MediaRecorder implementation.\n\nCVE-2018-18341\ncloudfuzzer discovered a buffer overflow issue in blink/webkit.\n\nCVE-2018-18342\nGuang Gong discovered an out-of-bounds write issue in the v8 javascript\nlibrary.\n\nCVE-2018-18343\nTran Tien Hung discovered a use-after-free issue in the skia library.\n\nCVE-2018-18344\nJann Horn discovered an error in the Extensions implementation.\n\nCVE-2018-18345\nMasato Kinugawa and Jun Kokatsu discovered an error in the Site Isolation\nfeature.\n\nCVE-2018-18346\nLuan Herrera discovered an error in the user interface.\n\nCVE-2018-18347\nLuan Herrera discovered an error in the Navigation implementation.\n\nCVE-2018-18348\nAhmed Elsobky discovered an error in the omnibox implementation.\n\nCVE-2018-18349\nDavid Erceg discovered a policy enforcement error.\n\nCVE-2018-18350\nJun Kokatsu discovered a policy enforcement error.\n\nCVE-2018-18351\nJun Kokatsu discovered a policy enforcement error.\n\nCVE-2018-18352\nJun Kokatsu discovered an error in Media handling.\n\nCVE-2018-18353\nWenxu Wu discovered an error in the network authentication implementation.\n\nCVE-2018-18354\nWenxu Wu discovered an error related to integration with GNOME Shell.\n\nCVE-2018-18355\nevil1m0 discovered a policy enforcement error.\n\nCVE-2018-18356\nTran Tien Hung discovered a use-after-free issue in the skia library.\n\nCVE-2018-18357\nevil1m0 discovered a policy enforcement error.\n\nCVE-2018-18358\nJann Horn discovered a policy enforcement error.\n\nCVE-2018-18359\ncyrilliu discovered an out-of-bounds read issue in the v8 javascript\nlibrary.\n\nSeveral additional security relevant issues are also fixed in this update\nthat have not yet received CVE identifiers.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"chromedriver\", ver:\"71.0.3578.80-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"chromium\", ver:\"71.0.3578.80-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"chromium-driver\", ver:\"71.0.3578.80-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"chromium-l10n\", ver:\"71.0.3578.80-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"chromium-shell\", ver:\"71.0.3578.80-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"chromium-widevine\", ver:\"71.0.3578.80-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-04-07T16:39:05", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-18348", "CVE-2018-18354", "CVE-2018-18349", "CVE-2018-18355", "CVE-2018-18358", "CVE-2018-18346", "CVE-2018-18352", "CVE-2018-18347", "CVE-2018-18340", "CVE-2018-18339", "CVE-2018-18357", "CVE-2018-18337", "CVE-2018-17481", "CVE-2018-18351", "CVE-2018-18336", "CVE-2018-18343", "CVE-2018-18342", "CVE-2018-18344", "CVE-2018-18359", "CVE-2018-18335", "CVE-2018-17480", "CVE-2018-18338", "CVE-2018-18345", "CVE-2018-18353", "CVE-2018-18341", "CVE-2018-18356", "CVE-2018-18350"], "description": "The remote host is missing an update for the ", "modified": "2020-04-02T00:00:00", "published": "2018-12-18T00:00:00", "id": "OPENVAS:1361412562310852183", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310852183", "type": "openvas", "title": "openSUSE: Security Advisory for Chromium (openSUSE-SU-2018:4142-1)", "sourceData": "# Copyright (C) 2018 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.852183\");\n script_version(\"2020-04-02T11:36:28+0000\");\n script_tag(name:\"deprecated\", value:TRUE);\n script_cve_id(\"CVE-2018-17480\", \"CVE-2018-17481\", \"CVE-2018-18335\",\n \"CVE-2018-18336\", \"CVE-2018-18337\", \"CVE-2018-18338\", \"CVE-2018-18339\",\n \"CVE-2018-18340\", \"CVE-2018-18341\", \"CVE-2018-18342\", \"CVE-2018-18343\",\n \"CVE-2018-18344\", \"CVE-2018-18345\", \"CVE-2018-18346\", \"CVE-2018-18347\",\n \"CVE-2018-18348\", \"CVE-2018-18349\", \"CVE-2018-18350\", \"CVE-2018-18351\",\n \"CVE-2018-18352\", \"CVE-2018-18353\", \"CVE-2018-18354\", \"CVE-2018-18355\",\n \"CVE-2018-18356\", \"CVE-2018-18357\", \"CVE-2018-18358\", \"CVE-2018-18359\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-04-02 11:36:28 +0000 (Thu, 02 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2018-12-18 07:39:11 +0100 (Tue, 18 Dec 2018)\");\n script_name(\"openSUSE: Security Advisory for Chromium (openSUSE-SU-2018:4142-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2018:4142-1\");\n script_xref(name:\"URL\", value:\"https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'Chromium'\n package(s) announced via the openSUSE-SU-2018:4142-1 advisory.\n\n This NVT has been replaced by OID:1.3.6.1.4.1.25623.1.0.814568\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"This update to Chromium 71.0.3578.98 fixes the\n following issues:\n\n Security issues fixed (boo#1118529):\n\n - CVE-2018-17480: Out of bounds write in V8\n\n - CVE-2018-17481: Use after frees in PDFium\n\n - CVE-2018-18335: Heap buffer overflow in Skia\n\n - CVE-2018-18336: Use after free in PDFium\n\n - CVE-2018-18337: Use after free in Blink\n\n - CVE-2018-18338: Heap buffer overflow in Canvas\n\n - CVE-2018-18339: Use after free in WebAudio\n\n - CVE-2018-18340: Use after free in MediaRecorder\n\n - CVE-2018-18341: Heap buffer overflow in Blink\n\n - CVE-2018-18342: Out of bounds write in V8\n\n - CVE-2018-18343: Use after free in Skia\n\n - CVE-2018-18344: Inappropriate implementation in Extensions\n\n - Multiple issues in SQLite via WebSQL\n\n - CVE-2018-18345: Inappropriate implementation in Site Isolation\n\n - CVE-2018-18346: Incorrect security UI in Blink\n\n - CVE-2018-18347: Inappropriate implementation in Navigation\n\n - CVE-2018-18348: Inappropriate implementation in Omnibox\n\n - CVE-2018-18349: Insufficient policy enforcement in Blink\n\n - CVE-2018-18350: Insufficient policy enforcement in Blink\n\n - CVE-2018-18351: Insufficient policy enforcement in Navigation\n\n - CVE-2018-18352: Inappropriate implementation in Media\n\n - CVE-2018-18353: Inappropriate implementation in Network Authentication\n\n - CVE-2018-18354: Insufficient data validation in Shell Integration\n\n - CVE-2018-18355: Insufficient policy enforcement in URL Formatter\n\n - CVE-2018-18356: Use after free in Skia\n\n - CVE-2018-18357: Insufficient policy enforcement in URL Formatter\n\n - CVE-2018-18358: Insufficient policy enforcement in Proxy\n\n - CVE-2018-18359: Out of bounds read in V8\n\n - Inappropriate implementation in PDFium\n\n - Use after free in Extensions\n\n - Inappropriate implementation in Navigation\n\n - Insufficient policy enforcement in Navigation\n\n - Insufficient policy enforcement in URL Formatter\n\n - Various fixes from internal audits, fuzzing and other initiatives\n\n - CVE-2018-17481: Use after free in PDFium (boo#1119364)\n\n The following changes are included:\n\n - advertisements posing as error messages are now blocked\n\n - Automatic playing of content at page load mostly disabled\n\n - New JavaScript API for relative time display\n\n Patch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended\n installation methods\n like YaST online_update or 'zypper patch'.\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 42.3:\n\n zypper in -t patch openSUSE-2018-1557=1\");\n\n script_tag(name:\"affected\", value:\"Chromium on openSUSE Leap 42.3.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\nexit(66); ## This NVT is deprecated as addressed in OID:1.3.6.1.4.1.25623.1.0.814568\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:32:11", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-18348", "CVE-2018-18354", "CVE-2018-18349", "CVE-2018-18355", "CVE-2018-18358", "CVE-2018-18346", "CVE-2018-18352", "CVE-2018-18347", "CVE-2018-18340", "CVE-2018-18339", "CVE-2018-18357", "CVE-2018-18337", "CVE-2018-17481", "CVE-2018-18351", "CVE-2018-18336", "CVE-2018-18343", "CVE-2018-18342", "CVE-2018-18344", "CVE-2018-18359", "CVE-2018-18335", "CVE-2018-17480", "CVE-2018-18338", "CVE-2018-18345", "CVE-2018-18353", "CVE-2018-18341", "CVE-2018-18356", "CVE-2018-18350"], "description": "The remote host is missing an update for the\n ", "modified": "2019-03-15T00:00:00", "published": "2019-01-16T00:00:00", "id": "OPENVAS:1361412562310875411", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310875411", "type": "openvas", "title": "Fedora Update for chromium FEDORA-2019-348547a32d", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2019_348547a32d_chromium_fc28.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for chromium FEDORA-2019-348547a32d\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2019 Greenbone Networks GmbH, http://www.greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.875411\");\n script_version(\"$Revision: 14223 $\");\n script_cve_id(\"CVE-2018-17480\", \"CVE-2018-17481\", \"CVE-2018-18335\", \"CVE-2018-18336\",\n \"CVE-2018-18337\", \"CVE-2018-18338\", \"CVE-2018-18339\", \"CVE-2018-18340\",\n \"CVE-2018-18341\", \"CVE-2018-18342\", \"CVE-2018-18343\", \"CVE-2018-18344\",\n \"CVE-2018-18345\", \"CVE-2018-18346\", \"CVE-2018-18347\", \"CVE-2018-18348\",\n \"CVE-2018-18349\", \"CVE-2018-18350\", \"CVE-2018-18351\", \"CVE-2018-18352\",\n \"CVE-2018-18353\", \"CVE-2018-18354\", \"CVE-2018-18355\", \"CVE-2018-18356\",\n \"CVE-2018-18357\", \"CVE-2018-18358\", \"CVE-2018-18359\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2019-01-16 04:03:50 +0100 (Wed, 16 Jan 2019)\");\n script_name(\"Fedora Update for chromium FEDORA-2019-348547a32d\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC28\");\n\n script_xref(name:\"FEDORA\", value:\"2019-348547a32d\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GPF6NWCKSBWW66XSYJGJYFDN4NBYOZ2U\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the\n 'chromium' package(s) announced via the FEDORA-2019-348547a32d advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is\n present on the target host.\");\n\n script_tag(name:\"affected\", value:\"chromium on Fedora 28.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC28\")\n{\n\n if ((res = isrpmvuln(pkg:\"chromium\", rpm:\"chromium~71.0.3578.98~1.fc28\", rls:\"FC28\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-31T17:34:55", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-18348", "CVE-2018-18354", "CVE-2018-18349", "CVE-2018-18355", "CVE-2018-18358", "CVE-2018-18346", "CVE-2018-18352", "CVE-2018-18347", "CVE-2018-18340", "CVE-2018-18339", "CVE-2018-18357", "CVE-2018-18337", "CVE-2018-17481", "CVE-2018-18351", "CVE-2018-18336", "CVE-2018-18343", "CVE-2018-18342", "CVE-2018-18344", "CVE-2018-18359", "CVE-2018-18335", "CVE-2018-17480", "CVE-2018-18338", "CVE-2018-18345", "CVE-2018-18353", "CVE-2018-18341", "CVE-2018-18356", "CVE-2018-18350"], "description": "The remote host is missing an update for the ", "modified": "2020-01-31T00:00:00", "published": "2018-12-10T00:00:00", "id": "OPENVAS:1361412562310852166", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310852166", "type": "openvas", "title": "openSUSE: Security Advisory for Chromium (openSUSE-SU-2018:4056-1)", "sourceData": "# Copyright (C) 2018 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.852166\");\n script_version(\"2020-01-31T08:23:39+0000\");\n script_cve_id(\"CVE-2018-17480\", \"CVE-2018-17481\", \"CVE-2018-18335\",\n \"CVE-2018-18336\", \"CVE-2018-18337\", \"CVE-2018-18338\", \"CVE-2018-18339\",\n \"CVE-2018-18340\", \"CVE-2018-18341\", \"CVE-2018-18342\", \"CVE-2018-18343\",\n \"CVE-2018-18344\", \"CVE-2018-18345\", \"CVE-2018-18346\", \"CVE-2018-18347\",\n \"CVE-2018-18348\", \"CVE-2018-18349\", \"CVE-2018-18350\", \"CVE-2018-18351\",\n \"CVE-2018-18352\", \"CVE-2018-18353\", \"CVE-2018-18354\", \"CVE-2018-18355\",\n \"CVE-2018-18356\", \"CVE-2018-18357\", \"CVE-2018-18358\", \"CVE-2018-18359\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:23:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2018-12-10 07:37:32 +0100 (Mon, 10 Dec 2018)\");\n script_name(\"openSUSE: Security Advisory for Chromium (openSUSE-SU-2018:4056-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSELeap15\\.0\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2018:4056-1\");\n script_xref(name:\"URL\", value:\"https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00023.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'Chromium'\n package(s) announced via the openSUSE-SU-2018:4056-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"This update to Chromium version 71.0.3578.80\n fixes security issues and bugs.\n\n Security issues fixed (boo#1118529):\n\n - CVE-2018-17480: Out of bounds write in V8\n\n - CVE-2018-17481: Use after frees in PDFium\n\n - CVE-2018-18335: Heap buffer overflow in Skia\n\n - CVE-2018-18336: Use after free in PDFium\n\n - CVE-2018-18337: Use after free in Blink\n\n - CVE-2018-18338: Heap buffer overflow in Canvas\n\n - CVE-2018-18339: Use after free in WebAudio\n\n - CVE-2018-18340: Use after free in MediaRecorder\n\n - CVE-2018-18341: Heap buffer overflow in Blink\n\n - CVE-2018-18342: Out of bounds write in V8\n\n - CVE-2018-18343: Use after free in Skia\n\n - CVE-2018-18344: Inappropriate implementation in Extensions\n\n - Multiple issues in SQLite via WebSQL\n\n - CVE-2018-18345: Inappropriate implementation in Site Isolation\n\n - CVE-2018-18346: Incorrect security UI in Blink\n\n - CVE-2018-18347: Inappropriate implementation in Navigation\n\n - CVE-2018-18348: Inappropriate implementation in Omnibox\n\n - CVE-2018-18349: Insufficient policy enforcement in Blink\n\n - CVE-2018-18350: Insufficient policy enforcement in Blink\n\n - CVE-2018-18351: Insufficient policy enforcement in Navigation\n\n - CVE-2018-18352: Inappropriate implementation in Media\n\n - CVE-2018-18353: Inappropriate implementation in Network Authentication\n\n - CVE-2018-18354: Insufficient data validation in Shell Integration\n\n - CVE-2018-18355: Insufficient policy enforcement in URL Formatter\n\n - CVE-2018-18356: Use after free in Skia\n\n - CVE-2018-18357: Insufficient policy enforcement in URL Formatter\n\n - CVE-2018-18358: Insufficient policy enforcement in Proxy\n\n - CVE-2018-18359: Out of bounds read in V8\n\n - Inappropriate implementation in PDFium\n\n - Use after free in Extensions\n\n - Inappropriate implementation in Navigation\n\n - Insufficient policy enforcement in Navigation\n\n - Insufficient policy enforcement in URL Formatter\n\n - Various fixes from internal audits, fuzzing and other initiatives\n\n The following changes are included:\n\n - advertisements posing as error messages are now blocked\n\n - Automatic playing of content at page load mostly disabled\n\n - New JavaScript API for relative time display\n\n Patch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended\n installation methods\n like YaST online_update or 'zypper patch'.\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 15.0:\n\n zypper in -t patch openSUSE-2018-1521=1\n\n - openSUSE Backports SLE-15:\n\n zypper in -t patch openSUSE-2018-1521=1\");\n\n script_tag(name:\"affected\", value:\"Chromium on openSUSE Leap 15.0.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap15.0\") {\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver\", rpm:\"chromedriver~71.0.3578.80~lp150.2.30.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver-debuginfo\", rpm:\"chromedriver-debuginfo~71.0.3578.80~lp150.2.30.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium\", rpm:\"chromium~71.0.3578.80~lp150.2.30.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debuginfo\", rpm:\"chromium-debuginfo~71.0.3578.80~lp150.2.30.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debugsource\", rpm:\"chromium-debugsource~71.0.3578.80~lp150.2.30.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-31T17:38:00", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-18348", "CVE-2018-18354", "CVE-2018-18349", "CVE-2018-18355", "CVE-2018-18358", "CVE-2018-18346", "CVE-2018-18352", "CVE-2018-18347", "CVE-2018-18340", "CVE-2018-18339", "CVE-2018-18357", "CVE-2018-18337", "CVE-2018-17481", "CVE-2018-18351", "CVE-2018-18336", "CVE-2018-18343", "CVE-2018-18342", "CVE-2018-18344", "CVE-2018-18359", "CVE-2018-18335", "CVE-2018-17480", "CVE-2018-18338", "CVE-2018-18345", "CVE-2018-18353", "CVE-2018-18341", "CVE-2018-18356", "CVE-2018-18350"], "description": "The remote host is missing an update for the ", "modified": "2020-01-31T00:00:00", "published": "2018-12-18T00:00:00", "id": "OPENVAS:1361412562310814568", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814568", "type": "openvas", "title": "openSUSE: Security Advisory for Chromium (openSUSE-SU-2018:4142-1)", "sourceData": "# Copyright (C) 2018 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814568\");\n script_version(\"2020-01-31T08:23:39+0000\");\n script_cve_id(\"CVE-2018-17480\", \"CVE-2018-17481\", \"CVE-2018-18335\",\n \"CVE-2018-18336\", \"CVE-2018-18337\", \"CVE-2018-18338\", \"CVE-2018-18339\",\n \"CVE-2018-18340\", \"CVE-2018-18341\", \"CVE-2018-18342\", \"CVE-2018-18343\",\n \"CVE-2018-18344\", \"CVE-2018-18345\", \"CVE-2018-18346\", \"CVE-2018-18347\",\n \"CVE-2018-18348\", \"CVE-2018-18349\", \"CVE-2018-18350\", \"CVE-2018-18351\",\n \"CVE-2018-18352\", \"CVE-2018-18353\", \"CVE-2018-18354\", \"CVE-2018-18355\",\n \"CVE-2018-18356\", \"CVE-2018-18357\", \"CVE-2018-18358\", \"CVE-2018-18359\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:23:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2018-12-18 07:39:11 +0100 (Tue, 18 Dec 2018)\");\n script_name(\"openSUSE: Security Advisory for Chromium (openSUSE-SU-2018:4142-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSELeap42\\.3\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2018:4142-1\");\n script_xref(name:\"URL\", value:\"https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'Chromium'\n package(s) announced via the openSUSE-SU-2018:4142-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"This update to Chromium 71.0.3578.98 fixes the following issues:\n\n Security issues fixed (boo#1118529):\n\n - CVE-2018-17480: Out of bounds write in V8\n\n - CVE-2018-17481: Use after frees in PDFium\n\n - CVE-2018-18335: Heap buffer overflow in Skia\n\n - CVE-2018-18336: Use after free in PDFium\n\n - CVE-2018-18337: Use after free in Blink\n\n - CVE-2018-18338: Heap buffer overflow in Canvas\n\n - CVE-2018-18339: Use after free in WebAudio\n\n - CVE-2018-18340: Use after free in MediaRecorder\n\n - CVE-2018-18341: Heap buffer overflow in Blink\n\n - CVE-2018-18342: Out of bounds write in V8\n\n - CVE-2018-18343: Use after free in Skia\n\n - CVE-2018-18344: Inappropriate implementation in Extensions\n\n - Multiple issues in SQLite via WebSQL\n\n - CVE-2018-18345: Inappropriate implementation in Site Isolation\n\n - CVE-2018-18346: Incorrect security UI in Blink\n\n - CVE-2018-18347: Inappropriate implementation in Navigation\n\n - CVE-2018-18348: Inappropriate implementation in Omnibox\n\n - CVE-2018-18349: Insufficient policy enforcement in Blink\n\n - CVE-2018-18350: Insufficient policy enforcement in Blink\n\n - CVE-2018-18351: Insufficient policy enforcement in Navigation\n\n - CVE-2018-18352: Inappropriate implementation in Media\n\n - CVE-2018-18353: Inappropriate implementation in Network Authentication\n\n - CVE-2018-18354: Insufficient data validation in Shell Integration\n\n - CVE-2018-18355: Insufficient policy enforcement in URL Formatter\n\n - CVE-2018-18356: Use after free in Skia\n\n - CVE-2018-18357: Insufficient policy enforcement in URL Formatter\n\n - CVE-2018-18358: Insufficient policy enforcement in Proxy\n\n - CVE-2018-18359: Out of bounds read in V8\n\n - Inappropriate implementation in PDFium\n\n - Use after free in Extensions\n\n - Inappropriate implementation in Navigation\n\n - Insufficient policy enforcement in Navigation\n\n - Insufficient policy enforcement in URL Formatter\n\n - Various fixes from internal audits, fuzzing and other initiatives\n\n - CVE-2018-17481: Use after free in PDFium (boo#1119364)\n\n The following changes are included:\n\n - advertisements posing as error messages are now blocked\n\n - Automatic playing of content at page load mostly disabled\n\n - New JavaScript API for relative time display\n\n Patch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended\n installation methods\n like YaST online_update or 'zypper patch'.\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 42.3:\n\n zypper in -t patch openSUSE-2018-1557=1\");\n\n script_tag(name:\"affected\", value:\"Chromium on openSUSE Leap 42.3.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap42.3\") {\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver\", rpm:\"chromedriver~71.0.3578.98~189.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver-debuginfo\", rpm:\"chromedriver-debuginfo~71.0.3578.98~189.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium\", rpm:\"chromium~71.0.3578.98~189.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debuginfo\", rpm:\"chromium-debuginfo~71.0.3578.98~189.