ID OPENSUSE-2015-679.NASL Type nessus Reporter This script is Copyright (C) 2015-2021 Tenable Network Security, Inc. Modified 2015-10-26T00:00:00
Description
Chromium was update do the stable release 46.0.2490.71 to fix security
issues.
The following vulnerabilities were fixed :
CVE-2015-6755: Cross-origin bypass in Blink
CVE-2015-6756: Use-after-free in PDFium
CVE-2015-6757: Use-after-free in ServiceWorker
CVE-2015-6758: Bad-cast in PDFium
CVE-2015-6759: Information leakage in LocalStorage
CVE-2015-6760: Improper error handling in libANGLE
CVE-2015-6761: Memory corruption in FFMpeg
CVE-2015-6762: CORS bypass via CSS fonts
CVE-2015-6763: Various fixes from internal audits,
fuzzing and other initiatives.
CVE-2015-7834: Multiple vulnerabilities in V8 fixed at
the tip of the 4.6 branch
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from openSUSE Security Update openSUSE-2015-679.
#
# The text description of this plugin is (C) SUSE LLC.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(86596);
script_version("2.9");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");
script_cve_id("CVE-2015-6755", "CVE-2015-6756", "CVE-2015-6757", "CVE-2015-6758", "CVE-2015-6759", "CVE-2015-6760", "CVE-2015-6761", "CVE-2015-6762", "CVE-2015-6763", "CVE-2015-6764", "CVE-2015-7834");
script_name(english:"openSUSE Security Update : Chromium (openSUSE-2015-679)");
script_summary(english:"Check for the openSUSE-2015-679 patch");
script_set_attribute(
attribute:"synopsis",
value:"The remote openSUSE host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"Chromium was update do the stable release 46.0.2490.71 to fix security
issues.
The following vulnerabilities were fixed :
- CVE-2015-6755: Cross-origin bypass in Blink
- CVE-2015-6756: Use-after-free in PDFium
- CVE-2015-6757: Use-after-free in ServiceWorker
- CVE-2015-6758: Bad-cast in PDFium
- CVE-2015-6759: Information leakage in LocalStorage
- CVE-2015-6760: Improper error handling in libANGLE
- CVE-2015-6761: Memory corruption in FFMpeg
- CVE-2015-6762: CORS bypass via CSS fonts
- CVE-2015-6763: Various fixes from internal audits,
fuzzing and other initiatives.
- CVE-2015-7834: Multiple vulnerabilities in V8 fixed at
the tip of the 4.6 branch"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=950290"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected Chromium packages."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromedriver");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromedriver-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium-debugsource");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium-desktop-gnome");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium-desktop-kde");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium-ffmpegsumo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:13.1");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:13.2");
script_set_attribute(attribute:"patch_publication_date", value:"2015/10/17");
script_set_attribute(attribute:"plugin_publication_date", value:"2015/10/26");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.");
script_family(english:"SuSE Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
if (release !~ "^(SUSE13\.1|SUSE13\.2)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "13.1 / 13.2", release);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
ourarch = get_kb_item("Host/cpu");
if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
flag = 0;
if ( rpm_check(release:"SUSE13.1", reference:"chromedriver-46.0.2490.71-109.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"chromedriver-debuginfo-46.0.2490.71-109.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"chromium-46.0.2490.71-109.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"chromium-debuginfo-46.0.2490.71-109.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"chromium-debugsource-46.0.2490.71-109.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"chromium-desktop-gnome-46.0.2490.71-109.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"chromium-desktop-kde-46.0.2490.71-109.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"chromium-ffmpegsumo-46.0.2490.71-109.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"chromium-ffmpegsumo-debuginfo-46.0.2490.71-109.1") ) flag++;
if ( rpm_check(release:"SUSE13.2", reference:"chromedriver-46.0.2490.71-54.1") ) flag++;
if ( rpm_check(release:"SUSE13.2", reference:"chromedriver-debuginfo-46.0.2490.71-54.1") ) flag++;
if ( rpm_check(release:"SUSE13.2", reference:"chromium-46.0.2490.71-54.1") ) flag++;
if ( rpm_check(release:"SUSE13.2", reference:"chromium-debuginfo-46.0.2490.71-54.1") ) flag++;
if ( rpm_check(release:"SUSE13.2", reference:"chromium-debugsource-46.0.2490.71-54.1") ) flag++;
if ( rpm_check(release:"SUSE13.2", reference:"chromium-desktop-gnome-46.0.2490.71-54.1") ) flag++;
if ( rpm_check(release:"SUSE13.2", reference:"chromium-desktop-kde-46.0.2490.71-54.1") ) flag++;
if ( rpm_check(release:"SUSE13.2", reference:"chromium-ffmpegsumo-46.0.2490.71-54.1") ) flag++;
if ( rpm_check(release:"SUSE13.2", reference:"chromium-ffmpegsumo-debuginfo-46.0.2490.71-54.1") ) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "chromedriver / chromedriver-debuginfo / chromium / etc");
}
{"id": "OPENSUSE-2015-679.NASL", "bulletinFamily": "scanner", "title": "openSUSE Security Update : Chromium (openSUSE-2015-679)", "description": "Chromium was update do the stable release 46.0.2490.71 to fix security\nissues.\n\nThe following vulnerabilities were fixed :\n\n - CVE-2015-6755: Cross-origin bypass in Blink\n\n - CVE-2015-6756: Use-after-free in PDFium\n\n - CVE-2015-6757: Use-after-free in ServiceWorker\n\n - CVE-2015-6758: Bad-cast in PDFium\n\n - CVE-2015-6759: Information leakage in LocalStorage\n\n - CVE-2015-6760: Improper error handling in libANGLE\n\n - CVE-2015-6761: Memory corruption in FFMpeg\n\n - CVE-2015-6762: CORS bypass via CSS fonts\n\n - CVE-2015-6763: Various fixes from internal audits,\n fuzzing and other initiatives.\n\n - CVE-2015-7834: Multiple vulnerabilities in V8 fixed at\n the tip of the 4.6 branch", "published": "2015-10-26T00:00:00", "modified": "2015-10-26T00:00:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "href": "https://www.tenable.com/plugins/nessus/86596", "reporter": "This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.", "references": ["https://bugzilla.opensuse.org/show_bug.cgi?id=950290"], "cvelist": ["CVE-2015-6762", "CVE-2015-6764", "CVE-2015-6760", "CVE-2015-7834", "CVE-2015-6758", "CVE-2015-6759", "CVE-2015-6756", "CVE-2015-6763", "CVE-2015-6755", "CVE-2015-6757", "CVE-2015-6761"], "type": "nessus", "lastseen": "2021-01-20T12:28:49", "edition": 17, "viewCount": 