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debugsource\", rpm:\"chromium-debugsource~71.0.3578.98~189.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-31T16:47:29", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-5785", "CVE-2018-18335", "CVE-2018-18356"], "description": "The remote host is missing an update for the ", "modified": "2020-01-31T00:00:00", "published": "2019-02-19T00:00:00", "id": "OPENVAS:1361412562310852302", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310852302", "type": "openvas", "title": "openSUSE: Security Advisory for MozillaFirefox (openSUSE-SU-2019:0202-1)", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.852302\");\n script_version(\"2020-01-31T08:23:39+0000\");\n script_cve_id(\"CVE-2018-18335\", \"CVE-2018-18356\", \"CVE-2019-5785\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:23:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2019-02-19 04:07:30 +0100 (Tue, 19 Feb 2019)\");\n script_name(\"openSUSE: Security Advisory for MozillaFirefox (openSUSE-SU-2019:0202-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSELeap42\\.3\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2019:0202-1\");\n script_xref(name:\"URL\", value:\"https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00039.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'MozillaFirefox'\n package(s) announced via the openSUSE-SU-2019:0202-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"This update for MozillaFirefox to version 60.5.1\n fixes the following issues:\n\n Security issues fixed (bsc#1125330):\n\n - CVE-2018-18356: Fixed a use-after-free vulnerability in Skia library.\n\n - CVE-2019-5785: Fixed an integer overflow in the Skia library.\n\n - CVE-2018-18335: Fixed a buffer overflow in Skia library with accelerated\n Canvas 2D by disabling Canvas 2D. This vulnerability does not affect\n Linux platform.\n\n Patch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended\n installation methods\n like YaST online_update or 'zypper patch'.\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 42.3:\n\n zypper in -t patch openSUSE-2019-202=1\");\n\n script_tag(name:\"affected\", value:\"MozillaFirefox on openSUSE Leap 42.3.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap42.3\") {\n if(!isnull(res = isrpmvuln(pkg:\"MozillaFirefox\", rpm:\"MozillaFirefox~60.5.1~131.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaFirefox-branding-upstream\", rpm:\"MozillaFirefox-branding-upstream~60.5.1~131.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaFirefox-buildsymbols\", rpm:\"MozillaFirefox-buildsymbols~60.5.1~131.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaFirefox-debuginfo\", rpm:\"MozillaFirefox-debuginfo~60.5.1~131.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaFirefox-debugsource\", rpm:\"MozillaFirefox-debugsource~60.5.1~131.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaFirefox-devel\", rpm:\"MozillaFirefox-devel~60.5.1~131.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaFirefox-translations-common\", rpm:\"MozillaFirefox-translations-common~60.5.1~131.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaFirefox-translations-other\", rpm:\"MozillaFirefox-translations-other~60.5.1~131.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-04T18:45:17", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-18509", "CVE-2019-5785", "CVE-2018-18335", "CVE-2018-18356"], "description": "This host is installed with Mozilla\n Thunderbird and is prone to multiple vulnerabilities.", "modified": "2019-07-04T00:00:00", "published": "2019-02-18T00:00:00", "id": "OPENVAS:1361412562310814860", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814860", "type": "openvas", "title": "Mozilla Thunderbird Security Updates(mfsa2019-06)-MAC OS X", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA\n\nCPE = \"cpe:/a:mozilla:thunderbird\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814860\");\n script_version(\"2019-07-04T07:32:14+0000\");\n script_cve_id(\"CVE-2018-18356\", \"CVE-2019-5785\", \"CVE-2018-18335\", \"CVE-2018-18509\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-04 07:32:14 +0000 (Thu, 04 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-02-18 10:51:25 +0530 (Mon, 18 Feb 2019)\");\n script_name(\"Mozilla Thunderbird Security Updates(mfsa2019-06)-MAC OS X\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Mozilla\n Thunderbird and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to,\n\n - A use-after-free vulnerability in the Skia library.\n\n - An integer overflow vulnerability in the Skia library.\n\n - A buffer overflow vulnerability in the Skia library.\n\n - A flaw during verification of certain S/MIME signatures.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation allows attackers to\n crash the application and craft email messages with arbitrary content.\");\n\n script_tag(name:\"affected\", value:\"Mozilla Thunderbird version before 60.5.1 on MAC OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Mozilla Thunderbird version 60.5.1\n or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2019-06\");\n script_xref(name:\"URL\", value:\"https://www.thunderbird.net/en-US\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_mozilla_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Thunderbird/MacOSX/Version\");\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE)) exit(0);\ntbVer = infos['version'];\ntbPath = infos['location'];\n\nif(version_is_less(version:tbVer, test_version:\"60.5.1\"))\n{\n report = report_fixed_ver(installed_version:tbVer, fixed_version:\"60.5.1\", install_path:tbPath);\n security_message(data:report);\n exit(0);\n}\nexit(99);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "suse": [{"lastseen": "2018-12-08T17:30:05", "bulletinFamily": "unix", "cvelist": ["CVE-2018-18348", "CVE-2018-18354", "CVE-2018-18349", "CVE-2018-18355", "CVE-2018-18358", "CVE-2018-18346", "CVE-2018-18352", "CVE-2018-18347", "CVE-2018-18340", "CVE-2018-18339", "CVE-2018-18357", "CVE-2018-18337", "CVE-2018-17481", "CVE-2018-18351", "CVE-2018-18336", "CVE-2018-18343", "CVE-2018-18342", "CVE-2018-18344", "CVE-2018-18359", "CVE-2018-18335", "CVE-2018-17480", "CVE-2018-18338", "CVE-2018-18345", "CVE-2018-18353", "CVE-2018-18341", "CVE-2018-18356", "CVE-2018-18350"], "description": "This update to Chromium version 71.0.3578.80 fixes security issues and\n bugs.\n\n Security issues fixed (boo#1118529):\n\n - CVE-2018-17480: Out of bounds write in V8\n - CVE-2018-17481: Use after frees in PDFium\n - CVE-2018-18335: Heap buffer overflow in Skia\n - CVE-2018-18336: Use after free in PDFium\n - CVE-2018-18337: Use after free in Blink\n - CVE-2018-18338: Heap buffer overflow in Canvas\n - CVE-2018-18339: Use after free in WebAudio\n - CVE-2018-18340: Use after free in MediaRecorder\n - CVE-2018-18341: Heap buffer overflow in Blink\n - CVE-2018-18342: Out of bounds write in V8\n - CVE-2018-18343: Use after free in Skia\n - CVE-2018-18344: Inappropriate implementation in Extensions\n - Multiple issues in SQLite via WebSQL\n - CVE-2018-18345: Inappropriate implementation in Site Isolation\n - CVE-2018-18346: Incorrect security UI in Blink\n - CVE-2018-18347: Inappropriate implementation in Navigation\n - CVE-2018-18348: Inappropriate implementation in Omnibox\n - CVE-2018-18349: Insufficient policy enforcement in Blink\n - CVE-2018-18350: Insufficient policy enforcement in Blink\n - CVE-2018-18351: Insufficient policy enforcement in Navigation\n - CVE-2018-18352: Inappropriate implementation in Media\n - CVE-2018-18353: Inappropriate implementation in Network Authentication\n - CVE-2018-18354: Insufficient data validation in Shell Integration\n - CVE-2018-18355: Insufficient policy enforcement in URL Formatter\n - CVE-2018-18356: Use after free in Skia\n - CVE-2018-18357: Insufficient policy enforcement in URL Formatter\n - CVE-2018-18358: Insufficient policy enforcement in Proxy\n - CVE-2018-18359: Out of bounds read in V8\n - Inappropriate implementation in PDFium\n - Use after free in Extensions\n - Inappropriate implementation in Navigation\n - Insufficient policy enforcement in Navigation\n - Insufficient policy enforcement in URL Formatter\n - Various fixes from internal audits, fuzzing and other initiatives\n\n The following changes are included:\n\n - advertisements posing as error messages are now blocked\n - Automatic playing of content at page load mostly disabled\n - New JavaScript API for relative time display\n\n", "edition": 1, "modified": "2018-12-08T15:14:53", "published": "2018-12-08T15:14:53", "id": "OPENSUSE-SU-2018:4056-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00023.html", "title": "Security update for Chromium (important)", "type": "suse", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2018-12-15T19:38:37", "bulletinFamily": "unix", "cvelist": ["CVE-2018-18348", "CVE-2018-18354", "CVE-2018-18349", "CVE-2018-18355", "CVE-2018-18358", "CVE-2018-18346", "CVE-2018-18352", "CVE-2018-18347", "CVE-2018-18340", "CVE-2018-18339", "CVE-2018-18357", "CVE-2018-18337", "CVE-2018-17481", "CVE-2018-18351", "CVE-2018-18336", "CVE-2018-18343", "CVE-2018-18342", "CVE-2018-18344", "CVE-2018-18359", "CVE-2018-18335", "CVE-2018-17480", "CVE-2018-18338", "CVE-2018-18345", "CVE-2018-18353", "CVE-2018-18341", "CVE-2018-18356", "CVE-2018-18350"], "description": "This update to Chromium 71.0.3578.98 fixes the following issues:\n\n Security issues fixed (boo#1118529):\n\n - CVE-2018-17480: Out of bounds write in V8\n - CVE-2018-17481: Use after frees in PDFium\n - CVE-2018-18335: Heap buffer overflow in Skia\n - CVE-2018-18336: Use after free in PDFium\n - CVE-2018-18337: Use after free in Blink\n - CVE-2018-18338: Heap buffer overflow in Canvas\n - CVE-2018-18339: Use after free in WebAudio\n - CVE-2018-18340: Use after free in MediaRecorder\n - CVE-2018-18341: Heap buffer overflow in Blink\n - CVE-2018-18342: Out of bounds write in V8\n - CVE-2018-18343: Use after free in Skia\n - CVE-2018-18344: Inappropriate implementation in Extensions\n - Multiple issues in SQLite via WebSQL\n - CVE-2018-18345: Inappropriate implementation in Site Isolation\n - CVE-2018-18346: Incorrect security UI in Blink\n - CVE-2018-18347: Inappropriate implementation in Navigation\n - CVE-2018-18348: Inappropriate implementation in Omnibox\n - CVE-2018-18349: Insufficient policy enforcement in Blink\n - CVE-2018-18350: Insufficient policy enforcement in Blink\n - CVE-2018-18351: Insufficient policy enforcement in Navigation\n - CVE-2018-18352: Inappropriate implementation in Media\n - CVE-2018-18353: Inappropriate implementation in Network Authentication\n - CVE-2018-18354: Insufficient data validation in Shell Integration\n - CVE-2018-18355: Insufficient policy enforcement in URL Formatter\n - CVE-2018-18356: Use after free in Skia\n - CVE-2018-18357: Insufficient policy enforcement in URL Formatter\n - CVE-2018-18358: Insufficient policy enforcement in Proxy\n - CVE-2018-18359: Out of bounds read in V8\n - Inappropriate implementation in PDFium\n - Use after free in Extensions\n - Inappropriate implementation in Navigation\n - Insufficient policy enforcement in Navigation\n - Insufficient policy enforcement in URL Formatter\n - Various fixes from internal audits, fuzzing and other initiatives\n - CVE-2018-17481: Use after free in PDFium (boo#1119364)\n\n The following changes are included:\n\n - advertisements posing as error messages are now blocked\n - Automatic playing of content at page load mostly disabled\n - New JavaScript API for relative time display\n\n", "edition": 1, "modified": "2018-12-15T15:09:21", "published": "2018-12-15T15:09:21", "id": "OPENSUSE-SU-2018:4143-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00041.html", "title": "Security update for Chromium (important)", "type": "suse", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-12-15T19:38:36", "bulletinFamily": "unix", "cvelist": ["CVE-2018-18348", "CVE-2018-18354", "CVE-2018-18349", "CVE-2018-18355", "CVE-2018-18358", "CVE-2018-18346", "CVE-2018-18352", "CVE-2018-18347", "CVE-2018-18340", "CVE-2018-18339", "CVE-2018-18357", "CVE-2018-18337", "CVE-2018-17481", "CVE-2018-18351", "CVE-2018-18336", "CVE-2018-18343", "CVE-2018-18342", "CVE-2018-18344", "CVE-2018-18359", "CVE-2018-18335", "CVE-2018-17480", "CVE-2018-18338", "CVE-2018-18345", "CVE-2018-18353", "CVE-2018-18341", "CVE-2018-18356", "CVE-2018-18350"], "description": "This update to Chromium 71.0.3578.98 fixes the following issues:\n\n Security issues fixed (boo#1118529):\n\n - CVE-2018-17480: Out of bounds write in V8\n - CVE-2018-17481: Use after frees in PDFium\n - CVE-2018-18335: Heap buffer overflow in Skia\n - CVE-2018-18336: Use after free in PDFium\n - CVE-2018-18337: Use after free in Blink\n - CVE-2018-18338: Heap buffer overflow in Canvas\n - CVE-2018-18339: Use after free in WebAudio\n - CVE-2018-18340: Use after free in MediaRecorder\n - CVE-2018-18341: Heap buffer overflow in Blink\n - CVE-2018-18342: Out of bounds write in V8\n - CVE-2018-18343: Use after free in Skia\n - CVE-2018-18344: Inappropriate implementation in Extensions\n - Multiple issues in SQLite via WebSQL\n - CVE-2018-18345: Inappropriate implementation in Site Isolation\n - CVE-2018-18346: Incorrect security UI in Blink\n - CVE-2018-18347: Inappropriate implementation in Navigation\n - CVE-2018-18348: Inappropriate implementation in Omnibox\n - CVE-2018-18349: Insufficient policy enforcement in Blink\n - CVE-2018-18350: Insufficient policy enforcement in Blink\n - CVE-2018-18351: Insufficient policy enforcement in Navigation\n - CVE-2018-18352: Inappropriate implementation in Media\n - CVE-2018-18353: Inappropriate implementation in Network Authentication\n - CVE-2018-18354: Insufficient data validation in Shell Integration\n - CVE-2018-18355: Insufficient policy enforcement in URL Formatter\n - CVE-2018-18356: Use after free in Skia\n - CVE-2018-18357: Insufficient policy enforcement in URL Formatter\n - CVE-2018-18358: Insufficient policy enforcement in Proxy\n - CVE-2018-18359: Out of bounds read in V8\n - Inappropriate implementation in PDFium\n - Use after free in Extensions\n - Inappropriate implementation in Navigation\n - Insufficient policy enforcement in Navigation\n - Insufficient policy enforcement in URL Formatter\n - Various fixes from internal audits, fuzzing and other initiatives\n - CVE-2018-17481: Use after free in PDFium (boo#1119364)\n\n The following changes are included:\n\n - advertisements posing as error messages are now blocked\n - Automatic playing of content at page load mostly disabled\n - New JavaScript API for relative time display\n\n", "edition": 1, "modified": "2018-12-15T15:08:49", "published": "2018-12-15T15:08:49", "id": "OPENSUSE-SU-2018:4142-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html", "title": "Security update for Chromium (important)", "type": "suse", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-02-19T01:01:38", "bulletinFamily": "unix", "cvelist": ["CVE-2019-5785", "CVE-2018-18335", "CVE-2018-18356"], "description": "This update for MozillaFirefox to version 60.5.1 fixes the following\n issues:\n\n Security issues fixed (bsc#1125330):\n\n - CVE-2018-18356: Fixed a use-after-free vulnerability in Skia library.\n - CVE-2019-5785: Fixed an integer overflow in the Skia library.\n - CVE-2018-18335: Fixed a buffer overflow in Skia library with accelerated\n Canvas 2D by disabling Canvas 2D. This vulnerability does not affect\n Linux platform.\n\n", "edition": 1, "modified": "2019-02-18T21:09:05", "published": "2019-02-18T21:09:05", "id": "OPENSUSE-SU-2019:0202-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00039.html", "title": "Security update for MozillaFirefox (important)", "type": "suse", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-02-26T17:26:41", "bulletinFamily": "unix", "cvelist": ["CVE-2018-18509", "CVE-2019-5785", "CVE-2018-18335", "CVE-2018-18356"], "description": "This update for MozillaThunderbird to version 60.5.1 fixes the following\n issues:\n\n Security issues fixed (MFSA 2019-06 bsc#1125330):\n\n - CVE-2018-18356: Fixed a Use-after-free in Skia.\n - CVE-2019-5785: Fixed an Integer overflow in Skia.\n - CVE-2018-18335: Fixed a Buffer overflow in Skia by default deactivating\n Canvas 2D. This issue does not affect Linuc distributions.\n - CVE-2018-18509: Fixed a flaw which during verification of certain S/MIME\n signatures showing mistekenly that emails bring a valid sugnature.\n\n", "edition": 1, "modified": "2019-02-26T15:09:15", "published": "2019-02-26T15:09:15", "id": "OPENSUSE-SU-2019:0250-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00066.html", "title": "Security update for MozillaThunderbird (important)", "type": "suse", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-12-14T21:38:21", "bulletinFamily": "unix", "cvelist": ["CVE-2018-17481"], "description": "This update to Chromium 71.0.3578.98 fixes on security issue.\n\n - CVE-2018-17481: Use after free in PDFium - a follow-up fix to Chromiun\n 70 (boo#1119364)\n\n", "edition": 1, "modified": "2018-12-14T18:09:00", "published": "2018-12-14T18:09:00", "id": "OPENSUSE-SU-2018:4122-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00031.html", "title": "Security update for Chromium (important)", "type": "suse", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-02-26T17:26:40", "bulletinFamily": "unix", "cvelist": ["CVE-2019-5785", "CVE-2018-18356"], "description": "This update for MozillaFirefox to version 60.5.1esr fixes the following\n issues:\n\n Security vulnerabilities addressed (MFSA-2019-05, boo#1125330):\n\n - CVE-2018-18356: Fixed a use-after-free vulnerability in the Skia library\n that could occur when creating a path, leading to a potentially\n exploitable crash.\n - CVE-2019-5785: Fixed an integer overflow vulnerability in the Skia\n library that could occur after specific transform operations, leading to\n a potentially exploitable crash.\n\n", "edition": 1, "modified": "2019-02-26T15:09:33", "published": "2019-02-26T15:09:33", "id": "OPENSUSE-SU-2019:0248-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00067.html", "title": "Security update for MozillaFirefox (important)", "type": "suse", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "freebsd": [{"lastseen": "2019-05-29T18:31:47", "bulletinFamily": "unix", "cvelist": ["CVE-2018-18348", "CVE-2018-18354", "CVE-2018-18349", "CVE-2018-18355", "CVE-2018-18358", "CVE-2018-18346", "CVE-2018-18352", "CVE-2018-18347", "CVE-2018-18340", "CVE-2018-18339", "CVE-2018-18357", "CVE-2018-18337", "CVE-2018-17481", "CVE-2018-18351", "CVE-2018-18336", "CVE-2018-18343", "CVE-2018-18342", "CVE-2018-18344", "CVE-2018-18359", "CVE-2018-18335", "CVE-2018-17480", "CVE-2018-18338", "CVE-2018-18345", "CVE-2018-18353", "CVE-2018-18341", "CVE-2018-18356", "CVE-2018-18350"], "description": "\nGoogle Chrome Releases reports:\n\n43 security fixes in this release, including:\n\nHigh CVE-2018-17480: Out of bounds write in V8\nHigh CVE-2018-17481: Use after free in PDFium\nHigh CVE-2018-18335: Heap buffer overflow in Skia\nHigh CVE-2018-18336: Use after free in PDFium\nHigh CVE-2018-18337: Use after free in Blink\nHigh CVE-2018-18338: Heap buffer overflow in Canvas\nHigh CVE-2018-18339: Use after free in WebAudio\nHigh CVE-2018-18340: Use after free in MediaRecorder\nHigh CVE-2018-18341: Heap buffer overflow in Blink\nHigh CVE-2018-18342: Out of bounds write in V8\nHigh CVE-2018-18343: Use after free in Skia\nHigh CVE-2018-18344: Inappropriate implementation in Extensions\nHigh To be allocated: Multiple issues in SQLite via WebSQL\nMedium CVE-2018-18345: Inappropriate implementation in Site Isolation\nMedium CVE-2018-18346: Incorrect security UI in Blink\nMedium CVE-2018-18347: Inappropriate implementation in Navigation\nMedium CVE-2018-18348: Inappropriate implementation in Omnibox\nMedium CVE-2018-18349: Insufficient policy enforcement in Blink\nMedium CVE-2018-18350: Insufficient policy enforcement in Blink\nMedium CVE-2018-18351: Insufficient policy enforcement in Navigation\nMedium CVE-2018-18352: Inappropriate implementation in Media\nMedium CVE-2018-18353: Inappropriate implementation in Network Authentication\nMedium CVE-2018-18354: Insufficient data validation in Shell Integration\nMedium CVE-2018-18355: Insufficient policy enforcement in URL Formatter\nMedium CVE-2018-18356: Use after free in Skia\nMedium CVE-2018-18357: Insufficient policy enforcement in URL Formatter\nMedium CVE-2018-18358: Insufficient policy enforcement in Proxy\nMedium CVE-2018-18359: Out of bounds read in V8\nLow To be allocated: Inappropriate implementation in PDFium\nLow To be allocated: Use after free in Extensions\nLow To be allocated: Inappropriate implementation in Navigation\nLow To be allocated: Inappropriate implementation in Navigation\nLow To be allocated: Insufficient policy enforcement in Navigation\nLow To be allocated: Insufficient policy enforcement in URL Formatter\nMedium To be allocated: Insufficient policy enforcement in Payments\nVarious fixes from internal audits, fuzzing and other initiatives\n\n\n", "edition": 2, "modified": "2018-12-04T00:00:00", "published": "2018-12-04T00:00:00", "id": "546D4DD4-10EA-11E9-B407-080027EF1A23", "href": "https://vuxml.freebsd.org/freebsd/546d4dd4-10ea-11e9-b407-080027ef1a23.html", "title": "chromium -- multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:31:47", "bulletinFamily": "unix", "cvelist": ["CVE-2018-17481"], "description": "\nGoogle Chrome Releases reports:\n\n1 security fix contributed by external researches:\n\nHigh CVE-2018-17481: Use after free in PDFium\n\n\n", "edition": 2, "modified": "2018-12-12T00:00:00", "published": "2018-12-12T00:00:00", "id": "720590DF-10EB-11E9-B407-080027EF1A23", "href": "https://vuxml.freebsd.org/freebsd/720590df-10eb-11e9-b407-080027ef1a23.html", "title": "chromium -- Use after free in PDFium", "type": "freebsd", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "kaspersky": [{"lastseen": "2020-09-02T11:59:45", "bulletinFamily": "info", "cvelist": ["CVE-2018-18348", "CVE-2018-18354", "CVE-2018-18349", "CVE-2018-18355", "CVE-2018-18358", "CVE-2018-18346", "CVE-2018-18352", "CVE-2018-18347", "CVE-2018-18340", "CVE-2018-18339", "CVE-2018-18357", "CVE-2018-18337", "CVE-2018-17481", "CVE-2018-18351", "CVE-2018-18336", "CVE-2018-18343", "CVE-2018-18342", "CVE-2018-18344", "CVE-2018-18359", "CVE-2018-18335", "CVE-2018-17480", "CVE-2018-18338", "CVE-2018-18345", "CVE-2018-18353", "CVE-2018-18341", "CVE-2018-18356", "CVE-2018-18350"], "description": "### *Detect date*:\n12/04/2018\n\n### *Severity*:\nWarning\n\n### *Description*:\nMultiple serious vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, cause denial of service.