4, "enchantments": {"dependencies": {"references": [{"type": "openvas", "idList": ["OPENVAS:1361412562310131102", "OPENVAS:1361412562310842495", "OPENVAS:1361412562310703376", "OPENVAS:1361412562310842501", "OPENVAS:1361412562310121451", "OPENVAS:1361412562310805994", "OPENVAS:1361412562310805996", "OPENVAS:703376", "OPENVAS:1361412562310131185", "OPENVAS:1361412562310805995"]}, {"type": "kaspersky", "idList": ["KLA10678", "KLA10703"]}, {"type": "redhat", "idList": ["RHSA-2015:2545", "RHSA-2015:1912"]}, {"type": "nessus", "idList": ["FREEBSD_PKG_B0DA85AF21A34C15A137FE9E4BC86002.NASL", "DEBIAN_DSA-3376.NASL", "GENTOO_GLSA-201603-09.NASL", "UBUNTU_USN-2770-1.NASL", "FREEBSD_PKG_8301C04D71DF11E59FCB00262D5ED8EE.NASL", "UBUNTU_USN-2770-2.NASL", "REDHAT-RHSA-2015-1912.NASL", "GOOGLE_CHROME_45_0_2490_71.NASL", "MACOSX_GOOGLE_CHROME_45_0_2490_71.NASL", "OPENSUSE-2016-46.NASL"]}, {"type": "archlinux", "idList": ["ASA-201512-1", "ASA-201510-8", "ASA-201512-4"]}, {"type": "freebsd", "idList": ["B0DA85AF-21A3-4C15-A137-FE9E4BC86002", "8301C04D-71DF-11E5-9FCB-00262D5ED8EE"]}, {"type": "threatpost", "idList": ["THREATPOST:C51401709B419BF04B7D260B9F842C61", "THREATPOST:BE11754C207B42C812B42708BCD8C646"]}, {"type": "ubuntu", "idList": ["USN-2770-2", "USN-2770-1"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:32571", "SECURITYVULNS:VULN:14737"]}, {"type": "debian", "idList": ["DEBIAN:DSA-3415-1:E369A", "DEBIAN:DLA-1611-1:76FB2", "DEBIAN:DSA-3376-1:92CEB"]}, {"type": "cve", "idList": ["CVE-2015-6762", "CVE-2015-6761", "CVE-2015-6755", "CVE-2015-7834", "CVE-2015-6758", "CVE-2015-6756", "CVE-2015-6763", "CVE-2015-6764", "CVE-2015-6760", "CVE-2015-6757"]}, {"type": "seebug", "idList": ["SSV:93035"]}, {"type": "exploitdb", "idList": ["EDB-ID:38763"]}, {"type": "zdt", "idList": ["1337DAY-ID-24590"]}, {"type": "myhack58", "idList": ["MYHACK58:62201787022"]}, {"type": "gentoo", "idList": ["GLSA-201603-09"]}, {"type": "apple", "idList": ["APPLE:HT207268"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2015:2291-1", "OPENSUSE-SU-2015:2290-1"]}], "modified": "2021-01-20T12:28:49", "rev": 2}, "score": {"value": 8.1, "vector": "NONE", "modified": "2021-01-20T12:28:49", "rev": 2}, "vulnersScore": 8.1}, "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2015-679.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(86596);\n script_version(\"2.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2015-6755\", \"CVE-2015-6756\", \"CVE-2015-6757\", \"CVE-2015-6758\", \"CVE-2015-6759\", \"CVE-2015-6760\", \"CVE-2015-6761\", \"CVE-2015-6762\", \"CVE-2015-6763\", \"CVE-2015-6764\", \"CVE-2015-7834\");\n\n script_name(english:\"openSUSE Security Update : Chromium (openSUSE-2015-679)\");\n script_summary(english:\"Check for the openSUSE-2015-679 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Chromium was update do the stable release 46.0.2490.71 to fix security\nissues.\n\nThe following vulnerabilities were fixed :\n\n - CVE-2015-6755: Cross-origin bypass in Blink\n\n - CVE-2015-6756: Use-after-free in PDFium\n\n - CVE-2015-6757: Use-after-free in ServiceWorker\n\n - CVE-2015-6758: Bad-cast in PDFium\n\n - CVE-2015-6759: Information leakage in LocalStorage\n\n - CVE-2015-6760: Improper error handling in libANGLE\n\n - CVE-2015-6761: Memory corruption in FFMpeg\n\n - CVE-2015-6762: CORS bypass via CSS fonts\n\n - CVE-2015-6763: Various fixes from internal audits,\n fuzzing and other initiatives.\n\n - CVE-2015-7834: Multiple vulnerabilities in V8 fixed at\n the tip of the 4.6 branch\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=950290\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected Chromium packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-desktop-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-desktop-kde\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-ffmpegsumo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/10/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/10/26\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE13\\.1|SUSE13\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"13.1 / 13.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromedriver-46.0.2490.71-109.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromedriver-debuginfo-46.0.2490.71-109.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-46.0.2490.71-109.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-debuginfo-46.0.2490.71-109.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-debugsource-46.0.2490.71-109.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-desktop-gnome-46.0.2490.71-109.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-desktop-kde-46.0.2490.71-109.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-ffmpegsumo-46.0.2490.71-109.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-ffmpegsumo-debuginfo-46.0.2490.71-109.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromedriver-46.0.2490.71-54.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromedriver-debuginfo-46.0.2490.71-54.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-46.0.2490.71-54.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-debuginfo-46.0.2490.71-54.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-debugsource-46.0.2490.71-54.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-desktop-gnome-46.0.2490.71-54.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-desktop-kde-46.0.2490.71-54.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-ffmpegsumo-46.0.2490.71-54.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-ffmpegsumo-debuginfo-46.0.2490.71-54.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromedriver / chromedriver-debuginfo / chromium / etc\");\n}\n", "naslFamily": "SuSE Local Security Checks", "pluginID": "86596", "cpe": ["p-cpe:/a:novell:opensuse:chromedriver-debuginfo", "p-cpe:/a:novell:opensuse:chromium-desktop-gnome", "p-cpe:/a:novell:opensuse:chromium", "p-cpe:/a:novell:opensuse:chromium-debugsource", "p-cpe:/a:novell:opensuse:chromedriver", "p-cpe:/a:novell:opensuse:chromium-ffmpegsumo", "cpe:/o:novell:opensuse:13.2", "p-cpe:/a:novell:opensuse:chromium-debuginfo", "cpe:/o:novell:opensuse:13.1", "p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo", "p-cpe:/a:novell:opensuse:chromium-desktop-kde"], "scheme": null}
{"openvas": [{"lastseen": "2019-07-19T22:13:52", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-6762", "CVE-2015-6760", "CVE-2015-7834", "CVE-2015-6758", "CVE-2015-6759", "CVE-2015-6756", "CVE-2015-6763", "CVE-2015-6755", "CVE-2015-6757", "CVE-2015-6761"], "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2015-10-19T00:00:00", "id": "OPENVAS:1361412562310805995", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805995", "type": "openvas", "title": "Google Chrome Multiple Vulnerabilities-01 Oct15 (Mac OS X)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Multiple Vulnerabilities-01 Oct15 (Mac OS X)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805995\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2015-7834\", \"CVE-2015-6763\", \"CVE-2015-6762\", \"CVE-2015-6761\",\n \"CVE-2015-6760\", \"CVE-2015-6759\", \"CVE-2015-6758\", \"CVE-2015-6757\",\n \"CVE-2015-6756\", \"CVE-2015-6755\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-10-19 13:09:11 +0530 (Mon, 19 Oct 2015)\");\n script_name(\"Google Chrome Multiple Vulnerabilities-01 Oct15 (Mac OS X)\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - An error in 'ContainerNode::parserInsertBefore' function in\n core/dom/ContainerNode.cpp withn Blink.\n\n - A use-after-free error in the CPDFSDK_PageView implementation in\n fpdfsdk/src/fsdk_mgr.cpp in PDFium.\n\n - A use-after-free error in content/browser/service_worker/embedded_worker_instance.cc\n in the ServiceWorker implementation.\n\n - An error in 'CPDF_Document::GetPage' function in\n fpdfapi/fpdf_parser/fpdf_parser_document.cpp in PDFium.\n\n - An error in 'shouldTreatAsUniqueOrigin' function in\n platform/weborigin/SecurityOrigin.cpp in Blink.\n\n - An error in the 'Image11::map' function in renderer/d3d/d3d11/Image11.cpp\n in libANGLE.\n\n - An error in 'update_dimensions' function in libavcodec/vp8.c in FFmpeg.\n\n - An error in the 'CSSFontFaceSrcValue::fetch' function in\n core/css/CSSFontFaceSrcValue.cpp in the Cascading Style Sheets (CSS) implementation.