\n\n### *Affected products*:\nGoogle Chrome earlier than 71.0.3578.80\n\n### *Solution*:\nUpdate to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk. \n[Google Chrome download page](<https://www.google.com/chrome/browser/desktop/>)\n\n### *Original advisories*:\n[Stable Channel Update for Desktop](<https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Google Chrome](<https://threats.kaspersky.com/en/product/Google-Chrome/>)\n\n### *CVE-IDS*:\n[CVE-2018-17480](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17480>)0.0Unknown \n[CVE-2018-17481](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17481>)0.0Unknown \n[CVE-2018-18335](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18335>)0.0Unknown \n[CVE-2018-18336](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18336>)0.0Unknown \n[CVE-2018-18337](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18337>)0.0Unknown \n[CVE-2018-18338](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18338>)0.0Unknown \n[CVE-2018-18339](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18339>)0.0Unknown \n[CVE-2018-18340](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18340>)0.0Unknown \n[CVE-2018-18341](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18341>)0.0Unknown \n[CVE-2018-18342](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18342>)0.0Unknown \n[CVE-2018-18343](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18343>)0.0Unknown \n[CVE-2018-18344](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18344>)0.0Unknown \n[CVE-2018-18345](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18345>)0.0Unknown \n[CVE-2018-18346](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18346>)0.0Unknown \n[CVE-2018-18347](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18347>)0.0Unknown \n[CVE-2018-18348](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18348>)0.0Unknown \n[CVE-2018-18349](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18349>)0.0Unknown \n[CVE-2018-18350](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18350>)0.0Unknown \n[CVE-2018-18351](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18351>)0.0Unknown \n[CVE-2018-18352](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18352>)0.0Unknown \n[CVE-2018-18353](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18353>)0.0Unknown \n[CVE-2018-18354](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18354>)0.0Unknown \n[CVE-2018-18355](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18355>)0.0Unknown \n[CVE-2018-18356](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18356>)0.0Unknown \n[CVE-2018-18357](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18357>)0.0Unknown \n[CVE-2018-18358](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18358>)0.0Unknown \n[CVE-2018-18359](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18359>)0.0Unknown\n\n### *Exploitation*:\nMalware exists for this vulnerability. Usually such malware is classified as Exploit. [More details](<https://threats.kaspersky.com/en/class/Exploit/>).", "edition": 12, "modified": "2020-06-18T00:00:00", "published": "2018-12-04T00:00:00", "id": "KLA11379", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11379", "title": "\r KLA11379Multiple vulnerabilities in Google Chrome ", "type": "kaspersky", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-09-02T11:54:14", "bulletinFamily": "info", "cvelist": ["CVE-2018-18348", "CVE-2018-20067", "CVE-2018-20068", "CVE-2018-18354", "CVE-2018-18349", "CVE-2018-18355", "CVE-2018-18358", "CVE-2018-18346", "CVE-2018-18352", "CVE-2018-18347", "CVE-2018-18340", "CVE-2018-18339", "CVE-2018-18357", "CVE-2018-18337", "CVE-2018-17481", "CVE-2018-18351", "CVE-2018-18336", "CVE-2018-20065", "CVE-2018-20071", "CVE-2018-18343", "CVE-2018-18342", "CVE-2018-18344", "CVE-2018-18359", "CVE-2018-20066", "CVE-2018-18335", "CVE-2018-17480", "CVE-2018-18338", "CVE-2018-18345", "CVE-2018-20069", "CVE-2018-18353", "CVE-2018-18341", "CVE-2018-18356", "CVE-2018-18350", "CVE-2018-20070"], "description": "### *Detect date*:\n12/12/2018\n\n### *Severity*:\nWarning\n\n### *Description*:\nMultiple vulnerabilities were found in Opera. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions, execute arbitrary code, spoof user interface, obtain sensitive information.\n\n### *Exploitation*:\nMalware exists for this vulnerability. Usually such malware is classified as Exploit. [More details](<https://threats.kaspersky.com/en/class/Exploit/>).\n\n### *Affected products*:\nOpera earlier than 58.0.3135.26\n\n### *Solution*:\nUpdate to the latest version \n[Download Opera](<https://www.opera.com>)\n\n### *Original advisories*:\n[Changelog for Opera 58](<https://blogs.opera.com/desktop/changelog-for-58/#b3135.26>) \n[Stable Channel Update for Desktop](<https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Opera](<https://threats.kaspersky.com/en/product/Opera/>)\n\n### *CVE-IDS*:\n[CVE-2018-17480](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17480>)0.0Unknown \n[CVE-2018-17481](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17481>)0.0Unknown \n[CVE-2018-18335](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18335>)0.0Unknown \n[CVE-2018-18336](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18336>)0.0Unknown \n[CVE-2018-18337](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18337>)0.0Unknown \n[CVE-2018-18338](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18338>)0.0Unknown \n[CVE-2018-18339](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18339>)0.0Unknown \n[CVE-2018-18340](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18340>)0.0Unknown \n[CVE-2018-18341](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18341>)0.0Unknown \n[CVE-2018-18342](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18342>)0.0Unknown \n[CVE-2018-18343](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18343>)0.0Unknown \n[CVE-2018-18344](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18344>)0.0Unknown \n[CVE-2018-18345](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18345>)0.0Unknown \n[CVE-2018-18346](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18346>)0.0Unknown \n[CVE-2018-18347](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18347>)0.0Unknown \n[CVE-2018-18348](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18348>)0.0Unknown \n[CVE-2018-18349](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18349>)0.0Unknown \n[CVE-2018-18350](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18350>)0.0Unknown \n[CVE-2018-18351](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18351>)0.0Unknown \n[CVE-2018-18352](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18352>)0.0Unknown \n[CVE-2018-18353](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18353>)0.0Unknown \n[CVE-2018-18354](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18354>)0.0Unknown \n[CVE-2018-18355](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18355>)0.0Unknown \n[CVE-2018-18356](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18356>)0.0Unknown \n[CVE-2018-18357](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18357>)0.0Unknown \n[CVE-2018-18358](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18358>)0.0Unknown \n[CVE-2018-18359](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18359>)0.0Unknown \n[CVE-2018-20070](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20070>)0.0Unknown \n[CVE-2018-20065](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20065>)0.0Unknown \n[CVE-2018-20068](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20068>)0.0Unknown \n[CVE-2018-20069](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20069>)0.0Unknown \n[CVE-2018-20071](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20071>)0.0Unknown \n[CVE-2018-20067](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20067>)0.0Unknown \n[CVE-2018-20066](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20066>)0.0Unknown", "edition": 1, "modified": "2020-06-18T00:00:00", "published": "2018-12-12T00:00:00", "id": "KLA11734", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11734", "title": "\r KLA11734Multiple vulnerabilities in Opera ", "type": "kaspersky", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-09-02T11:53:14", "bulletinFamily": "info", "cvelist": ["CVE-2018-18511", "CVE-2019-5785", "CVE-2018-18335", "CVE-2018-18356"], "description": "### *Detect date*:\n02/12/2019\n\n### *Severity*:\nHigh\n\n### *Description*:\nMultiple serious vulnerabilities were found in Mozilla Firefox and Firefox ESR. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions.\n\n### *Affected products*:\nMozilla Firefox earlier than 65.0.1 \nMozilla Firefox ESR earlier than 60.5.1\n\n### *Solution*:\nUpdate to the latest version \n[Download Mozilla Firefox](<https://www.mozilla.org/en-US/firefox/new/>)\n\n### *Original advisories*:\n[Mozilla Foundation Security Advisory 2019-04](<https://www.mozilla.org/en-US/security/advisories/mfsa2019-04/>) \n[Mozilla Foundation Security Advisory 2019-05](<https://www.mozilla.org/en-US/security/advisories/mfsa2019-05/>) \n\n\n### *Impacts*:\nOSI \n\n### *Related products*:\n[Mozilla Firefox](<https://threats.kaspersky.com/en/product/Mozilla-Firefox/>)\n\n### *CVE-IDS*:\n[CVE-2018-18335](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18335>)0.0Unknown \n[CVE-2018-18356](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18356>)0.0Unknown \n[CVE-2019-5785](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5785>)0.0Unknown \n[CVE-2018-18511](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511>)0.0Unknown", "edition": 5, "modified": "2020-05-22T00:00:00", "published": "2019-02-12T00:00:00", "id": "KLA11416", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11416", "title": "\r KLA11416Multiple vulnerabilities in Mozilla Firefox and Firefox ESR ", "type": "kaspersky", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-09-02T11:54:54", "bulletinFamily": "info", "cvelist": ["CVE-2018-18509", "CVE-2019-5785", "CVE-2018-18335", "CVE-2018-18356"], "description": "### *Detect date*:\n02/14/2019\n\n### *Severity*:\nHigh\n\n### *Description*:\nMultiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions.\n\n### *Affected products*:\nMozilla Thunderbird earlier than 60.5.1\n\n### *Solution*:\nUpdate to the latest version \n[Download Mozilla Thunderbird](<https://www.mozilla.org/en-US/thunderbird/>)\n\n### *Original advisories*:\n[Mozilla Foundation Security Advisory 2019-06](<https://www.mozilla.org/en-US/security/advisories/mfsa2019-06/>) \n\n\n### *Impacts*:\nDoS \n\n### *Related products*:\n[Mozilla Thunderbird](<https://threats.kaspersky.com/en/product/Mozilla-Thunderbird/>)\n\n### *CVE-IDS*:\n[CVE-2018-18335](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18335>)0.0Unknown \n[CVE-2018-18356](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18356>)0.0Unknown \n[CVE-2019-5785](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5785>)0.0Unknown \n[CVE-2018-18509](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18509>)7.0High", "edition": 5, "modified": "2020-05-22T00:00:00", "published": "2019-02-14T00:00:00", "id": "KLA11425", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11425", "title": "\r KLA11425Multiple vulnerabilities in Mozilla Thunderbird ", "type": "kaspersky", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-09-02T11:49:05", "bulletinFamily": "info", "cvelist": ["CVE-2018-17481"], "description": "### *Detect date*:\n12/12/2018\n\n### *Severity*:\nHigh\n\n### *Description*:\nUse afrer free vulnerability was found in Google Chrome\u2019s. This vulnerability related to PDFium component. Malicious users can exploit this vulnerability to execute arbitrary code, cause denial of service.\n\n### *Affected products*:\nGoogle Chrome for Windows, Mac, and Linux prior to 71.0.3578.98\n\n### *Solution*:\nUpdate to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk. \n[Google Chrome download page](<https://www.google.com/chrome/browser/desktop/>)\n\n### *Original advisories*:\n[Stable Channel Update for Desktop](<https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop_12.html>) \n\n\n### *Impacts*:\nDoS \n\n### *Related products*:\n[Google Chrome](<https://threats.kaspersky.com/en/product/Google-Chrome/>)\n\n### *CVE-IDS*:\n[CVE-2018-17481](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17481>)0.0Unknown", "edition": 10, "modified": "2020-05-22T00:00:00", "published": "2018-12-12T00:00:00", "id": "KLA11391", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11391", "title": "\r KLA11391Use after free vulnerability in Google Chrome ", "type": "kaspersky", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "archlinux": [{"lastseen": "2020-09-22T18:36:40", "bulletinFamily": "unix", "cvelist": ["CVE-2018-17480", "CVE-2018-17481", "CVE-2018-18335", "CVE-2018-18336", "CVE-2018-18337", "CVE-2018-18338", "CVE-2018-18339", "CVE-2018-18340", "CVE-2018-18341", "CVE-2018-18342", "CVE-2018-18343", "CVE-2018-18344", "CVE-2018-18345", "CVE-2018-18346", "CVE-2018-18347", "CVE-2018-18348", "CVE-2018-18349", "CVE-2018-18350", "CVE-2018-18351", "CVE-2018-18352", "CVE-2018-18353", "CVE-2018-18354", "CVE-2018-18355", "CVE-2018-18356", "CVE-2018-18357", "CVE-2018-18358", "CVE-2018-18359"], "description": "Arch Linux Security Advisory ASA-201812-2\n=========================================\n\nSeverity: Critical\nDate : 2018-12-08\nCVE-ID : CVE-2018-17480 CVE-2018-17481 CVE-2018-18335 CVE-2018-18336\nCVE-2018-18337 CVE-2018-18338 CVE-2018-18339 CVE-2018-18340\nCVE-2018-18341 CVE-2018-18342 CVE-2018-18343 CVE-2018-18344\nCVE-2018-18345 CVE-2018-18346 CVE-2018-18347 CVE-2018-18348\nCVE-2018-18349 CVE-2018-18350 CVE-2018-18351 CVE-2018-18352\nCVE-2018-18353 CVE-2018-18354 CVE-2018-18355 CVE-2018-18356\nCVE-2018-18357 CVE-2018-18358 CVE-2018-18359\nPackage : chromium\nType : multiple issues\nRemote : Yes\nLink : https://security.archlinux.org/AVG-824\n\nSummary\n=======\n\nThe package chromium before version 71.0.3578.80-1 is vulnerable to\nmultiple issues including arbitrary code execution, access restriction\nbypass, information disclosure and insufficient validation.\n\nResolution\n==========\n\nUpgrade to 71.0.3578.80-1.\n\n# pacman -Syu \"chromium>=71.0.3578.80-1\"\n\nThe problems have been fixed upstream in version 71.0.3578.80.\n\nWorkaround\n==========\n\nNone.\n\nDescription\n===========\n\n- CVE-2018-17480 (arbitrary code execution)\n\nAn out of bounds write has been found in the V8 component of chromium\nbefore 71.0.3578.80.\n\n- CVE-2018-17481 (arbitrary code execution)\n\nA use-after-free has been found in the PDFium component of chromium\nbefore 71.0.3578.80.\n\n- CVE-2018-18335 (arbitrary code execution)\n\nA heap-based buffer overflow has been found in the Skia component of\nchromium before 71.0.3578.80.\n\n- CVE-2018-18336 (arbitrary code execution)\n\nA use-after-free has been found in the PDFium component of chromium\nbefore 71.0.3578.80.\n\n- CVE-2018-18337 (arbitrary code execution)\n\nA use-after-free has been found in the Blink component of chromium\nbefore 71.0.3578.80.\n\n- CVE-2018-18338 (arbitrary code execution)\n\nA heap-based buffer overflow has been found in the Canva component of\nchromium before 71.0.3578.80.\n\n- CVE-2018-18339 (arbitrary code execution)\n\nA use-after-free has been found in the WebAudio component of chromium\nbefore 71.0.3578.80.\n\n- CVE-2018-18340 (arbitrary code execution)\n\nA use-after-free has been found in the MediaRecorder component of\nchromium before 71.0.3578.80.\n\n- CVE-2018-18341 (arbitrary code execution)\n\nA heap-based buffer overflow has been found in the Blink component of\nchromium before 71.0.3578.80.\n\n- CVE-2018-18342 (arbitrary code execution)\n\nAn out of bounds write has been found in the V8 component of chromium\nbefore 71.0.3578.80.\n\n- CVE-2018-18343 (arbitrary code execution)\n\nA use-after-free has been found in the Skia component of chromium\nbefore 71.0.3578.80.\n\n- CVE-2018-18344 (access restriction bypass)\n\nAn inappropriate implementation issue has been found in the Extensions\ncomponent of chromium before 71.0.3578.80.\n\n- CVE-2018-18345 (access restriction bypass)\n\nAn inappropriate implementation issue has been found in the Site\nIsolation component of chromium before 71.0.3578.80.\n\n- CVE-2018-18346 (access restriction bypass)\n\nAn incorrect security UI issue has been found in the Blink component of\nchromium before 71.0.3578.80.\n\n- CVE-2018-18347 (access restriction bypass)\n\nAn inappropriate implementation issue has been found in the Navigation\ncomponent of chromium before 71.0.3578.80.\n\n- CVE-2018-18348 (access restriction bypass)\n\nAn inappropriate implementation issue has been found in the Omnibox\ncomponent of chromium before 71.0.3578.80.\n\n- CVE-2018-18349 (access restriction bypass)\n\nAn insufficient policy enforcement issue has been found in the Blink\ncomponent of chromium before 71.0.3578.80.\n\n- CVE-2018-18350 (access restriction bypass)\n\nAn insufficient policy enforcement issue has been found in the Blink\ncomponent of chromium before 71.0.3578.80.\n\n- CVE-2018-18351 (access restriction bypass)\n\nAn insufficient policy enforcement issue has been found in the\nNavigation component of chromium before 71.0.3578.80.\n\n- CVE-2018-18352 (access restriction bypass)\n\nAn inappropriate implementation issue has been found in the Media\ncomponent of chromium before 71.0.3578.80.\n\n- CVE-2018-18353 (access restriction bypass)\n\nAn inappropriate implementation issue has been found in the Network\nAuthentication component of chromium before 71.0.3578.80.\n\n- CVE-2018-18354 (insufficient validation)\n\nAn insufficient data validation issue has been found in the Shell\nIntegration component of chromium before 71.0.3578.80.\n\n- CVE-2018-18355 (access restriction bypass)\n\nAn insufficient policy enforcement issue has been found in the URL\nFormatter component of chromium before 71.0.3578.80.\n\n- CVE-2018-18356 (arbitrary code execution)\n\nA use-after-free has been found in the Skia component of chromium\nbefore 71.0.3578.80.\n\n- CVE-2018-18357 (access restriction bypass)\n\nAn insufficient policy enforcement issue has been found in the URL\nFormatter component of chromium before 71.0.3578.80.\n\n- CVE-2018-18358 (access restriction bypass)\n\nAn insufficient policy enforcement issue has been found in the Proxy\ncomponent of chromium before 71.0.3578.80.\n\n- CVE-2018-18359 (information disclosure)\n\nAn out-of-bounds read has been found in the V8 component of chromium\nbefore 71.0.3578.80.\n\nImpact\n======\n\nA remote attacker can access sensitive information, bypass security\nrestrictions and execute arbitrary code on the affected host.