\n\n - Other multiple unspecified errors.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation would allow a attacker\n to cause a denial of service or possibly have other impact, bypass the security\n restrictions and gain access to potentially sensitive information.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome versions prior to 46.0.2490.71\n on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 46.0.2490.71 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"http://googlechromereleases.blogspot.in/2015/10/stable-channel-update.html\");\n\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_macosx.nasl\");\n script_mandatory_keys(\"GoogleChrome/MacOSX/Version\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!chromeVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:chromeVer, test_version:\"46.0.2490.71\"))\n{\n report = 'Installed version: ' + chromeVer + '\\n' +\n 'Fixed version: 46.0.2490.71' + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-19T22:12:56", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-6762", "CVE-2015-6760", "CVE-2015-7834", "CVE-2015-6758", "CVE-2015-6759", "CVE-2015-6756", "CVE-2015-6763", "CVE-2015-6755", "CVE-2015-6757", "CVE-2015-6761"], "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2015-10-19T00:00:00", "id": "OPENVAS:1361412562310805996", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805996", "type": "openvas", "title": "Google Chrome Multiple Vulnerabilities-01 Oct15 (Linux)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Multiple Vulnerabilities-01 Oct15 (Linux)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805996\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2015-7834\", \"CVE-2015-6763\", \"CVE-2015-6762\", \"CVE-2015-6761\",\n \"CVE-2015-6760\", \"CVE-2015-6759\", \"CVE-2015-6758\", \"CVE-2015-6757\",\n \"CVE-2015-6756\", \"CVE-2015-6755\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-10-19 13:13:05 +0530 (Mon, 19 Oct 2015)\");\n script_name(\"Google Chrome Multiple Vulnerabilities-01 Oct15 (Linux)\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - An error in 'ContainerNode::parserInsertBefore' function in\n core/dom/ContainerNode.cpp withn Blink.\n\n - A use-after-free error in the CPDFSDK_PageView implementation in\n fpdfsdk/src/fsdk_mgr.cpp in PDFium.\n\n - A use-after-free error in content/browser/service_worker/embedded_worker_instance.cc\n in the ServiceWorker implementation.\n\n - An error in 'CPDF_Document::GetPage' function in\n fpdfapi/fpdf_parser/fpdf_parser_document.cpp in PDFium.\n\n - An error in 'shouldTreatAsUniqueOrigin' function in\n platform/weborigin/SecurityOrigin.cpp in Blink.\n\n - An error in the 'Image11::map' function in renderer/d3d/d3d11/Image11.cpp\n in libANGLE.\n\n - An error in 'update_dimensions' function in libavcodec/vp8.c in FFmpeg.\n\n - An error in the 'CSSFontFaceSrcValue::fetch' function in\n core/css/CSSFontFaceSrcValue.cpp in the Cascading Style Sheets (CSS) implementation.\n\n - Other multiple unspecified errors.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation would allow a attacker\n to cause a denial of service or possibly have other impact, bypass the security\n restrictions and gain access to potentially sensitive information.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome versions prior to 46.0.2490.71\n on Linux.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 46.0.2490.71 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"http://googlechromereleases.blogspot.in/2015/10/stable-channel-update.html\");\n\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_lin.nasl\");\n script_mandatory_keys(\"Google-Chrome/Linux/Ver\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!chromeVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:chromeVer, test_version:\"46.0.2490.71\"))\n{\n report = 'Installed version: ' + chromeVer + '\\n' +\n 'Fixed version: 46.0.2490.71' + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-19T22:14:08", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-6762", "CVE-2015-6760", "CVE-2015-7834", "CVE-2015-6758", "CVE-2015-6759", "CVE-2015-6756", "CVE-2015-6763", "CVE-2015-6755", "CVE-2015-6757", "CVE-2015-6761"], "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2015-10-19T00:00:00", "id": "OPENVAS:1361412562310805994", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805994", "type": "openvas", "title": "Google Chrome Multiple Vulnerabilities-01 Oct15 (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Multiple Vulnerabilities-01 Oct15 (Windows)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805994\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2015-7834\", \"CVE-2015-6763\", \"CVE-2015-6762\", \"CVE-2015-6761\",\n \"CVE-2015-6760\", \"CVE-2015-6759\", \"CVE-2015-6758\", \"CVE-2015-6757\",\n \"CVE-2015-6756\", \"CVE-2015-6755\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-10-19 12:49:26 +0530 (Mon, 19 Oct 2015)\");\n script_name(\"Google Chrome Multiple Vulnerabilities-01 Oct15 (Windows)\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - An error in 'ContainerNode::parserInsertBefore' function in\n core/dom/ContainerNode.cpp withn Blink.\n\n - A use-after-free error in the CPDFSDK_PageView implementation in\n fpdfsdk/src/fsdk_mgr.cpp in PDFium.\n\n - A use-after-free error in content/browser/service_worker/embedded_worker_instance.cc\n in the ServiceWorker implementation.\n\n - An error in 'CPDF_Document::GetPage' function in\n fpdfapi/fpdf_parser/fpdf_parser_document.cpp in PDFium.\n\n - An error in 'shouldTreatAsUniqueOrigin' function in\n platform/weborigin/SecurityOrigin.cpp in Blink.\n\n - An error in the 'Image11::map' function in renderer/d3d/d3d11/Image11.cpp\n in libANGLE.\n\n - An error in 'update_dimensions' function in libavcodec/vp8.c in FFmpeg.\n\n - An error in the 'CSSFontFaceSrcValue::fetch' function in\n core/css/CSSFontFaceSrcValue.cpp in the Cascading Style Sheets (CSS) implementation.\n\n - Other multiple unspecified errors.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation would allow an attacker\n to cause a denial of service or possibly have other impact, bypass the security\n restrictions and gain access to potentially sensitive information.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome versions prior to 46.0.2490.71\n on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 46.0.2490.71 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n\n script_xref(name:\"URL\", value:\"http://googlechromereleases.blogspot.in/2015/10/stable-channel-update.html\");\n\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_portable_win.nasl\");\n script_mandatory_keys(\"GoogleChrome/Win/Ver\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!chromeVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:chromeVer, test_version:\"46.0.2490.71\"))\n{\n report = 'Installed version: ' + chromeVer + '\\n' +\n 'Fixed version: 46.0.2490.71' + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:36:35", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-6762", "CVE-2015-6760", "CVE-2015-6758", "CVE-2015-6759", "CVE-2015-6756", "CVE-2015-6763", "CVE-2015-6755", "CVE-2015-6757", "CVE-2015-6761"], "description": "Mageia Linux Local Security Checks mgasa-2015-0410", "modified": "2018-09-28T00:00:00", "published": "2015-10-26T00:00:00", "id": "OPENVAS:1361412562310131102", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310131102", "type": "openvas", "title": "Mageia Linux Local Check: mgasa-2015-0410", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: mgasa-2015-0410.nasl 11692 2018-09-28 16:55:19Z cfischer $\n#\n# Mageia Linux security check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://www.solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.131102\");\n script_version(\"$Revision: 11692 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-26 09:36:00 +0200 (Mon, 26 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 18:55:19 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Mageia Linux Local Check: mgasa-2015-0410\");\n script_tag(name:\"insight\", value:\"Updated chromium-browser-stable packages fix security vulnerabilities: Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim (CVE-2015-6755, CVE-2015-6756, CVE-2015-6757, CVE-2015-6758, CVE-2015-6759, CVE-2015-6760, CVE-2015-6761, CVE-2015-6762, CVE-2015-6763).