\n\nReferences\n==========\n\nhttps://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html\nhttps://bugs.chromium.org/p/chromium/issues/detail?id=905940\nhttps://bugs.chromium.org/p/chromium/issues/detail?id=901654\nhttps://bugs.chromium.org/p/chromium/issues/detail?id=895362\nhttps://bugs.chromium.org/p/chromium/issues/detail?id=898531\nhttps://bugs.chromium.org/p/chromium/issues/detail?id=886753\nhttps://bugs.chromium.org/p/chromium/issues/detail?id=890576\nhttps://bugs.chromium.org/p/chromium/issues/detail?id=891187\nhttps://bugs.chromium.org/p/chromium/issues/detail?id=896736\nhttps://bugs.chromium.org/p/chromium/issues/detail?id=901030\nhttps://bugs.chromium.org/p/chromium/issues/detail?id=906313\nhttps://bugs.chromium.org/p/chromium/issues/detail?id=882423\nhttps://bugs.chromium.org/p/chromium/issues/detail?id=866426\nhttps://bugs.chromium.org/p/chromium/issues/detail?id=886976\nhttps://bugs.chromium.org/p/chromium/issues/detail?id=606104\nhttps://bugs.chromium.org/p/chromium/issues/detail?id=850824\nhttps://bugs.chromium.org/p/chromium/issues/detail?id=881659\nhttps://bugs.chromium.org/p/chromium/issues/detail?id=894399\nhttps://bugs.chromium.org/p/chromium/issues/detail?id=799747\nhttps://bugs.chromium.org/p/chromium/issues/detail?id=833847\nhttps://bugs.chromium.org/p/chromium/issues/detail?id=849942\nhttps://bugs.chromium.org/p/chromium/issues/detail?id=884179\nhttps://bugs.chromium.org/p/chromium/issues/detail?id=889459\nhttps://bugs.chromium.org/p/chromium/issues/detail?id=896717\nhttps://bugs.chromium.org/p/chromium/issues/detail?id=883666\nhttps://bugs.chromium.org/p/chromium/issues/detail?id=895207\nhttps://bugs.chromium.org/p/chromium/issues/detail?id=899126\nhttps://bugs.chromium.org/p/chromium/issues/detail?id=907714\nhttps://security.archlinux.org/CVE-2018-17480\nhttps://security.archlinux.org/CVE-2018-17481\nhttps://security.archlinux.org/CVE-2018-18335\nhttps://security.archlinux.org/CVE-2018-18336\nhttps://security.archlinux.org/CVE-2018-18337\nhttps://security.archlinux.org/CVE-2018-18338\nhttps://security.archlinux.org/CVE-2018-18339\nhttps://security.archlinux.org/CVE-2018-18340\nhttps://security.archlinux.org/CVE-2018-18341\nhttps://security.archlinux.org/CVE-2018-18342\nhttps://security.archlinux.org/CVE-2018-18343\nhttps://security.archlinux.org/CVE-2018-18344\nhttps://security.archlinux.org/CVE-2018-18345\nhttps://security.archlinux.org/CVE-2018-18346\nhttps://security.archlinux.org/CVE-2018-18347\nhttps://security.archlinux.org/CVE-2018-18348\nhttps://security.archlinux.org/CVE-2018-18349\nhttps://security.archlinux.org/CVE-2018-18350\nhttps://security.archlinux.org/CVE-2018-18351\nhttps://security.archlinux.org/CVE-2018-18352\nhttps://security.archlinux.org/CVE-2018-18353\nhttps://security.archlinux.org/CVE-2018-18354\nhttps://security.archlinux.org/CVE-2018-18355\nhttps://security.archlinux.org/CVE-2018-18356\nhttps://security.archlinux.org/CVE-2018-18357\nhttps://security.archlinux.org/CVE-2018-18358\nhttps://security.archlinux.org/CVE-2018-18359", "modified": "2018-12-08T00:00:00", "published": "2018-12-08T00:00:00", "id": "ASA-201812-2", "href": "https://security.archlinux.org/ASA-201812-2", "type": "archlinux", "title": "[ASA-201812-2] chromium: multiple issues", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-09-22T18:36:40", "bulletinFamily": "unix", "cvelist": ["CVE-2018-18335", "CVE-2018-18356", "CVE-2018-18509", "CVE-2019-5785"], "description": "Arch Linux Security Advisory ASA-201902-23\n==========================================\n\nSeverity: Critical\nDate : 2019-02-20\nCVE-ID : CVE-2018-18335 CVE-2018-18356 CVE-2018-18509 CVE-2019-5785\nPackage : thunderbird\nType : multiple issues\nRemote : Yes\nLink : https://security.archlinux.org/AVG-908\n\nSummary\n=======\n\nThe package thunderbird before version 60.5.1-1 is vulnerable to\nmultiple issues including arbitrary code execution and insufficient\nvalidation.\n\nResolution\n==========\n\nUpgrade to 60.5.1-1.\n\n# pacman -Syu \"thunderbird>=60.5.1-1\"\n\nThe problems have been fixed upstream in version 60.5.1.\n\nWorkaround\n==========\n\nNone.\n\nDescription\n===========\n\n- CVE-2018-18335 (arbitrary code execution)\n\nA heap-based buffer overflow has been found in the Skia component of\nchromium before 71.0.3578.80 and thunderbird before 60.5.1.\n\n- CVE-2018-18356 (arbitrary code execution)\n\nA use-after-free has been found in the Skia component of chromium\nbefore 71.0.3578.80 and firefox before 65.0.1 and thunderbird before\n60.5.1.\n\n- CVE-2018-18509 (insufficient validation)\n\nA flaw during verification of certain S/MIME signatures causes emails\nto be shown in Thunderbird before 60.5.1 as having a valid digital\nsignature, even if the shown message contents aren't covered by the\nsignature. The flaw allows an attacker to reuse a valid S/MIME\nsignature to craft an email message with arbitrary content.\n\n- CVE-2019-5785 (arbitrary code execution)\n\nAn integer overflow issue has been found in the Skia component of\nfirefox before 65.0.1 and thunderbird before 60.5.1.\n\nImpact\n======\n\nA remote attacker can reuse a valid S/MIME signature to craft an e-mail\nmessage with arbitrary content, and execute arbitrary code through\nskia.\n\nReferences\n==========\n\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2019-06/\nhttps://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html\nhttps://bugs.chromium.org/p/chromium/issues/detail?id=895362\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2019-06/#CVE-2018-18335\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1525815\nhttps://bugs.chromium.org/p/chromium/issues/detail?id=883666\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2019-04/#CVE-2018-18356\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2019-06/#CVE-2018-18356\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1525817\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2019-06/#CVE-2018-18509\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1507218\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2019-04/#CVE-2019-5785\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2019-06/#CVE-2019-5785\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1525433\nhttps://googleprojectzero.blogspot.com/2019/02/the-curious-case-of-convexity-confusion.html\nhttps://security.archlinux.org/CVE-2018-18335\nhttps://security.archlinux.org/CVE-2018-18356\nhttps://security.archlinux.org/CVE-2018-18509\nhttps://security.archlinux.org/CVE-2019-5785", "modified": "2019-02-20T00:00:00", "published": "2019-02-20T00:00:00", "id": "ASA-201902-23", "href": "https://security.archlinux.org/ASA-201902-23", "type": "archlinux", "title": "[ASA-201902-23] thunderbird: multiple issues", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "redhat": [{"lastseen": "2019-08-13T18:46:47", "bulletinFamily": "unix", "cvelist": ["CVE-2018-17480", "CVE-2018-17481", "CVE-2018-18335", "CVE-2018-18336", "CVE-2018-18337", "CVE-2018-18338", "CVE-2018-18339", "CVE-2018-18340", "CVE-2018-18341", "CVE-2018-18342", "CVE-2018-18343", "CVE-2018-18344", "CVE-2018-18345", "CVE-2018-18346", "CVE-2018-18347", "CVE-2018-18348", "CVE-2018-18349", "CVE-2018-18350", "CVE-2018-18351", "CVE-2018-18352", "CVE-2018-18353", "CVE-2018-18354", "CVE-2018-18355", "CVE-2018-18356", "CVE-2018-18357", "CVE-2018-18358", "CVE-2018-18359"], "description": "Chromium is an open-source web browser, powered by WebKit (Blink).\n\nThis update upgrades Chromium to version 71.0.3578.80.\n\nSecurity Fix(es):\n\n* chromium-browser: Out of bounds write in V8 (CVE-2018-17480)\n\n* chromium-browser: Use after frees in PDFium (CVE-2018-17481)\n\n* chromium-browser: Heap buffer overflow in Skia (CVE-2018-18335)\n\n* chromium-browser: Use after free in PDFium (CVE-2018-18336)\n\n* chromium-browser: Use after free in Blink (CVE-2018-18337)\n\n* chromium-browser: Heap buffer overflow in Canvas (CVE-2018-18338)\n\n* chromium-browser: Use after free in WebAudio (CVE-2018-18339)\n\n* chromium-browser: Use after free in MediaRecorder (CVE-2018-18340)\n\n* chromium-browser: Heap buffer overflow in Blink (CVE-2018-18341)\n\n* chromium-browser: Out of bounds write in V8 (CVE-2018-18342)\n\n* chromium-browser: Use after free in Skia (CVE-2018-18343)\n\n* chromium-browser: Inappropriate implementation in Extensions (CVE-2018-18344)\n\n* chromium-browser: Inappropriate implementation in Site Isolation (CVE-2018-18345)\n\n* chromium-browser: Incorrect security UI in Blink (CVE-2018-18346)\n\n* chromium-browser: Inappropriate implementation in Navigation (CVE-2018-18347)\n\n* chromium-browser: Inappropriate implementation in Omnibox (CVE-2018-18348)\n\n* chromium-browser: Insufficient policy enforcement in Blink (CVE-2018-18349)\n\n* chromium-browser: Insufficient policy enforcement in Blink (CVE-2018-18350)\n\n* chromium-browser: Insufficient policy enforcement in Navigation (CVE-2018-18351)\n\n* chromium-browser: Inappropriate implementation in Media (CVE-2018-18352)\n\n* chromium-browser: Inappropriate implementation in Network Authentication (CVE-2018-18353)\n\n* chromium-browser: Insufficient data validation in Shell Integration (CVE-2018-18354)\n\n* chromium-browser: Insufficient policy enforcement in URL Formatter (CVE-2018-18355)\n\n* chromium-browser: Use after free in Skia (CVE-2018-18356)\n\n* chromium-browser: Insufficient policy enforcement in URL Formatter (CVE-2018-18357)\n\n* chromium-browser: Insufficient policy enforcement in Proxy (CVE-2018-18358)\n\n* chromium-browser: Out of bounds read in V8 (CVE-2018-18359)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "modified": "2018-12-10T15:23:21", "published": "2018-12-10T15:22:08", "id": "RHSA-2018:3803", "href": "https://access.redhat.com/errata/RHSA-2018:3803", "type": "redhat", "title": "(RHSA-2018:3803) Important: chromium-browser security update", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-08-13T18:47:10", "bulletinFamily": "unix", "cvelist": ["CVE-2018-18356", "CVE-2019-5785"], "description": "Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.\n\nThis update upgrades Firefox to version 60.5.1 ESR.\n\nSecurity Fix(es):\n\n* chromium-browser, mozilla: Use after free in Skia (CVE-2018-18356)\n\n* mozilla: Integer overflow in Skia (CVE-2019-5785)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "modified": "2019-02-19T21:03:19", "published": "2019-02-19T20:59:19", "id": "RHSA-2019:0373", "href": "https://access.redhat.com/errata/RHSA-2019:0373", "type": "redhat", "title": "(RHSA-2019:0373) Important: firefox security update", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-08-13T18:46:17", "bulletinFamily": "unix", "cvelist": ["CVE-2018-18356", "CVE-2019-5785"], "description": "Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.\n\nThis update upgrades Firefox to version 60.5.1 ESR.\n\nSecurity Fix(es):\n\n* chromium-browser, mozilla: Use after free in Skia (CVE-2018-18356)\n\n* mozilla: Integer overflow in Skia (CVE-2019-5785)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "modified": "2019-02-19T21:03:18", "published": "2019-02-19T20:59:19", "id": "RHSA-2019:0374", "href": "https://access.redhat.com/errata/RHSA-2019:0374", "type": "redhat", "title": "(RHSA-2019:0374) Important: firefox security update", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2021-01-20T12:35:48", "description": "This update to Chromium 71.0.3578.98 fixes the following issues :\n\nSecurity issues fixed (boo#1118529) :\n\n - CVE-2018-17480: Out of bounds write in V8\n\n - CVE-2018-17481: Use after frees in PDFium\n\n - CVE-2018-18335: Heap buffer overflow in Skia\n\n - CVE-2018-18336: Use after free in PDFium\n\n - CVE-2018-18337: Use after free in Blink\n\n - CVE-2018-18338: Heap buffer overflow in Canvas\n\n - CVE-2018-18339: Use after free in WebAudio\n\n - CVE-2018-18340: Use after free in MediaRecorder\n\n - CVE-2018-18341: Heap buffer overflow in Blink\n\n - CVE-2018-18342: Out of bounds write in V8\n\n - CVE-2018-18343: Use after free in Skia\n\n - CVE-2018-18344: Inappropriate implementation in\n Extensions\n\n - Multiple issues in SQLite via WebSQL\n\n - CVE-2018-18345: Inappropriate implementation in Site\n Isolation\n\n - CVE-2018-18346: Incorrect security UI in Blink\n\n - CVE-2018-18347: Inappropriate implementation in\n Navigation\n\n - CVE-2018-18348: Inappropriate implementation in Omnibox\n\n - CVE-2018-18349: Insufficient policy enforcement in Blink\n\n - CVE-2018-18350: Insufficient policy enforcement in Blink\n\n - CVE-2018-18351: Insufficient policy enforcement in\n Navigation\n\n - CVE-2018-18352: Inappropriate implementation in Media\n\n - CVE-2018-18353: Inappropriate implementation in Network\n Authentication\n\n - CVE-2018-18354: Insufficient data validation in Shell\n Integration\n\n - CVE-2018-18355: Insufficient policy enforcement in URL\n Formatter\n\n - CVE-2018-18356: Use after free in Skia\n\n - CVE-2018-18357: Insufficient policy enforcement in URL\n Formatter\n\n - CVE-2018-18358: Insufficient policy enforcement in Proxy\n\n - CVE-2018-18359: Out of bounds read in V8\n\n - Inappropriate implementation in PDFium\n\n - Use after free in Extensions\n\n - Inappropriate implementation in Navigation\n\n - Insufficient policy enforcement in Navigation\n\n - Insufficient policy enforcement in URL Formatter\n\n - Various fixes from internal audits, fuzzing and other\n initiatives\n\n - CVE-2018-17481: Use after free in PDFium (boo#1119364)\n\nThe following changes are included :\n\n - advertisements posing as error messages are now blocked\n\n - Automatic playing of content at page load mostly\n disabled\n\n - New JavaScript API for relative time display", "edition": 12, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2018-12-17T00:00:00", "title": "openSUSE Security Update : Chromium (openSUSE-2018-1557)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-18348", "CVE-2018-18354", "CVE-2018-18349", "CVE-2018-18355", "CVE-2018-18358", "CVE-2018-18346", "CVE-2018-18352", "CVE-2018-18347", "CVE-2018-18340", "CVE-2018-18339", "CVE-2018-18357", "CVE-2018-18337", "CVE-2018-17481", "CVE-2018-18351", "CVE-2018-18336", "CVE-2018-18343", "CVE-2018-18342", "CVE-2018-18344", "CVE-2018-18359", "CVE-2018-18335", "CVE-2018-17480", "CVE-2018-18338", "CVE-2018-18345", "CVE-2018-18353", "CVE-2018-18341", "CVE-2018-18356", "CVE-2018-18350"], "modified": "2018-12-17T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:chromedriver-debuginfo", "p-cpe:/a:novell:opensuse:chromium", "p-cpe:/a:novell:opensuse:chromium-debugsource", "p-cpe:/a:novell:opensuse:chromedriver", "cpe:/o:novell:opensuse:42.3", "p-cpe:/a:novell:opensuse:chromium-debuginfo"], "id": "OPENSUSE-2018-1557.NASL", "href": "https://www.tenable.com/plugins/nessus/119714", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2018-1557.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(119714);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2018-17480\", \"CVE-2018-17481\", \"CVE-2018-18335\", \"CVE-2018-18336\", \"CVE-2018-18337\", \"CVE-2018-18338\", \"CVE-2018-18339\", \"CVE-2018-18340\", \"CVE-2018-18341\", \"CVE-2018-18342\", \"CVE-2018-18343\", \"CVE-2018-18344\", \"CVE-2018-18345\", \"CVE-2018-18346\", \"CVE-2018-18347\", \"CVE-2018-18348\", \"CVE-2018-18349\", \"CVE-2018-18350\", \"CVE-2018-18351\", \"CVE-2018-18352\", \"CVE-2018-18353\", \"CVE-2018-18354\", \"CVE-2018-18355\", \"CVE-2018-18356\", \"CVE-2018-18357\", \"CVE-2018-18358\", \"CVE-2018-18359\");\n\n script_name(english:\"openSUSE Security Update : Chromium (openSUSE-2018-1557)\");\n script_summary(english:\"Check for the openSUSE-2018-1557 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update to Chromium 71.0.3578.98 fixes the following issues :\n\nSecurity issues fixed (boo#1118529) :\n\n - CVE-2018-17480: Out of bounds write in V8\n\n - CVE-2018-17481: Use after frees in PDFium\n\n - CVE-2018-18335: Heap buffer overflow in Skia\n\n - CVE-2018-18336: Use after free in PDFium\n\n - CVE-2018-18337: Use after free in Blink\n\n - CVE-2018-18338: Heap buffer overflow in Canvas\n\n - CVE-2018-18339: Use after free in WebAudio\n\n - CVE-2018-18340: Use after free in MediaRecorder\n\n - CVE-2018-18341: Heap buffer overflow in Blink\n\n - CVE-2018-18342: Out of bounds write in V8\n\n - CVE-2018-18343: Use after free in Skia\n\n - CVE-2018-18344: Inappropriate implementation in\n Extensions\n\n - Multiple issues in SQLite via WebSQL\n\n - CVE-2018-18345: Inappropriate implementation in Site\n Isolation\n\n - CVE-2018-18346: Incorrect security UI in Blink\n\n - CVE-2018-18347: Inappropriate implementation in\n Navigation\n\n - CVE-2018-18348: Inappropriate implementation in Omnibox\n\n - CVE-2018-18349: Insufficient policy enforcement in Blink\n\n - CVE-2018-18350: Insufficient policy enforcement in Blink\n\n - CVE-2018-18351: Insufficient policy enforcement in\n Navigation\n\n - CVE-2018-18352: Inappropriate implementation in Media\n\n - CVE-2018-18353: Inappropriate implementation in Network\n Authentication\n\n - CVE-2018-18354: Insufficient data validation in Shell\n Integration\n\n - CVE-2018-18355: Insufficient policy enforcement in URL\n Formatter\n\n - CVE-2018-18356: Use after free in Skia\n\n - CVE-2018-18357: Insufficient policy enforcement in URL\n Formatter\n\n - CVE-2018-18358: Insufficient policy enforcement in Proxy\n\n - CVE-2018-18359: Out of bounds read in V8\n\n - Inappropriate implementation in PDFium\n\n - Use after free in Extensions\n\n - Inappropriate implementation in Navigation\n\n - Insufficient policy enforcement in Navigation\n\n - Insufficient policy enforcement in URL Formatter\n\n - Various fixes from internal audits, fuzzing and other\n initiatives\n\n - CVE-2018-17481: Use after free in PDFium (boo#1119364)\n\nThe following changes are included :\n\n - advertisements posing as error messages are now blocked\n\n - Automatic playing of content at page load mostly\n disabled\n\n - New JavaScript API for relative time display\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1118529\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1119364\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected Chromium packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.3\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/12/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/12/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/12/17\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE42\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"42.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE42.3\", reference:\"chromedriver-71.0.3578.98-189.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"chromedriver-debuginfo-71.0.3578.98-189.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"chromium-71.0.3578.98-189.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"chromium-debuginfo-71.0.3578.98-189.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"chromium-debugsource-71.0.3578.98-189.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromedriver / chromedriver-debuginfo / chromium / etc\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-20T12:35:36", "description": "This update to Chromium version 71.0.3578.80 fixes security issues and\nbugs.