\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://advisories.mageia.org/MGASA-2015-0410.html\");\n script_cve_id(\"CVE-2015-6755\", \"CVE-2015-6756\", \"CVE-2015-6757\", \"CVE-2015-6758\", \"CVE-2015-6759\", \"CVE-2015-6760\", \"CVE-2015-6761\", \"CVE-2015-6762\", \"CVE-2015-6763\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mageia_linux\", \"ssh/login/release\", re:\"ssh/login/release=MAGEIA5\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"Mageia Linux Local Security Checks mgasa-2015-0410\");\n script_copyright(\"Eero Volotinen\");\n script_family(\"Mageia Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"MAGEIA5\")\n{\nif ((res = isrpmvuln(pkg:\"chromium-browser-stable\", rpm:\"chromium-browser-stable~46.0.2490.80~1.mga5\", rls:\"MAGEIA5\")) != NULL) {\n security_message(data:res);\n exit(0);\n}\nif (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:35:55", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-6762", "CVE-2015-7834", "CVE-2015-6759", "CVE-2015-6763", "CVE-2015-6755", "CVE-2015-6757", "CVE-2015-6761"], "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2015-10-21T00:00:00", "id": "OPENVAS:1361412562310842495", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310842495", "type": "openvas", "title": "Ubuntu Update for oxide-qt USN-2770-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for oxide-qt USN-2770-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.842495\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-10-21 07:12:05 +0200 (Wed, 21 Oct 2015)\");\n script_cve_id(\"CVE-2015-6755\", \"CVE-2015-6757\", \"CVE-2015-6759\", \"CVE-2015-6761\",\n \"CVE-2015-6762\", \"CVE-2015-6763\", \"CVE-2015-7834\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for oxide-qt USN-2770-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'oxide-qt'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"It was discovered that\nContainerNode::parserInsertBefore in Blink would incorrectly proceed with a DOM\ntree insertion in some circumstances. If a user were tricked in to opening a\nspecially crafted website, an attacker could potentially exploit this to bypass\nsame origin restrictions. (CVE-2015-6755)\n\nA use-after-free was discovered in the service worker implementation in\nChromium. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit this to cause a denial of\nservice via application crash, or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2015-6757)\n\nIt was discovered that Blink did not ensure that the origin of\nLocalStorage resources are considered unique. If a user were tricked in to\nopening a specially crafted website, an attacker could potentially exploit\nthis to obtain sensitive information. (CVE-2015-6759)\n\nA race condition and memory corruption was discovered in FFmpeg. If a user\nwere tricked in to opening a specially crafted website, an attacker could\npotentially exploit this to cause a denial of service via renderer crash,\nor execute arbitrary code with the privileges of the sandboxed render\nprocess. (CVE-2015-6761)\n\nIt was discovered that CSSFontFaceSrcValue::fetch in Blink did not use\nCORS in some circumstances. If a user were tricked in to opening a\nspecially crafted website, an attacker could potentially exploit this to\nbypass same origin restrictions. (CVE-2015-6762)\n\nMultiple security issues were discovered in Chromium. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to read uninitialized memory, cause a denial\nof service via application crash or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2015-6763)\n\nMultiple security issues were discovered in V8. If a user were tricked\nin to opening a specially crafted website, an attacker could potentially\nexploit these to read uninitialized memory, cause a denial of service via\nrenderer crash or execute arbitrary code with the privileges of the\nsandboxed render process. (CVE-2015-7834)\");\n script_tag(name:\"affected\", value:\"oxide-qt on Ubuntu 15.04,\n Ubuntu 14.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_xref(name:\"USN\", value:\"2770-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2770-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(15\\.04|14\\.04 LTS)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU15.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:amd64\", ver:\"1.10.3-0ubuntu0.15.04.1\", rls:\"UBUNTU15.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:i386\", ver:\"1.10.3-0ubuntu0.15.04.1\", rls:\"UBUNTU15.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:amd64\", ver:\"1.10.3-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:i386\", ver:\"1.10.3-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:36:52", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-6762", "CVE-2015-7834", "CVE-2015-6759", "CVE-2015-6763", "CVE-2015-6755", "CVE-2015-6757", "CVE-2015-6761"], "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2015-10-26T00:00:00", "id": "OPENVAS:1361412562310842501", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310842501", "type": "openvas", "title": "Ubuntu Update for oxide-qt USN-2770-2", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for oxide-qt USN-2770-2\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.842501\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-10-26 15:33:08 +0100 (Mon, 26 Oct 2015)\");\n script_cve_id(\"CVE-2015-6755\", \"CVE-2015-6757\", \"CVE-2015-6759\", \"CVE-2015-6761\",\n \"CVE-2015-6762\", \"CVE-2015-6763\", \"CVE-2015-7834\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for oxide-qt USN-2770-2\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'oxide-qt'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"USN-2770-1 fixed vulnerabilities in Oxide\nin Ubuntu 14.04 LTS and Ubuntu 15.04. This update provides the corresponding\nupdates for Ubuntu 15.10.\n\nOriginal advisory details:\n\nIt was discovered that ContainerNode::parserInsertBefore in Blink would\nincorrectly proceed with a DOM tree insertion in some circumstances. If a\nuser were tricked in to opening a specially crafted website, an attacker\ncould potentially exploit this to bypass same origin restrictions.\n(CVE-2015-6755)\n\nA use-after-free was discovered in the service worker implementation in\nChromium. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit this to cause a denial of\nservice via application crash, or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2015-6757)\n\nIt was discovered that Blink did not ensure that the origin of\nLocalStorage resources are considered unique. If a user were tricked in to\nopening a specially crafted website, an attacker could potentially exploit\nthis to obtain sensitive information. (CVE-2015-6759)\n\nA race condition and memory corruption was discovered in FFmpeg. If a user\nwere tricked in to opening a specially crafted website, an attacker could\npotentially exploit this to cause a denial of service via renderer crash,\nor execute arbitrary code with the privileges of the sandboxed render\nprocess. (CVE-2015-6761)\n\nIt was discovered that CSSFontFaceSrcValue::fetch in Blink did not use\nCORS in some circumstances. If a user were tricked in to opening a\nspecially crafted website, an attacker could potentially exploit this to\nbypass same origin restrictions. (CVE-2015-6762)\n\nMultiple security issues were discovered in Chromium. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to read uninitialized memory, cause a denial\nof service via application crash or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2015-6763)\n\nMultiple security issues were discovered in V8. If a user were tricked\nin to opening a specially crafted website, an attacker could potentially\nexploit these to read uninitialized memory, cause a denial of service via\nrenderer crash or execute arbitrary code with the privileges of the\nsandboxed render process. (CVE-2015-7834)\");\n script_tag(name:\"affected\", value:\"oxide-qt on Ubuntu 15.10\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_xref(name:\"USN\", value:\"2770-2\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2770-2/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU15\\.10\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU15.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:amd64\", ver:\"1.10.3-0ubuntu0.15.10.1\", rls:\"UBUNTU15.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:i386\", ver:\"1.10.3-0ubuntu0.15.10.1\", rls:\"UBUNTU15.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2017-07-24T12:53:07", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-6762", "CVE-2015-6760", "CVE-2015-6758", "CVE-2015-1303", "CVE-2015-6759", "CVE-2015-6756", "CVE-2015-6763", "CVE-2015-6755", "CVE-2015-1304", "CVE-2015-6757", "CVE-2015-6761"], "description": "Several vulnerabilities have been\ndiscovered in the chromium web browser.\n\nCVE-2015-1303 \nMariusz Mlynski discovered a way to bypass the Same Origin Policy\nin the DOM implementation.\n\nCVE-2015-1304 \nMariusz Mlynski discovered a way to bypass the Same Origin Policy\nin the v8 javascript library.\n\nCVE-2015-6755 \nMariusz Mlynski discovered a way to bypass the Same Origin Policy\nin blink/webkit.\n\nCVE-2015-6756 \nA use-after-free issue was found in the pdfium library.\n\nCVE-2015-6757 \nCollin Payne found a use-after-free issue in the ServiceWorker\nimplementation.\n\nCVE-2015-6758 \nAtte Kettunen found an issue in the pdfium library.\n\nCVE-2015-6759 \nMuneaki Nishimura discovered an information leak.\n\nCVE-2015-6760 \nRonald Crane discovered a logic error in the ANGLE library\ninvolving lost device events.\n\nCVE-2015-6761 \nAki Helin and Khalil Zhani discovered a memory corruption issue in\nthe ffmpeg library.\n\nCVE-2015-6762 \nMuneaki Nishimura discovered a way to bypass the Same Origin Policy\nin the CSS implementation.\n\nCVE-2015-6763 \nThe chrome 46 development team found and fixed various issues\nduring internal auditing. Also multiple issues were fixed in\nthe v8 javascript library, version 4.6.85.23.", "modified": "2017-07-07T00:00:00", "published": "2015-10-20T00:00:00", "id": "OPENVAS:703376", "href": "http://plugins.openvas.org/nasl.php?oid=703376", "type": "openvas", "title": "Debian Security Advisory DSA 3376-1 (chromium-browser - security update)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3376.nasl 6609 2017-07-07 12:05:59Z cfischer $\n# Auto-generated from advisory DSA 3376-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\n\nif(description)\n{\n script_id(703376);\n script_version(\"$Revision: 6609 $\");\n script_cve_id(\"CVE-2015-1303\", \"CVE-2015-1304\", \"CVE-2015-6755\", \"CVE-2015-6756\",\n \"CVE-2015-6757\", \"CVE-2015-6758\", \"CVE-2015-6759\", \"CVE-2015-6760\",\n \"CVE-2015-6761\", \"CVE-2015-6762\", \"CVE-2015-6763\");\n script_name(\"Debian Security Advisory DSA 3376-1 (chromium-browser - security update)\");\n script_tag(name: \"last_modification\", value: \"$Date: 2017-07-07 14:05:59 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name: \"creation_date\", value: \"2015-10-20 00:00:00 +0200 (Tue, 20 Oct 2015)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name: \"solution_type\", value: \"VendorFix\");\n script_tag(name: \"qod_type\", value: \"package\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2015/dsa-3376.html\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: \"chromium-browser on Debian Linux\");\n script_tag(name: \"solution\", value: \"For the stable distribution (jessie),\nthese problems have been fixed in version 46.0.2490.71-1~deb8u1.\n\nFor the testing (stretch) and unstable (sid) distributions, these\nproblems have been fixed in version 46.0.2490.71-1.\n\nWe recommend that you upgrade your chromium-browser packages.\");\n script_tag(name: \"summary\", value: \"Several vulnerabilities have been\ndiscovered in the chromium web browser.\n\nCVE-2015-1303 \nMariusz Mlynski discovered a way to bypass the Same Origin Policy\nin the DOM implementation.\n\nCVE-2015-1304 \nMariusz Mlynski discovered a way to bypass the Same Origin Policy\nin the v8 javascript library.\n\nCVE-2015-6755 \nMariusz Mlynski discovered a way to bypass the Same Origin Policy\nin blink/webkit.\n\nCVE-2015-6756 \nA use-after-free issue was found in the pdfium library.\n\nCVE-2015-6757 \nCollin Payne found a use-after-free issue in the ServiceWorker\nimplementation.\n\nCVE-2015-6758 \nAtte Kettunen found an issue in the pdfium library.\n\nCVE-2015-6759 \nMuneaki Nishimura discovered an information leak.\n\nCVE-2015-6760 \nRonald Crane discovered a logic error in the ANGLE library\ninvolving lost device events.\n\nCVE-2015-6761 \nAki Helin and Khalil Zhani discovered a memory corruption issue in\nthe ffmpeg library.\n\nCVE-2015-6762 \nMuneaki Nishimura discovered a way to bypass the Same Origin Policy\nin the CSS implementation.\n\nCVE-2015-6763 \nThe chrome 46 development team found and fixed various issues\nduring internal auditing. Also multiple issues were fixed in\nthe v8 javascript library, version 4.6.85.23.\");\n script_tag(name: \"vuldetect\", value: \"This check tests the installed\nsoftware version using the apt package manager.\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"chromedriver\", ver:\"46.0.2490.71-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium\", ver:\"46.0.2490.71-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-dbg\", ver:\"46.0.2490.71-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-l10n\", ver:\"46.0.2490.71-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromedriver\", ver:\"46.0.2490.71-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium\", ver:\"46.0.2490.71-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-dbg\", ver:\"46.0.2490.71-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-inspector\", ver:\"46.0.2490.71-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-l10n\", ver:\"46.0.2490.71-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:36:18", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-6762", "CVE-2015-6760", "CVE-2015-6758", "CVE-2015-1303", "CVE-2015-6759", "CVE-2015-6756", "CVE-2015-6763", "CVE-2015-6755", "CVE-2015-1304", "CVE-2015-6757", "CVE-2015-6761"], "description": "Several vulnerabilities have been\ndiscovered in the chromium web browser.