\n\nSecurity issues fixed (boo#1118529) :\n\n - CVE-2018-17480: Out of bounds write in V8\n\n - CVE-2018-17481: Use after frees in PDFium\n\n - CVE-2018-18335: Heap buffer overflow in Skia\n\n - CVE-2018-18336: Use after free in PDFium\n\n - CVE-2018-18337: Use after free in Blink\n\n - CVE-2018-18338: Heap buffer overflow in Canvas\n\n - CVE-2018-18339: Use after free in WebAudio\n\n - CVE-2018-18340: Use after free in MediaRecorder\n\n - CVE-2018-18341: Heap buffer overflow in Blink\n\n - CVE-2018-18342: Out of bounds write in V8\n\n - CVE-2018-18343: Use after free in Skia\n\n - CVE-2018-18344: Inappropriate implementation in\n Extensions\n\n - Multiple issues in SQLite via WebSQL\n\n - CVE-2018-18345: Inappropriate implementation in Site\n Isolation\n\n - CVE-2018-18346: Incorrect security UI in Blink\n\n - CVE-2018-18347: Inappropriate implementation in\n Navigation\n\n - CVE-2018-18348: Inappropriate implementation in Omnibox\n\n - CVE-2018-18349: Insufficient policy enforcement in Blink\n\n - CVE-2018-18350: Insufficient policy enforcement in Blink\n\n - CVE-2018-18351: Insufficient policy enforcement in\n Navigation\n\n - CVE-2018-18352: Inappropriate implementation in Media\n\n - CVE-2018-18353: Inappropriate implementation in Network\n Authentication\n\n - CVE-2018-18354: Insufficient data validation in Shell\n Integration\n\n - CVE-2018-18355: Insufficient policy enforcement in URL\n Formatter\n\n - CVE-2018-18356: Use after free in Skia\n\n - CVE-2018-18357: Insufficient policy enforcement in URL\n Formatter\n\n - CVE-2018-18358: Insufficient policy enforcement in Proxy\n\n - CVE-2018-18359: Out of bounds read in V8\n\n - Inappropriate implementation in PDFium\n\n - Use after free in Extensions\n\n - Inappropriate implementation in Navigation\n\n - Insufficient policy enforcement in Navigation\n\n - Insufficient policy enforcement in URL Formatter\n\n - Various fixes from internal audits, fuzzing and other\n initiatives\n\nThe following changes are included :\n\n - advertisements posing as error messages are now blocked\n\n - Automatic playing of content at page load mostly\n disabled\n\n - New JavaScript API for relative time display", "edition": 16, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2018-12-10T00:00:00", "title": "openSUSE Security Update : Chromium (openSUSE-2018-1521)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-18348", "CVE-2018-18354", "CVE-2018-18349", "CVE-2018-18355", "CVE-2018-18358", "CVE-2018-18346", "CVE-2018-18352", "CVE-2018-18347", "CVE-2018-18340", "CVE-2018-18339", "CVE-2018-18357", "CVE-2018-18337", "CVE-2018-17481", "CVE-2018-18351", "CVE-2018-18336", "CVE-2018-18343", "CVE-2018-18342", "CVE-2018-18344", "CVE-2018-18359", "CVE-2018-18335", "CVE-2018-17480", "CVE-2018-18338", "CVE-2018-18345", "CVE-2018-18353", "CVE-2018-18341", "CVE-2018-18356", "CVE-2018-18350"], "modified": "2018-12-10T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:chromedriver-debuginfo", "cpe:/o:novell:opensuse:15.0", "p-cpe:/a:novell:opensuse:chromium", "p-cpe:/a:novell:opensuse:chromium-debugsource", "p-cpe:/a:novell:opensuse:chromedriver", "p-cpe:/a:novell:opensuse:chromium-debuginfo"], "id": "OPENSUSE-2018-1521.NASL", "href": "https://www.tenable.com/plugins/nessus/119549", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2018-1521.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(119549);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2018-17480\", \"CVE-2018-17481\", \"CVE-2018-18335\", \"CVE-2018-18336\", \"CVE-2018-18337\", \"CVE-2018-18338\", \"CVE-2018-18339\", \"CVE-2018-18340\", \"CVE-2018-18341\", \"CVE-2018-18342\", \"CVE-2018-18343\", \"CVE-2018-18344\", \"CVE-2018-18345\", \"CVE-2018-18346\", \"CVE-2018-18347\", \"CVE-2018-18348\", \"CVE-2018-18349\", \"CVE-2018-18350\", \"CVE-2018-18351\", \"CVE-2018-18352\", \"CVE-2018-18353\", \"CVE-2018-18354\", \"CVE-2018-18355\", \"CVE-2018-18356\", \"CVE-2018-18357\", \"CVE-2018-18358\", \"CVE-2018-18359\");\n\n script_name(english:\"openSUSE Security Update : Chromium (openSUSE-2018-1521)\");\n script_summary(english:\"Check for the openSUSE-2018-1521 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update to Chromium version 71.0.3578.80 fixes security issues and\nbugs.\n\nSecurity issues fixed (boo#1118529) :\n\n - CVE-2018-17480: Out of bounds write in V8\n\n - CVE-2018-17481: Use after frees in PDFium\n\n - CVE-2018-18335: Heap buffer overflow in Skia\n\n - CVE-2018-18336: Use after free in PDFium\n\n - CVE-2018-18337: Use after free in Blink\n\n - CVE-2018-18338: Heap buffer overflow in Canvas\n\n - CVE-2018-18339: Use after free in WebAudio\n\n - CVE-2018-18340: Use after free in MediaRecorder\n\n - CVE-2018-18341: Heap buffer overflow in Blink\n\n - CVE-2018-18342: Out of bounds write in V8\n\n - CVE-2018-18343: Use after free in Skia\n\n - CVE-2018-18344: Inappropriate implementation in\n Extensions\n\n - Multiple issues in SQLite via WebSQL\n\n - CVE-2018-18345: Inappropriate implementation in Site\n Isolation\n\n - CVE-2018-18346: Incorrect security UI in Blink\n\n - CVE-2018-18347: Inappropriate implementation in\n Navigation\n\n - CVE-2018-18348: Inappropriate implementation in Omnibox\n\n - CVE-2018-18349: Insufficient policy enforcement in Blink\n\n - CVE-2018-18350: Insufficient policy enforcement in Blink\n\n - CVE-2018-18351: Insufficient policy enforcement in\n Navigation\n\n - CVE-2018-18352: Inappropriate implementation in Media\n\n - CVE-2018-18353: Inappropriate implementation in Network\n Authentication\n\n - CVE-2018-18354: Insufficient data validation in Shell\n Integration\n\n - CVE-2018-18355: Insufficient policy enforcement in URL\n Formatter\n\n - CVE-2018-18356: Use after free in Skia\n\n - CVE-2018-18357: Insufficient policy enforcement in URL\n Formatter\n\n - CVE-2018-18358: Insufficient policy enforcement in Proxy\n\n - CVE-2018-18359: Out of bounds read in V8\n\n - Inappropriate implementation in PDFium\n\n - Use after free in Extensions\n\n - Inappropriate implementation in Navigation\n\n - Insufficient policy enforcement in Navigation\n\n - Insufficient policy enforcement in URL Formatter\n\n - Various fixes from internal audits, fuzzing and other\n initiatives\n\nThe following changes are included :\n\n - advertisements posing as error messages are now blocked\n\n - Automatic playing of content at page load mostly\n disabled\n\n - New JavaScript API for relative time display\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1118529\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected Chromium packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/12/10\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.0)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.0\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.0\", reference:\"chromedriver-71.0.3578.80-lp150.2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"chromedriver-debuginfo-71.0.3578.80-lp150.2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"chromium-71.0.3578.80-lp150.2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"chromium-debuginfo-71.0.3578.80-lp150.2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"chromium-debugsource-71.0.3578.80-lp150.2.30.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromedriver / chromedriver-debuginfo / chromium / etc\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-03-17T23:57:14", "description": "Update to Chromium 71. Fixes CVE-2018-17480 CVE-2018-17481\nCVE-2018-18335 CVE-2018-18336 CVE-2018-18337 CVE-2018-18338\nCVE-2018-18339 CVE-2018-18340 CVE-2018-18341 CVE-2018-18342\nCVE-2018-18343 CVE-2018-18344 CVE-2018-18345 CVE-2018-18346\nCVE-2018-18347 CVE-2018-18348 CVE-2018-18349 CVE-2018-18350\nCVE-2018-18351 CVE-2018-18352 CVE-2018-18353 CVE-2018-18354\nCVE-2018-18355 CVE-2018-18356 CVE-2018-18357 CVE-2018-18358\nCVE-2018-18359\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 9, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-01-07T00:00:00", "title": "Fedora 29 : chromium (2019-859384e002)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-18348", "CVE-2018-18354", "CVE-2018-18349", "CVE-2018-18355", "CVE-2018-18358", "CVE-2018-18346", "CVE-2018-18352", "CVE-2018-18347", "CVE-2018-18340", "CVE-2018-18339", "CVE-2018-18357", "CVE-2018-18337", "CVE-2018-17481", "CVE-2018-18351", "CVE-2018-18336", "CVE-2018-18343", "CVE-2018-18342", "CVE-2018-18344", "CVE-2018-18359", "CVE-2018-18335", "CVE-2018-17480", "CVE-2018-18338", "CVE-2018-18345", "CVE-2018-18353", "CVE-2018-18341", "CVE-2018-18356", "CVE-2018-18350"], "modified": "2019-01-07T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:29", "p-cpe:/a:fedoraproject:fedora:chromium"], "id": "FEDORA_2019-859384E002.NASL", "href": "https://www.tenable.com/plugins/nessus/120966", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2019-859384e002.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(120966);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/02/26\");\n\n script_cve_id(\"CVE-2018-17480\", \"CVE-2018-17481\", \"CVE-2018-18335\", \"CVE-2018-18336\", \"CVE-2018-18337\", \"CVE-2018-18338\", \"CVE-2018-18339\", \"CVE-2018-18340\", \"CVE-2018-18341\", \"CVE-2018-18342\", \"CVE-2018-18343\", \"CVE-2018-18344\", \"CVE-2018-18345\", \"CVE-2018-18346\", \"CVE-2018-18347\", \"CVE-2018-18348\", \"CVE-2018-18349\", \"CVE-2018-18350\", \"CVE-2018-18351\", \"CVE-2018-18352\", \"CVE-2018-18353\", \"CVE-2018-18354\", \"CVE-2018-18355\", \"CVE-2018-18356\", \"CVE-2018-18357\", \"CVE-2018-18358\", \"CVE-2018-18359\");\n script_xref(name:\"FEDORA\", value:\"2019-859384e002\");\n\n script_name(english:\"Fedora 29 : chromium (2019-859384e002)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Update to Chromium 71. Fixes CVE-2018-17480 CVE-2018-17481\nCVE-2018-18335 CVE-2018-18336 CVE-2018-18337 CVE-2018-18338\nCVE-2018-18339 CVE-2018-18340 CVE-2018-18341 CVE-2018-18342\nCVE-2018-18343 CVE-2018-18344 CVE-2018-18345 CVE-2018-18346\nCVE-2018-18347 CVE-2018-18348 CVE-2018-18349 CVE-2018-18350\nCVE-2018-18351 CVE-2018-18352 CVE-2018-18353 CVE-2018-18354\nCVE-2018-18355 CVE-2018-18356 CVE-2018-18357 CVE-2018-18358\nCVE-2018-18359\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2019-859384e002\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected chromium package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:29\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/12/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/01/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/01/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^29([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 29\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC29\", reference:\"chromium-71.0.3578.98-1.fc29\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromium\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-03-18T00:09:07", "description": "Google Chrome Releases reports :\n\n43 security fixes in this release, including :\n\n- High CVE-2018-17480: Out of bounds write in V8\n\n- High CVE-2018-17481: Use after free in PDFium\n\n- High CVE-2018-18335: Heap buffer overflow in Skia\n\n- High CVE-2018-18336: Use after free in PDFium\n\n- High CVE-2018-18337: Use after free in Blink\n\n- High CVE-2018-18338: Heap buffer overflow in Canvas\n\n- High CVE-2018-18339: Use after free in WebAudio\n\n- High CVE-2018-18340: Use after free in MediaRecorder\n\n- High CVE-2018-18341: Heap buffer overflow in Blink\n\n- High CVE-2018-18342: Out of bounds write in V8\n\n- High CVE-2018-18343: Use after free in Skia\n\n- High CVE-2018-18344: Inappropriate implementation in Extensions\n\n- High To be allocated: Multiple issues in SQLite via WebSQL\n\n- Medium CVE-2018-18345: Inappropriate implementation in Site\nIsolation\n\n- Medium CVE-2018-18346: Incorrect security UI in Blink\n\n- Medium CVE-2018-18347: Inappropriate implementation in Navigation\n\n- Medium CVE-2018-18348: Inappropriate implementation in Omnibox\n\n- Medium CVE-2018-18349: Insufficient policy enforcement in Blink\n\n- Medium CVE-2018-18350: Insufficient policy enforcement in Blink\n\n- Medium CVE-2018-18351: Insufficient policy enforcement in Navigation\n\n- Medium CVE-2018-18352: Inappropriate implementation in Media\n\n- Medium CVE-2018-18353: Inappropriate implementation in Network\nAuthentication\n\n- Medium CVE-2018-18354: Insufficient data validation in Shell\nIntegration\n\n- Medium CVE-2018-18355: Insufficient policy enforcement in URL\nFormatter\n\n- Medium CVE-2018-18356: Use after free in Skia\n\n- Medium CVE-2018-18357: Insufficient policy enforcement in URL\nFormatter\n\n- Medium CVE-2018-18358: Insufficient policy enforcement in Proxy\n\n- Medium CVE-2018-18359: Out of bounds read in V8\n\n- Low To be allocated: Inappropriate implementation in PDFium\n\n- Low To be allocated: Use after free in Extensions\n\n- Low To be allocated: Inappropriate implementation in Navigation\n\n- Low To be allocated: Inappropriate implementation in Navigation\n\n- Low To be allocated: Insufficient policy enforcement in Navigation\n\n- Low To be allocated: Insufficient policy enforcement in URL\nFormatter\n\n- Medium To be allocated: Insufficient policy enforcement in Payments\n\n- Various fixes from internal audits, fuzzing and other initiatives", "edition": 9, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-01-07T00:00:00", "title": "FreeBSD : chromium -- multiple vulnerabilities (546d4dd4-10ea-11e9-b407-080027ef1a23)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-18348", "CVE-2018-18354", "CVE-2018-18349", "CVE-2018-18355", "CVE-2018-18358", "CVE-2018-18346", "CVE-2018-18352", "CVE-2018-18347", "CVE-2018-18340", "CVE-2018-18339", "CVE-2018-18357", "CVE-2018-18337", "CVE-2018-17481", "CVE-2018-18351", "CVE-2018-18336", "CVE-2018-18343", "CVE-2018-18342", "CVE-2018-18344", "CVE-2018-18359", "CVE-2018-18335", "CVE-2018-17480", "CVE-2018-18338", "CVE-2018-18345", "CVE-2018-18353", "CVE-2018-18341", "CVE-2018-18356", "CVE-2018-18350"], "modified": "2019-01-07T00:00:00", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:chromium"], "id": "FREEBSD_PKG_546D4DD410EA11E9B407080027EF1A23.NASL", "href": "https://www.tenable.com/plugins/nessus/120969", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2020 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(120969);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/02/26\");\n\n script_cve_id(\"CVE-2018-17480\", \"CVE-2018-17481\", \"CVE-2018-18335\", \"CVE-2018-18336\", \"CVE-2018-18337\", \"CVE-2018-18338\", \"CVE-2018-18339\", \"CVE-2018-18340\", \"CVE-2018-18341\", \"CVE-2018-18342\", \"CVE-2018-18343\", \"CVE-2018-18344\", \"CVE-2018-18345\", \"CVE-2018-18346\", \"CVE-2018-18347\", \"CVE-2018-18348\", \"CVE-2018-18349\", \"CVE-2018-18350\", \"CVE-2018-18351\", \"CVE-2018-18352\", \"CVE-2018-18353\", \"CVE-2018-18354\", \"CVE-2018-18355\", \"CVE-2018-18356\", \"CVE-2018-18357\", \"CVE-2018-18358\", \"CVE-2018-18359\");\n\n script_name(english:\"FreeBSD : chromium -- multiple vulnerabilities (546d4dd4-10ea-11e9-b407-080027ef1a23)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Google Chrome Releases reports :\n\n43 security fixes in this release, including :\n\n- High CVE-2018-17480: Out of bounds write in V8\n\n- High CVE-2018-17481: Use after free in PDFium\n\n- High CVE-2018-18335: Heap buffer overflow in Skia\n\n- High CVE-2018-18336: Use after free in PDFium\n\n- High CVE-2018-18337: Use after free in Blink\n\n- High CVE-2018-18338: Heap buffer overflow in Canvas\n\n- High CVE-2018-18339: Use after free in WebAudio\n\n- High CVE-2018-18340: Use after free in MediaRecorder\n\n- High CVE-2018-18341: Heap buffer overflow in Blink\n\n- High CVE-2018-18342: Out of bounds write in V8\n\n- High CVE-2018-18343: Use after free in Skia\n\n- High CVE-2018-18344: Inappropriate implementation in Extensions\n\n- High To be allocated: Multiple issues in SQLite via WebSQL\n\n- Medium CVE-2018-18345: Inappropriate implementation in Site\nIsolation\n\n- Medium CVE-2018-18346: Incorrect security UI in Blink\n\n- Medium CVE-2018-18347: Inappropriate implementation in Navigation\n\n- Medium CVE-2018-18348: Inappropriate implementation in Omnibox\n\n- Medium CVE-2018-18349: Insufficient policy enforcement in Blink\n\n- Medium CVE-2018-18350: Insufficient policy enforcement in Blink\n\n- Medium CVE-2018-18351: Insufficient policy enforcement in Navigation\n\n- Medium CVE-2018-18352: Inappropriate implementation in Media\n\n- Medium CVE-2018-18353: Inappropriate implementation in Network\nAuthentication\n\n- Medium CVE-2018-18354: Insufficient data validation in Shell\nIntegration\n\n- Medium CVE-2018-18355: Insufficient policy enforcement in URL\nFormatter\n\n- Medium CVE-2018-18356: Use after free in Skia\n\n- Medium CVE-2018-18357: Insufficient policy enforcement in URL\nFormatter\n\n- Medium CVE-2018-18358: Insufficient policy enforcement in Proxy\n\n- Medium CVE-2018-18359: Out of bounds read in V8\n\n- Low To be allocated: Inappropriate implementation in PDFium\n\n- Low To be allocated: Use after free in Extensions\n\n- Low To be allocated: Inappropriate implementation in Navigation\n\n- Low To be allocated: Inappropriate implementation in Navigation\n\n- Low To be allocated: Insufficient policy enforcement in Navigation\n\n- Low To be allocated: Insufficient policy enforcement in URL\nFormatter\n\n- Medium To be allocated: Insufficient policy enforcement in Payments\n\n- Various fixes from internal audits, fuzzing and other initiatives\"\n );\n # https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?084b0392\"\n );\n # https://vuxml.freebsd.org/freebsd/546d4dd4-10ea-11e9-b407-080027ef1a23.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?cdc6abb9\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/12/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/01/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/01/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"chromium<71.0.3578.80\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-03-01T03:51:13", "description": "The version of Google Chrome installed on the remote macOS host is\nprior to 71.0.3578.80. It is, therefore, affected by multiple\nvulnerabilities as noted in Google Chrome stable channel update\nrelease notes for 2018/12/04. Please refer to the release notes for\nadditional information. Note that Nessus has not attempted to exploit\nthese issues but has instead relied only on the application's self-\nreported version number.", "edition": 26, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2018-12-10T00:00:00", "title": "Google Chrome < 71.0.3578.80 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-18348", "CVE-2018-18354", "CVE-2018-18349", "CVE-2018-18355", "CVE-2018-18358", "CVE-2018-18346", "CVE-2018-18352", "CVE-2018-18347", "CVE-2018-18340", "CVE-2018-18339", "CVE-2018-18357", "CVE-2018-18337", "CVE-2018-17481", "CVE-2018-18351", "CVE-2018-18336", "CVE-2018-18343", "CVE-2018-18342", "CVE-2018-18344", "CVE-2018-18359", "CVE-2018-18335", "CVE-2018-17480", "CVE-2018-18338", "CVE-2018-18345", "CVE-2018-18353", "CVE-2018-18341", "CVE-2018-18356", "CVE-2018-18350"], "modified": "2021-03-02T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "MACOSX_GOOGLE_CHROME_71_0_3578_80.NASL", "href": "https://www.tenable.com/plugins/nessus/119557", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(119557);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/11/01\");\n\n script_cve_id(\n \"CVE-2018-17480\",\n \"CVE-2018-17481\",\n \"CVE-2018-18335\",\n \"CVE-2018-18336\",\n \"CVE-2018-18337\",\n \"CVE-2018-18338\",\n \"CVE-2018-18339\",\n \"CVE-2018-18340\",\n \"CVE-2018-18341\",\n \"CVE-2018-18342\",\n \"CVE-2018-18343\",\n \"CVE-2018-18344\",\n \"CVE-2018-18345\",\n \"CVE-2018-18346\",\n \"CVE-2018-18347\",\n \"CVE-2018-18348\",\n \"CVE-2018-18349\",\n \"CVE-2018-18350\",\n \"CVE-2018-18351\",\n \"CVE-2018-18352\",\n \"CVE-2018-18353\",\n \"CVE-2018-18354\",\n \"CVE-2018-18355\",\n \"CVE-2018-18356\",\n \"CVE-2018-18357\",\n \"CVE-2018-18358\",\n \"CVE-2018-18359\"\n );\n\n script_name(english:\"Google Chrome < 71.0.3578.80 Multiple Vulnerabilities\");\n script_summary(english:\"Checks the version of Google Chrome.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A web browser installed on the remote macOS host is affected by\nmultiple vulnerabilities\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote macOS host is\nprior to 71.0.3578.80. It is, therefore, affected by multiple\nvulnerabilities as noted in Google Chrome stable channel update\nrelease notes for 2018/12/04. Please refer to the release notes for\nadditional information. Note that Nessus has not attempted to exploit\nthese issues but has instead relied only on the application's self-\nreported version number.\");\n # https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?084b0392\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome version 71.0.3578.80 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-18359\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/12/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/12/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/12/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_google_chrome_installed.nbin\");\n script_require_keys(\"MacOSX/Google Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"MacOSX/Google Chrome/Installed\");\n\ngoogle_chrome_check_version(fix:'71.0.3578.80', severity:SECURITY_WARNING, xss:FALSE, xsrf:FALSE);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-20T12:54:39", "description": "This update to Chromium version 71.0.3578.80 fixes security issues and\nbugs.\n\nSecurity issues fixed (boo#1118529) :\n\n - CVE-2018-17480: Out of bounds write in V8\n\n - CVE-2018-17481: Use after frees in PDFium\n\n - CVE-2018-18335: Heap buffer overflow in Skia\n\n - CVE-2018-18336: Use after free in PDFium\n\n - CVE-2018-18337: Use after free in Blink\n\n - CVE-2018-18338: Heap buffer overflow in Canvas\n\n - CVE-2018-18339: Use after free in WebAudio\n\n - CVE-2018-18340: Use after free in MediaRecorder\n\n - CVE-2018-18341: Heap buffer overflow in Blink\n\n - CVE-2018-18342: Out of bounds write in V8\n\n - CVE-2018-18343: Use after free in Skia\n\n - CVE-2018-18344: Inappropriate implementation in\n Extensions\n\n - Multiple issues in SQLite via WebSQL\n\n - CVE-2018-18345: Inappropriate implementation in Site\n Isolation\n\n - CVE-2018-18346: Incorrect security UI in Blink\n\n - CVE-2018-18347: Inappropriate implementation in\n Navigation\n\n - CVE-2018-18348: Inappropriate implementation in Omnibox\n\n - CVE-2018-18349: Insufficient policy enforcement in Blink\n\n - CVE-2018-18350: Insufficient policy enforcement in Blink\n\n - CVE-2018-18351: Insufficient policy enforcement in\n Navigation\n\n - CVE-2018-18352: Inappropriate implementation in Media\n\n - CVE-2018-18353: Inappropriate implementation in Network\n Authentication\n\n - CVE-2018-18354: Insufficient data validation in Shell\n Integration\n\n - CVE-2018-18355: Insufficient policy enforcement in URL\n Formatter\n\n - CVE-2018-18356: Use after free in Skia\n\n - CVE-2018-18357: Insufficient policy enforcement in URL\n Formatter\n\n - CVE-2018-18358: Insufficient policy enforcement in Proxy\n\n - CVE-2018-18359: Out of bounds read in V8\n\n - Inappropriate implementation in PDFium\n\n - Use after free in Extensions\n\n - Inappropriate implementation in Navigation\n\n - Insufficient policy enforcement in Navigation\n\n - Insufficient policy enforcement in URL Formatter\n\n - Various fixes from internal audits, fuzzing and other\n initiatives\n\nThe following changes are included :\n\n - advertisements posing as error messages are now blocked\n\n - Automatic playing of content at page load mostly\n disabled\n\n - New JavaScript API for relative time display", "edition": 12, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-03-27T00:00:00", "title": "openSUSE Security Update : Chromium (openSUSE-2019-977)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-18348", "CVE-2018-18354", "CVE-2018-18349", "CVE-2018-18355", "CVE-2018-18358", "CVE-2018-18346", "CVE-2018-18352", "CVE-2018-18347", "CVE-2018-18340", "CVE-2018-18339", "CVE-2018-18357", "CVE-2018-18337", "CVE-2018-17481", "CVE-2018-18351", "CVE-2018-18336", "CVE-2018-18343", "CVE-2018-18342", "CVE-2018-18344", "CVE-2018-18359", "CVE-2018-18335", "CVE-2018-17480", "CVE-2018-18338", "CVE-2018-18345", "CVE-2018-18353", "CVE-2018-18341", "CVE-2018-18356", "CVE-2018-18350"], "modified": "2019-03-27T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:chromedriver-debuginfo", "cpe:/o:novell:opensuse:15.0", "p-cpe:/a:novell:opensuse:chromium", "p-cpe:/a:novell:opensuse:chromium-debugsource", "p-cpe:/a:novell:opensuse:chromedriver", "p-cpe:/a:novell:opensuse:chromium-debuginfo"], "id": "OPENSUSE-2019-977.NASL", "href": "https://www.tenable.com/plugins/nessus/123398", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2019-977.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(123398);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2018-17480\", \"CVE-2018-17481\", \"CVE-2018-18335\", \"CVE-2018-18336\", \"CVE-2018-18337\", \"CVE-2018-18338\", \"CVE-2018-18339\", \"CVE-2018-18340\", \"CVE-2018-18341\", \"CVE-2018-18342\", \"CVE-2018-18343\", \"CVE-2018-18344\", \"CVE-2018-18345\", \"CVE-2018-18346\", \"CVE-2018-18347\", \"CVE-2018-18348\", \"CVE-2018-18349\", \"CVE-2018-18350\", \"CVE-2018-18351\", \"CVE-2018-18352\", \"CVE-2018-18353\", \"CVE-2018-18354\", \"CVE-2018-18355\", \"CVE-2018-18356\", \"CVE-2018-18357\", \"CVE-2018-18358\", \"CVE-2018-18359\");\n\n script_name(english:\"openSUSE Security Update : Chromium (openSUSE-2019-977)\");\n script_summary(english:\"Check for the openSUSE-2019-977 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This update to Chromium version 71.0.3578.80 fixes security issues and\nbugs.\n\nSecurity issues fixed (boo#1118529) :\n\n - CVE-2018-17480: Out of bounds write in V8\n\n - CVE-2018-17481: Use after frees in PDFium\n\n - CVE-2018-18335: Heap buffer overflow in Skia\n\n - CVE-2018-18336: Use after free in PDFium\n\n - CVE-2018-18337: Use after free in Blink\n\n - CVE-2018-18338: Heap buffer overflow in Canvas\n\n - CVE-2018-18339: Use after free in WebAudio\n\n - CVE-2018-18340: Use after free in MediaRecorder\n\n - CVE-2018-18341: Heap buffer overflow in Blink\n\n - CVE-2018-18342: Out of bounds write in V8\n\n - CVE-2018-18343: Use after free in Skia\n\n - CVE-2018-18344: Inappropriate implementation in\n Extensions\n\n - Multiple issues in SQLite via WebSQL\n\n - CVE-2018-18345: Inappropriate implementation in Site\n Isolation\n\n - CVE-2018-18346: Incorrect security UI in Blink\n\n - CVE-2018-18347: Inappropriate implementation in\n Navigation\n\n - CVE-2018-18348: Inappropriate implementation in Omnibox\n\n - CVE-2018-18349: Insufficient policy enforcement in Blink\n\n - CVE-2018-18350: Insufficient policy enforcement in Blink\n\n - CVE-2018-18351: Insufficient policy enforcement in\n Navigation\n\n - CVE-2018-18352: Inappropriate implementation in Media\n\n - CVE-2018-18353: Inappropriate implementation in Network\n Authentication\n\n - CVE-2018-18354: Insufficient data validation in Shell\n Integration\n\n - CVE-2018-18355: Insufficient policy enforcement in URL\n Formatter\n\n - CVE-2018-18356: Use after free in Skia\n\n - CVE-2018-18357: Insufficient policy enforcement in URL\n Formatter\n\n - CVE-2018-18358: Insufficient policy enforcement in Proxy\n\n - CVE-2018-18359: Out of bounds read in V8\n\n - Inappropriate implementation in PDFium\n\n - Use after free in Extensions\n\n - Inappropriate implementation in Navigation\n\n - Insufficient policy enforcement in Navigation\n\n - Insufficient policy enforcement in URL Formatter\n\n - Various fixes from internal audits, fuzzing and other\n initiatives\n\nThe following changes are included :\n\n - advertisements posing as error messages are now blocked\n\n - Automatic playing of content at page load mostly\n disabled\n\n - New JavaScript API for relative time display\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1118529\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected Chromium packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/12/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/03/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/03/27\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.0)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.0\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.0\", reference:\"chromedriver-71.0.3578.80-lp150.2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"chromedriver-debuginfo-71.0.3578.80-lp150.2.30.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"chromium-71.0.3578.80-lp150.2.30.1\", allowmaj:TRUE) ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"chromium-debuginfo-71.0.3578.80-lp150.2.30.1\", allowmaj:TRUE) ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"chromium-debugsource-71.0.3578.80-lp150.2.30.1\", allowmaj:TRUE) ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromedriver / chromedriver-debuginfo / chromium / etc\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-05-31T20:20:18", "description": "An update for chromium-browser is now available for Red Hat Enterprise\nLinux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nChromium is an open source web browser, powered by WebKit (Blink).\n\nThis update upgrades Chromium to version 71.0.3578.80.\n\nSecurity Fix(es) :\n\n* chromium-browser: Out of bounds write in V8 (CVE-2018-17480)\n\n* chromium-browser: Use after frees in PDFium (CVE-2018-17481)\n\n* chromium-browser: Heap buffer overflow in Skia (CVE-2018-18335)\n\n* chromium-browser: Use after free in PDFium (CVE-2018-18336)\n\n* chromium-browser: Use after free in Blink (CVE-2018-18337)\n\n* chromium-browser: Heap buffer overflow in Canvas (CVE-2018-18338)\n\n* chromium-browser: Use after free in WebAudio (CVE-2018-18339)\n\n* chromium-browser: Use after free in MediaRecorder (CVE-2018-18340)\n\n* chromium-browser: Heap buffer overflow in Blink (CVE-2018-18341)\n\n* chromium-browser: Out of bounds write in V8 (CVE-2018-18342)\n\n* chromium-browser: Use after free in Skia (CVE-2018-18343)\n\n* chromium-browser: Inappropriate implementation in Extensions\n(CVE-2018-18344)\n\n* chromium-browser: Inappropriate implementation in Site Isolation\n(CVE-2018-18345)\n\n* chromium-browser: Incorrect security UI in Blink (CVE-2018-18346)\n\n* chromium-browser: Inappropriate implementation in Navigation\n(CVE-2018-18347)\n\n* chromium-browser: Inappropriate implementation in Omnibox\n(CVE-2018-18348)\n\n* chromium-browser: Insufficient policy enforcement in Blink\n(CVE-2018-18349)\n\n* chromium-browser: Insufficient policy enforcement in Blink\n(CVE-2018-18350)\n\n* chromium-browser: Insufficient policy enforcement in Navigation\n(CVE-2018-18351)\n\n* chromium-browser: Inappropriate implementation in Media\n(CVE-2018-18352)\n\n* chromium-browser: Inappropriate implementation in Network\nAuthentication (CVE-2018-18353)\n\n* chromium-browser: Insufficient data validation in Shell Integration\n(CVE-2018-18354)\n\n* chromium-browser: Insufficient policy enforcement in URL Formatter\n(CVE-2018-18355)\n\n* chromium-browser: Use after free in Skia (CVE-2018-18356)\n\n* chromium-browser: Insufficient policy enforcement in URL Formatter\n(CVE-2018-18357)\n\n* chromium-browser: Insufficient policy enforcement in Proxy\n(CVE-2018-18358)\n\n* chromium-browser: Out of bounds read in V8 (CVE-2018-18359)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, and other related information, refer to the CVE page(s)\nlisted in the References section.", "edition": 14, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2018-12-11T00:00:00", "title": "RHEL 6 : chromium-browser (RHSA-2018:3803)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-18348", "CVE-2018-18354", "CVE-2018-18349", "CVE-2018-18355", "CVE-2018-18358", "CVE-2018-18346", "CVE-2018-18352", "CVE-2018-18347", "CVE-2018-18340", "CVE-2018-18339", "CVE-2018-18357", "CVE-2018-18337", "CVE-2018-17481", "CVE-2018-18351", "CVE-2018-18336", "CVE-2018-18343", "CVE-2018-18342", "CVE-2018-18344", "CVE-2018-18359", "CVE-2018-18335", "CVE-2018-17480", "CVE-2018-18338", "CVE-2018-18345", "CVE-2018-18353", "CVE-2018-18341", "CVE-2018-18356", "CVE-2018-18350"], "modified": "2018-12-11T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:chromium-browser-debuginfo", "p-cpe:/a:redhat:enterprise_linux:chromium-browser", "cpe:/o:redhat:enterprise_linux:6"], "id": "REDHAT-RHSA-2018-3803.NASL", "href": "https://www.tenable.com/plugins/nessus/119568", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2018:3803. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(119568);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/05/29\");\n\n script_cve_id(\"CVE-2018-17480\", \"CVE-2018-17481\", \"CVE-2018-18335\", \"CVE-2018-18336\", \"CVE-2018-18337\", \"CVE-2018-18338\", \"CVE-2018-18339\", \"CVE-2018-18340\", \"CVE-2018-18341\", \"CVE-2018-18342\", \"CVE-2018-18343\", \"CVE-2018-18344\", \"CVE-2018-18345\", \"CVE-2018-18346\", \"CVE-2018-18347\", \"CVE-2018-18348\", \"CVE-2018-18349\", \"CVE-2018-18350\", \"CVE-2018-18351\", \"CVE-2018-18352\", \"CVE-2018-18353\", \"CVE-2018-18354\", \"CVE-2018-18355\", \"CVE-2018-18356\", \"CVE-2018-18357\", \"CVE-2018-18358\", \"CVE-2018-18359\");\n script_xref(name:\"RHSA\", value:\"2018:3803\");\n\n script_name(english:\"RHEL 6 : chromium-browser (RHSA-2018:3803)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"An update for chromium-browser is now available for Red Hat Enterprise\nLinux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nChromium is an open source web browser, powered by WebKit (Blink).\n\nThis update upgrades Chromium to version 71.0.3578.80.\n\nSecurity Fix(es) :\n\n* chromium-browser: Out of bounds write in V8 (CVE-2018-17480)\n\n* chromium-browser: Use after frees in PDFium (CVE-2018-17481)\n\n* chromium-browser: Heap buffer overflow in Skia (CVE-2018-18335)\n\n* chromium-browser: Use after free in PDFium (CVE-2018-18336)\n\n* chromium-browser: Use after free in Blink (CVE-2018-18337)\n\n* chromium-browser: Heap buffer overflow in Canvas (CVE-2018-18338)\n\n* chromium-browser: Use after free in WebAudio (CVE-2018-18339)\n\n* chromium-browser: Use after free in MediaRecorder (CVE-2018-18340)\n\n* chromium-browser: Heap buffer overflow in Blink (CVE-2018-18341)\n\n* chromium-browser: Out of bounds write in V8 (CVE-2018-18342)\n\n* chromium-browser: Use after free in Skia (CVE-2018-18343)\n\n* chromium-browser: Inappropriate implementation in Extensions\n(CVE-2018-18344)\n\n* chromium-browser: Inappropriate implementation in Site Isolation\n(CVE-2018-18345)\n\n* chromium-browser: Incorrect security UI in Blink (CVE-2018-18346)\n\n* chromium-browser: Inappropriate implementation in Navigation\n(CVE-2018-18347)\n\n* chromium-browser: Inappropriate implementation in Omnibox\n(CVE-2018-18348)\n\n* chromium-browser: Insufficient policy enforcement in Blink\n(CVE-2018-18349)\n\n* chromium-browser: Insufficient policy enforcement in Blink\n(CVE-2018-18350)\n\n* chromium-browser: Insufficient policy enforcement in Navigation\n(CVE-2018-18351)\n\n* chromium-browser: Inappropriate implementation in Media\n(CVE-2018-18352)\n\n* chromium-browser: Inappropriate implementation in Network\nAuthentication (CVE-2018-18353)\n\n* chromium-browser: Insufficient data validation in Shell Integration\n(CVE-2018-18354)\n\n* chromium-browser: Insufficient policy enforcement in URL Formatter\n(CVE-2018-18355)\n\n* chromium-browser: Use after free in Skia (CVE-2018-18356)\n\n* chromium-browser: Insufficient policy enforcement in URL Formatter\n(CVE-2018-18357)\n\n* chromium-browser: Insufficient policy enforcement in Proxy\n(CVE-2018-18358)\n\n* chromium-browser: Out of bounds read in V8 (CVE-2018-18359)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, and other related information, refer to the CVE page(s)\nlisted in the References section.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2018:3803\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-17480\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-17481\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-18335\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-18336\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-18337\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-18338\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-18339\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-18340\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-18341\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-18342\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-18343\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-18344\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-18345\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-18346\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-18347\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-18348\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-18349\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-18350\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-18351\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-18352\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-18353\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-18354\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-18355\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-18356\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-18357\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-18358\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-18359\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"Update the affected chromium-browser and / or\nchromium-browser-debuginfo packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:chromium-browser\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:chromium-browser-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/12/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/12/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/12/11\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2018:3803\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"chromium-browser-71.0.3578.80-1.el6_10\", allowmaj:TRUE)) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"chromium-browser-71.0.3578.80-1.el6_10\", allowmaj:TRUE)) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"chromium-browser-debuginfo-71.0.3578.80-1.el6_10\", allowmaj:TRUE)) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"chromium-browser-debuginfo-71.0.3578.80-1.el6_10\", allowmaj:TRUE)) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromium-browser / chromium-browser-debuginfo\");\n }\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-05-15T17:18:31", "description": "Several vulnerabilities have been discovered in the chromium web\nbrowser.\n\n - CVE-2018-17480\n Guang Gong discovered an out-of-bounds write issue in\n the v8 JavaScript library.\n\n - CVE-2018-17481\n Several use-after-free issues were discovered in the\n pdfium library.\n\n - CVE-2018-18335\n A buffer overflow issue was discovered in the skia\n library.\n\n - CVE-2018-18336\n Huyna discovered a use-after-free issue in the pdfium\n library.\n\n - CVE-2018-18337\n cloudfuzzer discovered a use-after-free issue in\n blink/webkit.\n\n - CVE-2018-18338\n Zhe Jin discovered a buffer overflow issue in the canvas\n renderer.\n\n - CVE-2018-18339\n cloudfuzzer discovered a use-after-free issue in the\n WebAudio implementation.\n\n - CVE-2018-18340\n A use-after-free issue was discovered in the\n MediaRecorder implementation.\n\n - CVE-2018-18341\n cloudfuzzer discovered a buffer overflow issue in\n blink/webkit.\n\n - CVE-2018-18342\n Guang Gong discovered an out-of-bounds write issue in\n the v8 JavaScript library.\n\n - CVE-2018-18343\n Tran Tien Hung discovered a use-after-free issue in the\n skia library.\n\n - CVE-2018-18344\n Jann Horn discovered an error in the Extensions\n implementation.\n\n - CVE-2018-18345\n Masato Kinugawa and Jun Kokatsu discovered an error in\n the Site Isolation feature.\n\n - CVE-2018-18346\n Luan Herrera discovered an error in the user interface.\n\n - CVE-2018-18347\n Luan Herrera discovered an error in the Navigation\n implementation.\n\n - CVE-2018-18348\n Ahmed Elsobky discovered an error in the omnibox\n implementation.\n\n - CVE-2018-18349\n David Erceg discovered a policy enforcement error.\n\n - CVE-2018-18350\n Jun Kokatsu discovered a policy enforcement error.\n\n - CVE-2018-18351\n Jun Kokatsu discovered a policy enforcement error.\n\n - CVE-2018-18352\n Jun Kokatsu discovered an error in Media handling.\n\n - CVE-2018-18353\n Wenxu Wu discovered an error in the network\n authentication implementation.\n\n - CVE-2018-18354\n Wenxu Wu discovered an error related to integration with\n GNOME Shell.\n\n - CVE-2018-18355\n evil1m0 discovered a policy enforcement error.\n\n - CVE-2018-18356\n Tran Tien Hung discovered a use-after-free issue in the\n skia library.\n\n - CVE-2018-18357\n evil1m0 discovered a policy enforcement error.\n\n - CVE-2018-18358\n Jann Horn discovered a policy enforcement error.\n\n - CVE-2018-18359\n cyrilliu discovered an out-of-bounds read issue in the\n v8 JavaScript library.\n\nSeveral additional security relevant issues are also fixed in this\nupdate that have not yet received CVE identifiers.", "edition": 14, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2018-12-10T00:00:00", "title": "Debian DSA-4352-1 : chromium-browser - security update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-18348", "CVE-2018-18354", "CVE-2018-18349", "CVE-2018-18355", "CVE-2018-18358", "CVE-2018-18346", "CVE-2018-18352", "CVE-2018-18347", "CVE-2018-18340", "CVE-2018-18339", "CVE-2018-18357", "CVE-2018-18337", "CVE-2018-17481", "CVE-2018-18351", "CVE-2018-18336", "CVE-2018-18343", "CVE-2018-18342", "CVE-2018-18344", "CVE-2018-18359", "CVE-2018-18335", "CVE-2018-17480", "CVE-2018-18338", "CVE-2018-18345", "CVE-2018-18353", "CVE-2018-18341", "CVE-2018-18356", "CVE-2018-18350"], "modified": "2018-12-10T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:chromium-browser", "cpe:/o:debian:debian_linux:9.0"], "id": "DEBIAN_DSA-4352.NASL", "href": "https://www.tenable.com/plugins/nessus/119509", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-4352. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(119509);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/05/13\");\n\n script_cve_id(\"CVE-2018-17480\", \"CVE-2018-17481\", \"CVE-2018-18335\", \"CVE-2018-18336\", \"CVE-2018-18337\", \"CVE-2018-18338\", \"CVE-2018-18339\", \"CVE-2018-18340\", \"CVE-2018-18341\", \"CVE-2018-18342\", \"CVE-2018-18343\", \"CVE-2018-18344\", \"CVE-2018-18345\", \"CVE-2018-18346\", \"CVE-2018-18347\", \"CVE-2018-18348\", \"CVE-2018-18349\", \"CVE-2018-18350\", \"CVE-2018-18351\", \"CVE-2018-18352\", \"CVE-2018-18353\", \"CVE-2018-18354\", \"CVE-2018-18355\", \"CVE-2018-18356\", \"CVE-2018-18357\", \"CVE-2018-18358\", \"CVE-2018-18359\");\n script_xref(name:\"DSA\", value:\"4352\");\n\n script_name(english:\"Debian DSA-4352-1 : chromium-browser - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities have been discovered in the chromium web\nbrowser.