\n\nCVE-2015-1303\nMariusz Mlynski discovered a way to bypass the Same Origin Policy\nin the DOM implementation.\n\nCVE-2015-1304\nMariusz Mlynski discovered a way to bypass the Same Origin Policy\nin the v8 javascript library.\n\nCVE-2015-6755\nMariusz Mlynski discovered a way to bypass the Same Origin Policy\nin blink/webkit.\n\nCVE-2015-6756\nA use-after-free issue was found in the pdfium library.\n\nCVE-2015-6757\nCollin Payne found a use-after-free issue in the ServiceWorker\nimplementation.\n\nCVE-2015-6758\nAtte Kettunen found an issue in the pdfium library.\n\nCVE-2015-6759\nMuneaki Nishimura discovered an information leak.\n\nCVE-2015-6760\nRonald Crane discovered a logic error in the ANGLE library\ninvolving lost device events.\n\nCVE-2015-6761\nAki Helin and Khalil Zhani discovered a memory corruption issue in\nthe ffmpeg library.\n\nCVE-2015-6762\nMuneaki Nishimura discovered a way to bypass the Same Origin Policy\nin the CSS implementation.\n\nCVE-2015-6763\nThe chrome 46 development team found and fixed various issues\nduring internal auditing. Also multiple issues were fixed in\nthe v8 javascript library, version 4.6.85.23.", "modified": "2019-03-18T00:00:00", "published": "2015-10-20T00:00:00", "id": "OPENVAS:1361412562310703376", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703376", "type": "openvas", "title": "Debian Security Advisory DSA 3376-1 (chromium-browser - security update)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3376.nasl 14275 2019-03-18 14:39:45Z cfischer $\n# Auto-generated from advisory DSA 3376-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.703376\");\n script_version(\"$Revision: 14275 $\");\n script_cve_id(\"CVE-2015-1303\", \"CVE-2015-1304\", \"CVE-2015-6755\", \"CVE-2015-6756\",\n \"CVE-2015-6757\", \"CVE-2015-6758\", \"CVE-2015-6759\", \"CVE-2015-6760\",\n \"CVE-2015-6761\", \"CVE-2015-6762\", \"CVE-2015-6763\");\n script_name(\"Debian Security Advisory DSA 3376-1 (chromium-browser - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:39:45 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-10-20 00:00:00 +0200 (Tue, 20 Oct 2015)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2015/dsa-3376.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB(9|8)\");\n script_tag(name:\"affected\", value:\"chromium-browser on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the stable distribution (jessie),\nthese problems have been fixed in version 46.0.2490.71-1~deb8u1.\n\nFor the testing (stretch) and unstable (sid) distributions, these\nproblems have been fixed in version 46.0.2490.71-1.\n\nWe recommend that you upgrade your chromium-browser packages.\");\n script_tag(name:\"summary\", value:\"Several vulnerabilities have been\ndiscovered in the chromium web browser.\n\nCVE-2015-1303\nMariusz Mlynski discovered a way to bypass the Same Origin Policy\nin the DOM implementation.\n\nCVE-2015-1304\nMariusz Mlynski discovered a way to bypass the Same Origin Policy\nin the v8 javascript library.\n\nCVE-2015-6755\nMariusz Mlynski discovered a way to bypass the Same Origin Policy\nin blink/webkit.\n\nCVE-2015-6756\nA use-after-free issue was found in the pdfium library.\n\nCVE-2015-6757\nCollin Payne found a use-after-free issue in the ServiceWorker\nimplementation.\n\nCVE-2015-6758\nAtte Kettunen found an issue in the pdfium library.\n\nCVE-2015-6759\nMuneaki Nishimura discovered an information leak.\n\nCVE-2015-6760\nRonald Crane discovered a logic error in the ANGLE library\ninvolving lost device events.\n\nCVE-2015-6761\nAki Helin and Khalil Zhani discovered a memory corruption issue in\nthe ffmpeg library.\n\nCVE-2015-6762\nMuneaki Nishimura discovered a way to bypass the Same Origin Policy\nin the CSS implementation.\n\nCVE-2015-6763\nThe chrome 46 development team found and fixed various issues\nduring internal auditing. Also multiple issues were fixed in\nthe v8 javascript library, version 4.6.85.23.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed\nsoftware version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"chromedriver\", ver:\"46.0.2490.71-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium\", ver:\"46.0.2490.71-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-dbg\", ver:\"46.0.2490.71-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-l10n\", ver:\"46.0.2490.71-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromedriver\", ver:\"46.0.2490.71-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium\", ver:\"46.0.2490.71-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-dbg\", ver:\"46.0.2490.71-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-inspector\", ver:\"46.0.2490.71-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-l10n\", ver:\"46.0.2490.71-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:35:37", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-6776", "CVE-2016-1628", "CVE-2016-1634", "CVE-2015-6775", "CVE-2016-1638", "CVE-2015-6789", "CVE-2015-6766", "CVE-2015-6762", "CVE-2015-8126", "CVE-2015-1288", "CVE-2015-1281", "CVE-2015-6764", "CVE-2016-1612", "CVE-2015-6770", "CVE-2015-6760", "CVE-2015-6781", "CVE-2015-1291", "CVE-2016-1615", "CVE-2015-1275", "CVE-2016-1626", "CVE-2016-1618", "CVE-2015-1297", "CVE-2015-1286", "CVE-2016-1613", "CVE-2015-1298", "CVE-2015-1295", "CVE-2015-6771", "CVE-2015-1289", "CVE-2015-1296", "CVE-2015-1270", "CVE-2015-6784", "CVE-2015-1272", "CVE-2015-1283", "CVE-2015-1279", "CVE-2015-1274", "CVE-2015-1300", "CVE-2015-1287", "CVE-2016-1621", "CVE-2016-1631", "CVE-2015-6774", "CVE-2015-6778", "CVE-2016-1640", "CVE-2016-1632", "CVE-2015-1282", "CVE-2016-1622", "CVE-2015-6772", "CVE-2015-1285", "CVE-2016-1639", "CVE-2016-1616", "CVE-2015-1302", "CVE-2015-1293", "CVE-2015-6758", "CVE-2015-1303", "CVE-2015-1294", "CVE-2016-1635", "CVE-2015-1276", "CVE-2015-1278", "CVE-2016-1620", "CVE-2015-6767", "CVE-2015-6783", "CVE-2016-1636", "CVE-2015-6787", "CVE-2015-6792", "CVE-2015-1277", "CVE-2016-1627", "CVE-2015-6786", "CVE-2016-1641", "CVE-2016-1633", "CVE-2016-1624", "CVE-2016-1617", "CVE-2015-6791", "CVE-2016-1629", "CVE-2015-6780", "CVE-2015-6785", "CVE-2015-6790", "CVE-2016-1619", "CVE-2015-1271", "CVE-2015-1292", "CVE-2015-6779", "CVE-2015-6788", "CVE-2015-6759", "CVE-2015-1273", "CVE-2015-6756", "CVE-2015-6768", "CVE-2015-6763", "CVE-2016-1630", "CVE-2016-1637", "CVE-2015-6765", "CVE-2015-6755", "CVE-2015-6769", "CVE-2015-6773", "CVE-2015-1304", "CVE-2015-6777", "CVE-2015-1280", "CVE-2015-1299", "CVE-2015-6757", "CVE-2016-1623", "CVE-2015-6782", "CVE-2016-1625", "CVE-2015-1284", "CVE-2016-1614", "CVE-2015-6761"], "description": "Gentoo Linux Local Security Checks", "modified": "2018-10-12T00:00:00", "published": "2016-03-14T00:00:00", "id": "OPENVAS:1361412562310121451", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310121451", "type": "openvas", "title": "Gentoo Security Advisory GLSA 201603-09", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: glsa-201603-09.nasl 11856 2018-10-12 07:45:29Z cfischer $\n#\n# Gentoo Linux security check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.fi>\n#\n# Copyright:\n# Copyright (c) 2016 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.121451\");\n script_version(\"$Revision: 11856 $\");\n script_tag(name:\"creation_date\", value:\"2016-03-14 15:52:45 +0200 (Mon, 14 Mar 2016)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-12 09:45:29 +0200 (Fri, 12 Oct 2018) $\");\n script_name(\"Gentoo Security Advisory GLSA 201603-09\");\n script_tag(name:\"insight\", value:\"Multiple vulnerabilities have been discovered in the Chromium web browser. Please review the CVE identifiers referenced below for details.