\n\n - CVE-2018-17480\n Guang Gong discovered an out-of-bounds write issue in\n the v8 JavaScript library.\n\n - CVE-2018-17481\n Several use-after-free issues were discovered in the\n pdfium library.\n\n - CVE-2018-18335\n A buffer overflow issue was discovered in the skia\n library.\n\n - CVE-2018-18336\n Huyna discovered a use-after-free issue in the pdfium\n library.\n\n - CVE-2018-18337\n cloudfuzzer discovered a use-after-free issue in\n blink/webkit.\n\n - CVE-2018-18338\n Zhe Jin discovered a buffer overflow issue in the canvas\n renderer.\n\n - CVE-2018-18339\n cloudfuzzer discovered a use-after-free issue in the\n WebAudio implementation.\n\n - CVE-2018-18340\n A use-after-free issue was discovered in the\n MediaRecorder implementation.\n\n - CVE-2018-18341\n cloudfuzzer discovered a buffer overflow issue in\n blink/webkit.\n\n - CVE-2018-18342\n Guang Gong discovered an out-of-bounds write issue in\n the v8 JavaScript library.\n\n - CVE-2018-18343\n Tran Tien Hung discovered a use-after-free issue in the\n skia library.\n\n - CVE-2018-18344\n Jann Horn discovered an error in the Extensions\n implementation.\n\n - CVE-2018-18345\n Masato Kinugawa and Jun Kokatsu discovered an error in\n the Site Isolation feature.\n\n - CVE-2018-18346\n Luan Herrera discovered an error in the user interface.\n\n - CVE-2018-18347\n Luan Herrera discovered an error in the Navigation\n implementation.\n\n - CVE-2018-18348\n Ahmed Elsobky discovered an error in the omnibox\n implementation.\n\n - CVE-2018-18349\n David Erceg discovered a policy enforcement error.\n\n - CVE-2018-18350\n Jun Kokatsu discovered a policy enforcement error.\n\n - CVE-2018-18351\n Jun Kokatsu discovered a policy enforcement error.\n\n - CVE-2018-18352\n Jun Kokatsu discovered an error in Media handling.\n\n - CVE-2018-18353\n Wenxu Wu discovered an error in the network\n authentication implementation.\n\n - CVE-2018-18354\n Wenxu Wu discovered an error related to integration with\n GNOME Shell.\n\n - CVE-2018-18355\n evil1m0 discovered a policy enforcement error.\n\n - CVE-2018-18356\n Tran Tien Hung discovered a use-after-free issue in the\n skia library.\n\n - CVE-2018-18357\n evil1m0 discovered a policy enforcement error.\n\n - CVE-2018-18358\n Jann Horn discovered a policy enforcement error.\n\n - CVE-2018-18359\n cyrilliu discovered an out-of-bounds read issue in the\n v8 JavaScript library.\n\nSeveral additional security relevant issues are also fixed in this\nupdate that have not yet received CVE identifiers.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-17480\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-17481\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-18335\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-18336\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-18337\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-18338\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-18339\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-18340\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-18341\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-18342\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-18343\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-18344\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-18345\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-18346\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-18347\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-18348\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-18349\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-18350\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-18351\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-18352\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-18353\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-18354\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-18355\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-18356\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-18357\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-18358\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-18359\"\n );\n # https://security-tracker.debian.org/tracker/source-package/chromium-browser\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?e33901a2\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/stretch/chromium-browser\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2018/dsa-4352\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the chromium-browser packages.\n\nFor the stable distribution (stretch), these problems have been fixed\nin version 71.0.3578.80-1~deb9u1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:chromium-browser\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:9.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/12/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/12/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/12/10\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"9.0\", prefix:\"chromedriver\", reference:\"71.0.3578.80-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"chromium\", reference:\"71.0.3578.80-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"chromium-driver\", reference:\"71.0.3578.80-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"chromium-l10n\", reference:\"71.0.3578.80-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"chromium-shell\", reference:\"71.0.3578.80-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"chromium-widevine\", reference:\"71.0.3578.80-1~deb9u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-03-17T23:50:11", "description": "Update to Chromium 71. Fixes CVE-2018-17480 CVE-2018-17481\nCVE-2018-18335 CVE-2018-18336 CVE-2018-18337 CVE-2018-18338\nCVE-2018-18339 CVE-2018-18340 CVE-2018-18341 CVE-2018-18342\nCVE-2018-18343 CVE-2018-18344 CVE-2018-18345 CVE-2018-18346\nCVE-2018-18347 CVE-2018-18348 CVE-2018-18349 CVE-2018-18350\nCVE-2018-18351 CVE-2018-18352 CVE-2018-18353 CVE-2018-18354\nCVE-2018-18355 CVE-2018-18356 CVE-2018-18357 CVE-2018-18358\nCVE-2018-18359\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 8, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-01-16T00:00:00", "title": "Fedora 28 : chromium (2019-348547a32d)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-18348", "CVE-2018-18354", "CVE-2018-18349", "CVE-2018-18355", "CVE-2018-18358", "CVE-2018-18346", "CVE-2018-18352", "CVE-2018-18347", "CVE-2018-18340", "CVE-2018-18339", "CVE-2018-18357", "CVE-2018-18337", "CVE-2018-17481", "CVE-2018-18351", "CVE-2018-18336", "CVE-2018-18343", "CVE-2018-18342", "CVE-2018-18344", "CVE-2018-18359", "CVE-2018-18335", "CVE-2018-17480", "CVE-2018-18338", "CVE-2018-18345", "CVE-2018-18353", "CVE-2018-18341", "CVE-2018-18356", "CVE-2018-18350"], "modified": "2019-01-16T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:chromium", "cpe:/o:fedoraproject:fedora:28"], "id": "FEDORA_2019-348547A32D.NASL", "href": "https://www.tenable.com/plugins/nessus/121194", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2019-348547a32d.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(121194);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/02/24\");\n\n script_cve_id(\"CVE-2018-17480\", \"CVE-2018-17481\", \"CVE-2018-18335\", \"CVE-2018-18336\", \"CVE-2018-18337\", \"CVE-2018-18338\", \"CVE-2018-18339\", \"CVE-2018-18340\", \"CVE-2018-18341\", \"CVE-2018-18342\", \"CVE-2018-18343\", \"CVE-2018-18344\", \"CVE-2018-18345\", \"CVE-2018-18346\", \"CVE-2018-18347\", \"CVE-2018-18348\", \"CVE-2018-18349\", \"CVE-2018-18350\", \"CVE-2018-18351\", \"CVE-2018-18352\", \"CVE-2018-18353\", \"CVE-2018-18354\", \"CVE-2018-18355\", \"CVE-2018-18356\", \"CVE-2018-18357\", \"CVE-2018-18358\", \"CVE-2018-18359\");\n script_xref(name:\"FEDORA\", value:\"2019-348547a32d\");\n\n script_name(english:\"Fedora 28 : chromium (2019-348547a32d)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Update to Chromium 71. Fixes CVE-2018-17480 CVE-2018-17481\nCVE-2018-18335 CVE-2018-18336 CVE-2018-18337 CVE-2018-18338\nCVE-2018-18339 CVE-2018-18340 CVE-2018-18341 CVE-2018-18342\nCVE-2018-18343 CVE-2018-18344 CVE-2018-18345 CVE-2018-18346\nCVE-2018-18347 CVE-2018-18348 CVE-2018-18349 CVE-2018-18350\nCVE-2018-18351 CVE-2018-18352 CVE-2018-18353 CVE-2018-18354\nCVE-2018-18355 CVE-2018-18356 CVE-2018-18357 CVE-2018-18358\nCVE-2018-18359\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2019-348547a32d\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected chromium package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:28\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/12/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/01/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/01/16\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^28([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 28\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC28\", reference:\"chromium-71.0.3578.98-1.fc28\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromium\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-03-01T03:13:02", "description": "The remote host is affected by the vulnerability described in GLSA-201908-18\n(Chromium, Google Chrome: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Chromium and Google\n Chrome. Please review the referenced CVE identifiers and Google Chrome\n Releases for details.\n \nImpact :\n\n Please review the referenced CVE identifiers for details.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 19, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-08-20T00:00:00", "title": "GLSA-201908-18 : Chromium, Google Chrome: Multiple vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-5836", "CVE-2018-18348", "CVE-2019-5834", "CVE-2019-5831", "CVE-2019-5816", "CVE-2019-5808", "CVE-2019-5850", "CVE-2019-5805", "CVE-2019-5853", "CVE-2019-5822", "CVE-2019-5833", "CVE-2018-18354", "CVE-2019-5868", "CVE-2018-18349", "CVE-2019-5813", "CVE-2019-5829", "CVE-2019-5857", "CVE-2019-5810", "CVE-2018-18355", "CVE-2019-5819", "CVE-2018-18358", "CVE-2019-5837", "CVE-2019-5812", "CVE-2018-18346", "CVE-2019-5832", "CVE-2019-5861", "CVE-2018-18352", "CVE-2019-5818", "CVE-2019-5809", "CVE-2018-18347", "CVE-2018-18340", "CVE-2019-5820", "CVE-2018-18339", "CVE-2018-18357", "CVE-2018-18337", "CVE-2019-5863", "CVE-2019-5854", "CVE-2019-5847", "CVE-2019-5851", "CVE-2019-5848", "CVE-2019-5807", "CVE-2018-17481", "CVE-2019-5842", "CVE-2018-18351", "CVE-2019-5821", "CVE-2019-5839", "CVE-2019-5835", "CVE-2018-18336", "CVE-2019-5838", "CVE-2019-5852", "CVE-2018-18343", "CVE-2018-18342", "CVE-2019-5815", "CVE-2018-18344", "CVE-2019-5862", "CVE-2018-18359", "CVE-2018-18335", "CVE-2019-5865", "CVE-2019-5840", "CVE-2019-5867", "CVE-2018-17480", "CVE-2019-5811", "CVE-2018-18338", "CVE-2019-5864", "CVE-2018-18345", "CVE-2019-5859", "CVE-2019-5828", "CVE-2019-5860", "CVE-2019-5817", "CVE-2019-5858", "CVE-2019-5806", "CVE-2018-18353", "CVE-2018-18341", "CVE-2019-5830", "CVE-2019-5856", "CVE-2018-18356", "CVE-2019-5814", "CVE-2019-5823", "CVE-2019-5855", "CVE-2018-18350"], "modified": "2021-03-02T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:google-chrome", "p-cpe:/a:gentoo:linux:chromium"], "id": "GENTOO_GLSA-201908-18.NASL", "href": "https://www.tenable.com/plugins/nessus/127967", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201908-18.\n#\n# The advisory text is Copyright (C) 2001-2020 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(127967);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2020/01/02\");\n\n script_cve_id(\"CVE-2018-17480\", \"CVE-2018-17481\", \"CVE-2018-18335\", \"CVE-2018-18336\", \"CVE-2018-18337\", \"CVE-2018-18338\", \"CVE-2018-18339\", \"CVE-2018-18340\", \"CVE-2018-18341\", \"CVE-2018-18342\", \"CVE-2018-18343\", \"CVE-2018-18344\", \"CVE-2018-18345\", \"CVE-2018-18346\", \"CVE-2018-18347\", \"CVE-2018-18348\", \"CVE-2018-18349\", \"CVE-2018-18350\", \"CVE-2018-18351\", \"CVE-2018-18352\", \"CVE-2018-18353\", \"CVE-2018-18354\", \"CVE-2018-18355\", \"CVE-2018-18356\", \"CVE-2018-18357\", \"CVE-2018-18358\", \"CVE-2018-18359\", \"CVE-2019-5805\", \"CVE-2019-5806\", \"CVE-2019-5807\", \"CVE-2019-5808\", \"CVE-2019-5809\", \"CVE-2019-5810\", \"CVE-2019-5811\", \"CVE-2019-5812\", \"CVE-2019-5813\", \"CVE-2019-5814\", \"CVE-2019-5815\", \"CVE-2019-5816\", \"CVE-2019-5817\", \"CVE-2019-5818\", \"CVE-2019-5819\", \"CVE-2019-5820\", \"CVE-2019-5821\", \"CVE-2019-5822\", \"CVE-2019-5823\", \"CVE-2019-5828\", \"CVE-2019-5829\", \"CVE-2019-5830\", \"CVE-2019-5831\", \"CVE-2019-5832\", \"CVE-2019-5833\", \"CVE-2019-5834\", \"CVE-2019-5835\", \"CVE-2019-5836\", \"CVE-2019-5837\", \"CVE-2019-5838\", \"CVE-2019-5839\", \"CVE-2019-5840\", \"CVE-2019-5842\", \"CVE-2019-5847\", \"CVE-2019-5848\", \"CVE-2019-5850\", \"CVE-2019-5851\", \"CVE-2019-5852\", \"CVE-2019-5853\", \"CVE-2019-5854\", \"CVE-2019-5855\", \"CVE-2019-5856\", \"CVE-2019-5857\", \"CVE-2019-5858\", \"CVE-2019-5859\", \"CVE-2019-5860\", \"CVE-2019-5861\", \"CVE-2019-5862\", \"CVE-2019-5863\", \"CVE-2019-5864\", \"CVE-2019-5865\", \"CVE-2019-5867\", \"CVE-2019-5868\");\n script_xref(name:\"GLSA\", value:\"201908-18\");\n\n script_name(english:\"GLSA-201908-18 : Chromium, Google Chrome: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201908-18\n(Chromium, Google Chrome: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Chromium and Google\n Chrome. Please review the referenced CVE identifiers and Google Chrome\n Releases for details.\n \nImpact :\n\n Please review the referenced CVE identifiers for details.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201908-18\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Chromium users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose\n '>=www-client/chromium-76.0.3809.100'\n All Google Chrome users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose\n '>=www-client/google-chrome-76.0.3809.100'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-5859\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:google-chrome\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/12/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/08/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/08/20\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"www-client/chromium\", unaffected:make_list(\"ge 76.0.3809.100\"), vulnerable:make_list(\"lt 76.0.3809.100\"))) flag++;\nif (qpkg_check(package:\"www-client/google-chrome\", unaffected:make_list(\"ge 76.0.3809.100\"), vulnerable:make_list(\"lt 76.0.3809.100\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Chromium / Google Chrome\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "debian": [{"lastseen": "2019-05-30T02:22:14", "bulletinFamily": "unix", "cvelist": ["CVE-2018-18348", "CVE-2018-18354", "CVE-2018-18349", "CVE-2018-18355", "CVE-2018-18358", "CVE-2018-18346", "CVE-2018-18352", "CVE-2018-18347", "CVE-2018-18340", "CVE-2018-18339", "CVE-2018-18357", "CVE-2018-18337", "CVE-2018-17481", "CVE-2018-18351", "CVE-2018-18336", "CVE-2018-18343", "CVE-2018-18342", "CVE-2018-18344", "CVE-2018-18359", "CVE-2018-18335", "CVE-2018-17480", "CVE-2018-18338", "CVE-2018-18345", "CVE-2018-18353", "CVE-2018-18341", "CVE-2018-18356", "CVE-2018-18350"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4352-1 security@debian.org\nhttps://www.debian.org/security/ Michael Gilbert\nDecember 07, 2018 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : chromium-browser\nCVE ID : CVE-2018-17480 CVE-2018-17481 CVE-2018-18335 CVE-2018-18336\n CVE-2018-18337 CVE-2018-18338 CVE-2018-18339 CVE-2018-18340\n CVE-2018-18341 CVE-2018-18342 CVE-2018-18343 CVE-2018-18344\n CVE-2018-18345 CVE-2018-18346 CVE-2018-18347 CVE-2018-18348\n CVE-2018-18349 CVE-2018-18350 CVE-2018-18351 CVE-2018-18352\n CVE-2018-18353 CVE-2018-18354 CVE-2018-18355 CVE-2018-18356\n CVE-2018-18357 CVE-2018-18358 CVE-2018-18359\n\nSeveral vulnerabilities have been discovered in the chromium web browser.\n\nCVE-2018-17480\n\n Guang Gong discovered an out-of-bounds write issue in the v8 javascript\n library.\n\nCVE-2018-17481\n\n Several use-after-free issues were discovered in the pdfium library.\n\nCVE-2018-18335\n\n A buffer overflow issue was discovered in the skia library.\n\nCVE-2018-18336\n\n Huyna discovered a use-after-free issue in the pdfium library.\n\nCVE-2018-18337\n\n cloudfuzzer discovered a use-after-free issue in blink/webkit.\n\nCVE-2018-18338\n\n Zhe Jin discovered a buffer overflow issue in the canvas renderer.\n\nCVE-2018-18339\n\n cloudfuzzer discovered a use-after-free issue in the WebAudio\n implementation.\n\nCVE-2018-18340\n\n A use-after-free issue was discovered in the MediaRecorder implementation.\n\nCVE-2018-18341\n\n cloudfuzzer discovered a buffer overflow issue in blink/webkit.\n\nCVE-2018-18342\n\n Guang Gong discovered an out-of-bounds write issue in the v8 javascript\n library.\n\nCVE-2018-18343\n\n Tran Tien Hung discovered a use-after-free issue in the skia library.\n\nCVE-2018-18344\n\n Jann Horn discovered an error in the Extensions implementation.\n\nCVE-2018-18345\n\n Masato Kinugawa and Jun Kokatsu discovered an error in the Site Isolation\n feature.\n\nCVE-2018-18346\n\n Luan Herrera discovered an error in the user interface.\n\nCVE-2018-18347\n\n Luan Herrera discovered an error in the Navigation implementation.\n\nCVE-2018-18348\n\n Ahmed Elsobky discovered an error in the omnibox implementation.\n\nCVE-2018-18349\n\n David Erceg discovered a policy enforcement error.\n\nCVE-2018-18350\n\n Jun Kokatsu discovered a policy enforcement error.\n\nCVE-2018-18351\n\n Jun Kokatsu discovered a policy enforcement error.\n\nCVE-2018-18352\n\n Jun Kokatsu discovered an error in Media handling.\n\nCVE-2018-18353\n\n Wenxu Wu discovered an error in the network authentication implementation.\n\nCVE-2018-18354\n\n Wenxu Wu discovered an error related to integration with GNOME Shell.\n\nCVE-2018-18355\n\n evil1m0 discovered a policy enforcement error.\n\nCVE-2018-18356\n\n Tran Tien Hung discovered a use-after-free issue in the skia library.\n\nCVE-2018-18357\n\n evil1m0 discovered a policy enforcement error.\n\nCVE-2018-18358\n\n Jann Horn discovered a policy enforcement error.\n\nCVE-2018-18359\n\n cyrilliu discovered an out-of-bounds read issue in the v8 javascript\n library.\n\nSeveral additional security relevant issues are also fixed in this update\nthat have not yet received CVE identifiers.\n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 71.0.3578.80-1~deb9u1.\n\nWe recommend that you upgrade your chromium-browser packages.\n\nFor the detailed security status of chromium-browser please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/chromium-browser\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 4, "modified": "2018-12-08T01:41:52", "published": "2018-12-08T01:41:52", "id": "DEBIAN:DSA-4352-1:4B281", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2018/msg00284.html", "title": "[SECURITY] [DSA 4352-1] chromium-browser security update", "type": "debian", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-11T01:30:06", "bulletinFamily": "unix", "cvelist": ["CVE-2019-5785", "CVE-2018-18356"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4391-1 security@debian.org\nhttps://www.debian.org/security/ Moritz Muehlenhoff\nFebruary 14, 2019 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : firefox-esr\nCVE ID : CVE-2018-18356 CVE-2019-5785\n\nMultiple security issues have been found in the Mozilla Firefox web\nbrowser, which could potentially result in the execution of arbitrary\ncode.\n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 60.5.1esr-1~deb9u1.\n\nWe recommend that you upgrade your firefox-esr packages.\n\nFor the detailed security status of firefox-esr please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/firefox-esr\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 19, "modified": "2019-02-14T21:17:43", "published": "2019-02-14T21:17:43", "id": "DEBIAN:DSA-4391-1:6E63B", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2019/msg00031.html", "title": "[SECURITY] [DSA 4391-1] firefox-esr security update", "type": "debian", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-08-12T00:59:54", "bulletinFamily": "unix", "cvelist": ["CVE-2019-5785", "CVE-2018-18356"], "description": "Package : firefox-esr\nVersion : 60.5.1esr-1~deb8u1\nCVE ID : CVE-2018-18356 CVE-2019-5785\n\nMultiple security issues have been found in the Mozilla Firefox web\nbrowser, which could potentially result in the execution of arbitrary\ncode.