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://security.gentoo.org/glsa/201603-09\");\n script_cve_id(\"CVE-2015-1270\", \"CVE-2015-1271\", \"CVE-2015-1272\", \"CVE-2015-1273\", \"CVE-2015-1274\", \"CVE-2015-1275\", \"CVE-2015-1276\", \"CVE-2015-1277\", \"CVE-2015-1278\", \"CVE-2015-1279\", \"CVE-2015-1280\", \"CVE-2015-1281\", \"CVE-2015-1282\", \"CVE-2015-1283\", \"CVE-2015-1284\", \"CVE-2015-1285\", \"CVE-2015-1286\", \"CVE-2015-1287\", \"CVE-2015-1288\", \"CVE-2015-1289\", \"CVE-2015-1291\", \"CVE-2015-1292\", \"CVE-2015-1293\", \"CVE-2015-1294\", \"CVE-2015-1295\", \"CVE-2015-1296\", \"CVE-2015-1297\", \"CVE-2015-1298\", \"CVE-2015-1299\", \"CVE-2015-1300\", \"CVE-2015-1302\", \"CVE-2015-1303\", \"CVE-2015-1304\", \"CVE-2015-6755\", \"CVE-2015-6756\", \"CVE-2015-6757\", \"CVE-2015-6758\", \"CVE-2015-6759\", \"CVE-2015-6760\", \"CVE-2015-6761\", \"CVE-2015-6762\", \"CVE-2015-6763\", \"CVE-2015-6764\", \"CVE-2015-6765\", \"CVE-2015-6766\", \"CVE-2015-6767\", \"CVE-2015-6768\", \"CVE-2015-6769\", \"CVE-2015-6770\", \"CVE-2015-6771\", \"CVE-2015-6772\", \"CVE-2015-6773\", \"CVE-2015-6774\", \"CVE-2015-6775\", \"CVE-2015-6776\", \"CVE-2015-6777\", \"CVE-2015-6778\", \"CVE-2015-6779\", \"CVE-2015-6780\", \"CVE-2015-6781\", \"CVE-2015-6782\", \"CVE-2015-6783\", \"CVE-2015-6784\", \"CVE-2015-6785\", \"CVE-2015-6786\", \"CVE-2015-6787\", \"CVE-2015-6788\", \"CVE-2015-6789\", \"CVE-2015-6790\", \"CVE-2015-6791\", \"CVE-2015-6792\", \"CVE-2015-8126\", \"CVE-2016-1612\", \"CVE-2016-1613\", \"CVE-2016-1614\", \"CVE-2016-1615\", \"CVE-2016-1616\", \"CVE-2016-1617\", \"CVE-2016-1618\", \"CVE-2016-1619\", \"CVE-2016-1620\", \"CVE-2016-1621\", \"CVE-2016-1622\", \"CVE-2016-1623\", \"CVE-2016-1624\", \"CVE-2016-1625\", \"CVE-2016-1626\", \"CVE-2016-1627\", \"CVE-2016-1628\", \"CVE-2016-1629\", \"CVE-2016-1630\", \"CVE-2016-1631\", \"CVE-2016-1632\", \"CVE-2016-1633\", \"CVE-2016-1634\", \"CVE-2016-1635\", \"CVE-2016-1636\", \"CVE-2016-1637\", \"CVE-2016-1638\", \"CVE-2016-1639\", \"CVE-2016-1640\", \"CVE-2016-1641\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"Gentoo Linux Local Security Checks\");\n script_copyright(\"Eero Volotinen\");\n script_family(\"Gentoo Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\n\nif((res=ispkgvuln(pkg:\"www-client/chromium\", unaffected: make_list(\"ge 49.0.2623.87\"), vulnerable: make_list(\"lt 49.0.2623.87\"))) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:48", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-8216", "CVE-2015-6826", "CVE-2015-8363", "CVE-2015-6820", "CVE-2015-6824", "CVE-2015-8219", "CVE-2015-6818", "CVE-2015-6822", "CVE-2015-6823", "CVE-2015-8663", "CVE-2015-6825", "CVE-2015-8365", "CVE-2015-8364", "CVE-2015-8662", "CVE-2015-6821", "CVE-2015-8661", "CVE-2015-6761"], "description": "Mageia Linux Local Security Checks mgasa-2016-0018", "modified": "2019-03-14T00:00:00", "published": "2016-01-15T00:00:00", "id": "OPENVAS:1361412562310131185", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310131185", "type": "openvas", "title": "Mageia Linux Local Check: mgasa-2016-0018", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: mgasa-2016-0018.nasl 14180 2019-03-14 12:29:16Z cfischer $\n#\n# Mageia Linux security check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2016 Eero Volotinen, http://www.solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.131185\");\n script_version(\"$Revision: 14180 $\");\n script_tag(name:\"creation_date\", value:\"2016-01-15 08:29:01 +0200 (Fri, 15 Jan 2016)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-14 13:29:16 +0100 (Thu, 14 Mar 2019) $\");\n script_name(\"Mageia Linux Local Check: mgasa-2016-0018\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://advisories.mageia.org/MGASA-2016-0018.html\");\n script_cve_id(\"CVE-2015-6761\", \"CVE-2015-6818\", \"CVE-2015-6820\", \"CVE-2015-6821\", \"CVE-2015-6822\", \"CVE-2015-6823\", \"CVE-2015-6824\", \"CVE-2015-6825\", \"CVE-2015-6826\", \"CVE-2015-8216\", \"CVE-2015-8219\", \"CVE-2015-8363\", \"CVE-2015-8364\", \"CVE-2015-8365\", \"CVE-2015-8661\", \"CVE-2015-8662\", \"CVE-2015-8663\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mageia_linux\", \"ssh/login/release\", re:\"ssh/login/release=MAGEIA5\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"Mageia Linux Local Security Checks mgasa-2016-0018\");\n script_copyright(\"Eero Volotinen\");\n script_family(\"Mageia Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"MAGEIA5\")\n{\nif ((res = isrpmvuln(pkg:\"ffmpeg\", rpm:\"ffmpeg~2.4.12~1.mga5\", rls:\"MAGEIA5\")) != NULL) {\n security_message(data:res);\n exit(0);\n}\nif (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "kaspersky": [{"lastseen": "2020-09-02T11:49:29", "bulletinFamily": "info", "cvelist": ["CVE-2015-6762", "CVE-2015-6760", "CVE-2015-7834", "CVE-2015-6758", "CVE-2015-6759", "CVE-2015-6756", "CVE-2015-6763", "CVE-2015-6755", "CVE-2015-6757", "CVE-2015-6761"], "description": "### *Detect date*:\n10/13/2015\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to bypass security restrictions cause denial of service or obtain sensitive information.\n\n### *Affected products*:\nGoogle Chrome versions earlier than 46.0.2490.71 (all branches)\n\n### *Solution*:\nUpdate to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk. \n[Get Chrome](<https://www.google.com/chrome/>)\n\n### *Original advisories*:\n[Google Chrome blog entry](<http://feedproxy.google.com/~r/GoogleChromeReleases/~3/NJ-cORsAqzQ/stable-channel-update.html>) \n\n\n### *Impacts*:\nOSI \n\n### *Related products*:\n[Google Chrome](<https://threats.kaspersky.com/en/product/Google-Chrome/>)\n\n### *CVE-IDS*:\n[CVE-2015-6763](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6763>)7.5Critical \n[CVE-2015-7834](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7834>)7.5Critical \n[CVE-2015-6757](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6757>)7.5Critical \n[CVE-2015-6758](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6758>)6.8High \n[CVE-2015-6755](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6755>)7.5Critical \n[CVE-2015-6756](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6756>)6.8High \n[CVE-2015-6761](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6761>)6.8High \n[CVE-2015-6762](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6762>)7.5Critical \n[CVE-2015-6759](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6759>)5.0Critical \n[CVE-2015-6760](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6760>)7.5Critical\n\n### *Exploitation*:\nThe following public exploits exists for this vulnerability:", "edition": 41, "modified": "2020-06-18T00:00:00", "published": "2015-10-13T00:00:00", "id": "KLA10678", "href": "https://threats.kaspersky.com/en/vulnerability/KLA10678", "title": "\r KLA10678Multiple vulnerabilities in Google Chrome ", "type": "kaspersky", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-09-02T11:55:54", "bulletinFamily": "info", "cvelist": ["CVE-2015-6776", "CVE-2015-6775", "CVE-2015-6766", "CVE-2015-6764", "CVE-2015-6770", "CVE-2015-6781", "CVE-2015-6771", "CVE-2015-6784", "CVE-2015-8480", "CVE-2015-6774", "CVE-2015-6778", "CVE-2015-6772", "CVE-2015-6767", "CVE-2015-6783", "CVE-2015-6787", "CVE-2015-6786", "CVE-2015-8478", "CVE-2015-6780", "CVE-2015-6785", "CVE-2015-6779", "CVE-2015-6768", "CVE-2015-6765", "CVE-2015-6769", "CVE-2015-6773", "CVE-2015-8479", "CVE-2015-6777", "CVE-2015-6782"], "description": "### *Detect date*:\n12/01/2015\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, spoof user interface, bypass security restrictions or execute arbitrary code.