\n\nFor Debian 8 "Jessie", these problems have been fixed in version\n60.5.1esr-1~deb8u1.\n\nWe recommend that you upgrade your firefox-esr packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n", "edition": 7, "modified": "2019-02-15T12:15:38", "published": "2019-02-15T12:15:38", "id": "DEBIAN:DLA-1677-1:027F0", "href": "https://lists.debian.org/debian-lts-announce/2019/debian-lts-announce-201902/msg00023.html", "title": "[SECURITY] [DLA 1677-1] firefox-esr security update", "type": "debian", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "fedora": [{"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2018-17480", "CVE-2018-17481", "CVE-2018-18335", "CVE-2018-18336", "CVE-2018-18337", "CVE-2018-18338", "CVE-2018-18339", "CVE-2018-18340", "CVE-2018-18341", "CVE-2018-18342", "CVE-2018-18343", "CVE-2018-18344", "CVE-2018-18345", "CVE-2018-18346", "CVE-2018-18347", "CVE-2018-18348", "CVE-2018-18349", "CVE-2018-18350", "CVE-2018-18351", "CVE-2018-18352", "CVE-2018-18353", "CVE-2018-18354", "CVE-2018-18355", "CVE-2018-18356", "CVE-2018-18357", "CVE-2018-18358", "CVE-2018-18359"], "description": "Chromium is an open-source web browser, powered by WebKit (Blink). ", "modified": "2019-01-05T02:32:22", "published": "2019-01-05T02:32:22", "id": "FEDORA:B9CAE6075F01", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 29 Update: chromium-71.0.3578.98-1.fc29", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2018-17480", "CVE-2018-17481", "CVE-2018-18335", "CVE-2018-18336", "CVE-2018-18337", "CVE-2018-18338", "CVE-2018-18339", "CVE-2018-18340", "CVE-2018-18341", "CVE-2018-18342", "CVE-2018-18343", "CVE-2018-18344", "CVE-2018-18345", "CVE-2018-18346", "CVE-2018-18347", "CVE-2018-18348", "CVE-2018-18349", "CVE-2018-18350", "CVE-2018-18351", "CVE-2018-18352", "CVE-2018-18353", "CVE-2018-18354", "CVE-2018-18355", "CVE-2018-18356", "CVE-2018-18357", "CVE-2018-18358", "CVE-2018-18359"], "description": "Chromium is an open-source web browser, powered by WebKit (Blink). ", "modified": "2019-01-16T01:43:05", "published": "2019-01-16T01:43:05", "id": "FEDORA:321C46062CBF", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 28 Update: chromium-71.0.3578.98-1.fc28", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "cve": [{"lastseen": "2021-02-02T06:52:32", "description": "Incorrect object lifecycle handling in PDFium in Google Chrome prior to 71.0.3578.98 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.", "edition": 18, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-12-11T16:29:00", "title": "CVE-2018-17481", "type": "cve", "cwe": ["CWE-416", "CWE-787"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-17481"], "modified": "2020-08-24T17:37:00", "cpe": ["cpe:/o:redhat:linux_server:6.0", "cpe:/o:redhat:linux_workstation:6.0", "cpe:/o:redhat:linux_desktop:6.0", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2018-17481", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-17481", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:52:33", "description": "Failure to dismiss http auth dialogs on navigation in Network Authentication in Google Chrome on Android prior to 71.0.3578.80 allowed a remote attacker to confuse the user about the origin of an auto dialog via a crafted HTML page.", "edition": 18, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "baseScore": 6.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-12-11T16:29:00", "title": "CVE-2018-18353", "type": "cve", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-18353"], "modified": "2019-10-03T00:03:00", "cpe": ["cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2018-18353", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-18353", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:52:33", "description": "Lack of special casing of localhost in WPAD files in Google Chrome prior to 71.0.3578.80 allowed an attacker on the local network segment to proxy resources on localhost via a crafted WPAD file.", "edition": 17, "cvss3": {"exploitabilityScore": 2.1, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "baseScore": 5.7, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-12-11T16:29:00", "title": "CVE-2018-18358", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 5.5, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 2.9, "vectorString": "AV:A/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-18358"], "modified": "2019-08-17T21:15:00", "cpe": ["cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2018-18358", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-18358", "cvss": {"score": 2.9, "vector": "AV:A/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:52:33", "description": "Insufficient validate of external protocols in Shell Integration in Google Chrome on Windows prior to 71.0.3578.80 allowed a remote attacker to launch external programs via a crafted HTML page.", "edition": 17, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-12-11T16:29:00", "title": "CVE-2018-18354", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-18354"], "modified": "2019-08-17T21:15:00", "cpe": ["cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2018-18354", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-18354", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:52:33", "description": "Incorrect object lifecycle in WebAudio in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "edition": 18, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-12-11T16:29:00", "title": "CVE-2018-18339", "type": "cve", "cwe": ["CWE-416", "CWE-787"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-18339"], "modified": "2020-08-24T17:37:00", "cpe": ["cpe:/o:redhat:linux_server:6.0", "cpe:/o:redhat:linux_workstation:6.0", "cpe:/o:redhat:linux_desktop:6.0", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2018-18339", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-18339", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:52:33", "description": "Incorrect handling of stylesheets leading to a use after free in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "edition": 18, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-12-11T16:29:00", "title": "CVE-2018-18337", "type": "cve", "cwe": ["CWE-416", "CWE-787"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-18337"], "modified": "2020-08-24T17:37:00", "cpe": ["cpe:/o:redhat:linux_server:6.0", "cpe:/o:redhat:linux_workstation:6.0", "cpe:/o:redhat:linux_desktop:6.0", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2018-18337", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-18337", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:52:33", "description": "Incorrect, thread-unsafe use of SkImage in Canvas in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "edition": 18, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-12-11T16:29:00", "title": "CVE-2018-18338", "type": "cve", "cwe": ["CWE-787"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-18338"], "modified": "2020-08-24T17:37:00", "cpe": ["cpe:/o:redhat:linux_server:6.0", "cpe:/o:redhat:linux_workstation:6.0", "cpe:/o:redhat:linux_desktop:6.0", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2018-18338", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-18338", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:52:33", "description": "Incorrect object lifecycle in MediaRecorder in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "edition": 18, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-12-11T16:29:00", "title": "CVE-2018-18340", "type": "cve", "cwe": ["CWE-416", "CWE-787"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-18340"], "modified": "2020-08-24T17:37:00", "cpe": ["cpe:/o:redhat:linux_server:6.0", "cpe:/o:redhat:linux_workstation:6.0", "cpe:/o:redhat:linux_desktop:6.0", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2018-18340", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-18340", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:52:33", "description": "Incorrect handling of Reflect.construct in V8 in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.", "edition": 17, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-12-11T16:29:00", "title": "CVE-2018-18359", "type": "cve", "cwe": ["CWE-125"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-18359"], "modified": "2019-08-17T21:15:00", "cpe": ["cpe:/o:redhat:linux_server:6.0", "cpe:/o:redhat:linux_workstation:6.0", "cpe:/o:redhat:linux_desktop:6.0", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2018-18359", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-18359", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:52:33", "description": "Incorrect handing of paths leading to a use after free in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "edition": 18, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-12-11T16:29:00", "title": "CVE-2018-18343", "type": "cve", "cwe": ["CWE-416", "CWE-787"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-18343"], "modified": "2020-08-24T17:37:00", "cpe": ["cpe:/o:redhat:linux_server:6.0", "cpe:/o:redhat:linux_workstation:6.0", "cpe:/o:redhat:linux_desktop:6.0", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2018-18343", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-18343", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*"]}], "threatpost": [{"lastseen": "2019-11-03T07:11:31", "bulletinFamily": "info", "cvelist": ["CVE-2018-17480", "CVE-2018-17481", "CVE-2018-18336", "CVE-2018-18341"], "description": "Google officially lifted the curtain on Chrome 71 for Windows, Mac and Linux on Tuesday. The latest browser version touts new security features and a slew of fixes.\n\nOverall, Google issued 43 patches with the security update for Chrome 71. The newest version, 71.0.3578.80, included an array of high severity bug fixes as well. The browser version also claims to block out \u201cabusive experiences\u201d with an update to the existing Chrome ad blocker feature.\n\nBug fixes include a patch for an out-of-bounds write flaw (CVE-2018-17480) in Chrome\u2019s V8 open-source JavaScript engine; a use after free vulnerabilities (CVE-2018-17481 and CVE-2018-18336) in Google\u2019s PDF software library (PDFium); and a heap buffer overflow (CVE-2018-18341) in Google\u2019s browser engine Blink used in Chrome.\n\n\u201cThe Chrome team is delighted to announce the promotion of Chrome 71 to the stable channel for Windows, Mac and Linux,\u201d the company said in a Tuesday [post](<https://chromereleases.googleblog.com/search/label/Stable%20updates>). \u201cThis will roll out over the coming days/weeks\u2026 Chrome 71.0.3578.80 contains a number of fixes and improvements.\u201d\n\nIn addition to security fixes, Chrome 71 also provides \u201cfurther protections from harmful ad experiences on the web\u201d with an expanded ad blocker, Google revealed earlier in [November](<https://blog.chromium.org/2018/11/further-protections-from-harmful-ad.html>).\n\nThese \u201charmful experiences\u201d include those \u201cdesigned to intentionally mislead and trick users into taking action on the web,\u201d said Google in November. For instance, a victim could click on a pop-up and be redirected to a potential malicious page.\n\n[](<https://media.threatpost.com/wp-content/uploads/sites/103/2018/12/04172154/Screen-Shot-2018-12-04-at-5.11.01-PM.png>)\n\nImage courtesy of Google\n\nGoogle had in 2017 launched a set of protections blocking pop-ups and new window requests from sites with certain abusive experiences that included redirecting pages. Chrome 71 takes those protections a step further by removing all ads on the small number of sites with \u201cpersistent abusive experiences.\u201d\n\nThe new feature will motivate site owners to check and see if their websites feature any potential malicious pop-ups.\n\n\u201cSite owners can use the Abusive Experiences Report in their Google Search Console to see if their site contains any of these abusive experiences that need to be corrected or removed,\u201d Vivek Sekhar, product manager said in a [post](<https://blog.chromium.org/2018/11/further-protections-from-harmful-ad.html>). \u201cSite owners will have a 30 day window to fix experiences flagged by the Report before Chrome removes ads.\u201d\n\nChrome 71 follows the launch of [Chrome 70](<https://threatpost.com/on-heels-of-criticism-newly-released-google-chrome-70-prioritizes-privacy/138368/>) in October. In addition to 23 security fixes, Chrome 70 also included a new feature that gave users a panel so they could have more control over how browsers behave when they log into their Google accounts.\n", "modified": "2018-12-05T04:34:29", "published": "2018-12-05T04:34:29", "id": "THREATPOST:C27BDB046EB4CC077E8F09F986E83F95", "href": "https://threatpost.com/google-chrome-71-touts-43-fixes-fights-ad-abuse/139623/", "type": "threatpost", "title": "Google Chrome 71 Touts 43 Fixes, Fights Ad Abuse", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "slackware": [{"lastseen": "2020-10-25T16:36:19", "bulletinFamily": "unix", "cvelist": ["CVE-2018-18335", "CVE-2018-18356", "CVE-2019-5785"], "description": "New mozilla-firefox packages are available for Slackware 14.2 and -current to\nfix security issues.\n\n\nHere are the details from the Slackware 14.2 ChangeLog:\n\npatches/packages/mozilla-firefox-60.5.1esr-i686-1_slack14.2.txz: Upgraded.\n This release contains security fixes and improvements.\n For more information, see:\n https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html\n https://www.mozilla.org/en-US/security/advisories/mfsa2019-05/\n https://www.mozilla.org/en-US/security/advisories/mfsa2019-05/#CVE-2018-18356\n https://www.mozilla.org/en-US/security/advisories/mfsa2019-05/#CVE-2019-5785\n https://www.mozilla.org/en-US/security/advisories/mfsa2019-05/#CVE-2018-18335\n (* Security fix *)\n\nWhere to find the new packages:\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you.\n\nUpdated package for Slackware 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/mozilla-firefox-60.5.1esr-i686-1_slack14.2.txz\n\nUpdated package for Slackware x86_64 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/mozilla-firefox-60.5.1esr-x86_64-1_slack14.2.txz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/mozilla-firefox-60.5.1esr-i686-1.txz\n\nUpdated package for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/xap/mozilla-firefox-60.5.1esr-x86_64-1.txz\n\n\nMD5 signatures:\n\nSlackware 14.2 package:\nf07582bbd963c1bfc196272aafbbed10 mozilla-firefox-60.5.1esr-i686-1_slack14.2.txz\n\nSlackware x86_64 14.2 package:\na64a420c3bc481de6cc72476807b8260 mozilla-firefox-60.5.1esr-x86_64-1_slack14.2.txz\n\nSlackware -current package:\n43791c4e45350f24ac0061203bc13964 xap/mozilla-firefox-60.5.1esr-i686-1.txz\n\nSlackware x86_64 -current package:\n72bdc9762692886e2d9033ce6561ca05 xap/mozilla-firefox-60.5.1esr-x86_64-1.txz\n\n\nInstallation instructions:\n\nUpgrade the package as root:\n > upgradepkg mozilla-firefox-60.5.1esr-i686-1_slack14.2.txz", "modified": "2019-02-14T00:00:16", "published": "2019-02-14T00:00:16", "id": "SSA-2019-044-01", "href": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2019&m=slackware-security.380697", "type": "slackware", "title": "[slackware-security] mozilla-firefox", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-10-25T16:36:18", "bulletinFamily": "unix", "cvelist": ["CVE-2018-18335", "CVE-2018-18356", "CVE-2018-18509", "CVE-2019-5785"], "description": "New mozilla-thunderbird packages are available for Slackware 14.2 and -current\nto fix security issues.\n\n\nHere are the details from the Slackware 14.2 ChangeLog:\n\npatches/packages/mozilla-thunderbird-60.5.1-i686-1_slack14.2.txz: Upgraded.\n This release contains security fixes and improvements.\n For more information, see:\n https://www.mozilla.org/en-US/thunderbird/60.5.1/releasenotes/\n https://www.mozilla.org/security/known-vulnerabilities/thunderbird.html\n https://www.mozilla.org/en-US/security/advisories/mfsa2019-06/\n https://www.mozilla.org/en-US/security/advisories/mfsa2019-06/#CVE-2018-18356\n https://www.mozilla.org/en-US/security/advisories/mfsa2019-06/#CVE-2019-5785\n https://www.mozilla.org/en-US/security/advisories/mfsa2019-06/#CVE-2018-18335\n https://www.mozilla.org/en-US/security/advisories/mfsa2019-06/#CVE-2018-18509\n (* Security fix *)\n\nWhere to find the new packages:\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you.\n\nUpdated package for Slackware 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/mozilla-thunderbird-60.5.1-i686-1_slack14.2.txz\n\nUpdated package for Slackware x86_64 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/mozilla-thunderbird-60.5.1-x86_64-1_slack14.2.txz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/mozilla-thunderbird-60.5.1-i686-1.txz\n\nUpdated package for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/xap/mozilla-thunderbird-60.5.1-x86_64-1.txz\n\n\nMD5 signatures:\n\nSlackware 14.2 package:\n3e8873418e8d296bdf92fe714b5cec98 mozilla-thunderbird-60.5.1-i686-1_slack14.2.txz\n\nSlackware x86_64 14.2 package:\nf8cc5973632938ef4909194d28614161 mozilla-thunderbird-60.5.1-x86_64-1_slack14.2.txz\n\nSlackware -current package:\nbe4adb59748d0fa1e6f0b9ee518fd935 xap/mozilla-thunderbird-60.5.1-i686-1.txz\n\nSlackware x86_64 -current package:\n8549bb7d564e205a4ec931dc02a52d9f xap/mozilla-thunderbird-60.5.1-x86_64-1.txz\n\n\nInstallation instructions:\n\nUpgrade the package as root:\n > upgradepkg mozilla-thunderbird-60.5.1-i686-1_slack14.2.txz", "modified": "2019-02-15T00:52:46", "published": "2019-02-15T00:52:46", "id": "SSA-2019-045-01", "href": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2019&m=slackware-security.396014", "type": "slackware", "title": "[slackware-security] mozilla-thunderbird", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:37:58", "bulletinFamily": "unix", "cvelist": ["CVE-2019-5785", "CVE-2018-18356"], "description": "[60.5.1-1.0.1]\n- fix LD_LIBRARY_PATH\n- Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat one\n[60.5.1-1]\n- Update to 60.5.1 ESR\n[60.5.0-3]\n- Added fix for rhbz#1672424 - Firefox crashes on NFS drives.", "edition": 2, "modified": "2019-02-19T00:00:00", "published": "2019-02-19T00:00:00", "id": "ELSA-2019-0373", "href": "http://linux.oracle.com/errata/ELSA-2019-0373.html", "title": "firefox security update", "type": "oraclelinux", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:39:43", "bulletinFamily": "unix", "cvelist": ["CVE-2019-5785", "CVE-2018-18356"], "description": "[60.5.1-1.0.1]\n- Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat file\n[60.5.1-1]\n- Update to 60.5.1 ESR\n[60.5.0-3]\n- Added fix for rhbz#1672424 - Firefox crashes on NFS drives.", "edition": 3, "modified": "2019-02-19T00:00:00", "published": "2019-02-19T00:00:00", "id": "ELSA-2019-0374", "href": "http://linux.oracle.com/errata/ELSA-2019-0374.html", "title": "firefox security update", "type": "oraclelinux", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "centos": [{"lastseen": "2020-12-08T03:36:45", "bulletinFamily": "unix", "cvelist": ["CVE-2019-5785", "CVE-2018-18356"], "description": "**CentOS Errata and Security Advisory** CESA-2019:0373\n\n\nMozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.\n\nThis update upgrades Firefox to version 60.5.1 ESR.\n\nSecurity Fix(es):\n\n* chromium-browser, mozilla: Use after free in Skia (CVE-2018-18356)\n\n* mozilla: Integer overflow in Skia (CVE-2019-5785)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2019-February/035232.html\n\n**Affected packages:**\nfirefox\n\n**Upstream details at:**\n", "edition": 4, "modified": "2019-02-20T16:59:25", "published": "2019-02-20T16:59:25", "id": "CESA-2019:0373", "href": "http://lists.centos.org/pipermail/centos-announce/2019-February/035232.html", "title": "firefox security update", "type": "centos", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-08T03:40:08", "bulletinFamily": "unix", "cvelist": ["CVE-2019-5785", "CVE-2018-18356"], "description": "**CentOS Errata and Security Advisory** CESA-2019:0374\n\n\nMozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.\n\nThis update upgrades Firefox to version 60.5.1 ESR.\n\nSecurity Fix(es):\n\n* chromium-browser, mozilla: Use after free in Skia (CVE-2018-18356)\n\n* mozilla: Integer overflow in Skia (CVE-2019-5785)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2019-February/035233.html\n\n**Affected packages:**\nfirefox\n\n**Upstream details at:**\n", "edition": 4, "modified": "2019-02-20T20:10:45", "published": "2019-02-20T20:10:45", "id": "CESA-2019:0374", "href": "http://lists.centos.org/pipermail/centos-announce/2019-February/035233.html", "title": "firefox security update", "type": "centos", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}]}