\n\n### *Affected products*:\nGoogle Chrome versions earlier than 47.0.2526.73 (all branches)\n\n### *Solution*:\nUpdate to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk. \n[Get Chrome](<https://www.google.com/chrome/browser/desktop/index.html>)\n\n### *Original advisories*:\n[Google releases blog entry](<http://googlechromereleases.blogspot.ru/2015/12/stable-channel-update.html>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Google Chrome](<https://threats.kaspersky.com/en/product/Google-Chrome/>)\n\n### *CVE-IDS*:\n[CVE-2015-6765](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6765>)10.0Critical \n[CVE-2015-6766](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6766>)7.5Critical \n[CVE-2015-6767](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6767>)7.5Critical \n[CVE-2015-6768](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6768>)7.5Critical \n[CVE-2015-6769](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6769>)7.5Critical \n[CVE-2015-6770](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6770>)7.5Critical \n[CVE-2015-6771](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6771>)7.5Critical \n[CVE-2015-6772](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6772>)7.5Critical \n[CVE-2015-6773](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6773>)7.5Critical \n[CVE-2015-6774](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6774>)7.5Critical \n[CVE-2015-6787](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6787>)10.0Critical \n[CVE-2015-6785](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6785>)4.3Warning \n[CVE-2015-6786](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6786>)4.3Warning \n[CVE-2015-8480](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8480>)10.0Critical \n[CVE-2015-8478](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8478>)7.5Critical \n[CVE-2015-8479](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8479>)7.5Critical \n[CVE-2015-6778](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6778>)7.5Critical \n[CVE-2015-6777](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6777>)7.5Critical \n[CVE-2015-6776](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6776>)6.8High \n[CVE-2015-6775](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6775>)7.5Critical \n[CVE-2015-6782](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6782>)4.3Warning \n[CVE-2015-6781](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6781>)7.5Critical \n[CVE-2015-6780](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6780>)6.8High \n[CVE-2015-6779](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6779>)4.3Warning \n[CVE-2015-6784](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6784>)4.3Warning \n[CVE-2015-6783](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6783>)4.3Warning \n[CVE-2015-6764](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6764>)7.5Critical\n\n### *Exploitation*:\nThe following public exploits exists for this vulnerability:", "edition": 41, "modified": "2020-06-18T00:00:00", "published": "2015-12-01T00:00:00", "id": "KLA10703", "href": "https://threats.kaspersky.com/en/vulnerability/KLA10703", "title": "\r KLA10703Multiple vulnerabilities in Google Chrome ", "type": "kaspersky", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "redhat": [{"lastseen": "2019-08-13T18:45:33", "bulletinFamily": "unix", "cvelist": ["CVE-2015-6755", "CVE-2015-6756", "CVE-2015-6757", "CVE-2015-6758", "CVE-2015-6759", "CVE-2015-6760", "CVE-2015-6761", "CVE-2015-6762", "CVE-2015-6763"], "description": "Chromium is an open-source web browser, powered by WebKit (Blink).\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Chromium to crash, execute\narbitrary code, or disclose sensitive information when visited by the\nvictim. (CVE-2015-6755, CVE-2015-6756, CVE-2015-6757, CVE-2015-6758,\nCVE-2015-6759, CVE-2015-6760, CVE-2015-6761, CVE-2015-6762, CVE-2015-6763)\n\nAll Chromium users should upgrade to these updated packages, which contain\nChromium version 46.0.2490.71, which corrects these issues. After\ninstalling the update, Chromium must be restarted for the changes to take \neffect.\n", "modified": "2018-06-07T09:04:21", "published": "2015-10-15T04:00:00", "id": "RHSA-2015:1912", "href": "https://access.redhat.com/errata/RHSA-2015:1912", "type": "redhat", "title": "(RHSA-2015:1912) Important: chromium-browser security update", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-08-13T18:45:53", "bulletinFamily": "unix", "cvelist": ["CVE-2015-6764", "CVE-2015-6765", "CVE-2015-6766", "CVE-2015-6767", "CVE-2015-6768", "CVE-2015-6769", "CVE-2015-6770", "CVE-2015-6771", "CVE-2015-6772", "CVE-2015-6773", "CVE-2015-6774", "CVE-2015-6775", "CVE-2015-6776", "CVE-2015-6777", "CVE-2015-6778", "CVE-2015-6779", "CVE-2015-6780", "CVE-2015-6781", "CVE-2015-6782", "CVE-2015-6784", "CVE-2015-6785", "CVE-2015-6786", "CVE-2015-6787"], "description": "Chromium is an open-source web browser, powered by WebKit (Blink).\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Chromium to crash, execute\narbitrary code, or disclose sensitive information when visited by the\nvictim. (CVE-2015-6764, CVE-2015-6765, CVE-2015-6766, CVE-2015-6767,\nCVE-2015-6768, CVE-2015-6769, CVE-2015-6770, CVE-2015-6771, CVE-2015-6772,\nCVE-2015-6773, CVE-2015-6774, CVE-2015-6775, CVE-2015-6776, CVE-2015-6777,\nCVE-2015-6778, CVE-2015-6779, CVE-2015-6780, CVE-2015-6781, CVE-2015-6782,\nCVE-2015-6784, CVE-2015-6785, CVE-2015-6786, CVE-2015-6787)\n\nAll Chromium users should upgrade to these updated packages, which contain\nChromium version 47.0.2526.73, which corrects these issues. After\ninstalling the update, Chromium must be restarted for the changes to take \neffect.\n", "modified": "2018-06-07T09:04:20", "published": "2015-12-03T05:00:00", "id": "RHSA-2015:2545", "href": "https://access.redhat.com/errata/RHSA-2015:2545", "type": "redhat", "title": "(RHSA-2015:2545) Critical: chromium-browser security update", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2020-05-31T20:09:25", "description": "Updated chromium-browser packages that fix multiple security issues\nare now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nChromium is an open source web browser, powered by WebKit (Blink).\n\nSeveral flaws were found in the processing of malformed web content. A\nweb page containing malicious content could cause Chromium to crash,\nexecute arbitrary code, or disclose sensitive information when visited\nby the victim. (CVE-2015-6755, CVE-2015-6756, CVE-2015-6757,\nCVE-2015-6758, CVE-2015-6759, CVE-2015-6760, CVE-2015-6761,\nCVE-2015-6762, CVE-2015-6763)\n\nAll Chromium users should upgrade to these updated packages, which\ncontain Chromium version 46.0.2490.71, which corrects these issues.\nAfter installing the update, Chromium must be restarted for the\nchanges to take effect.", "edition": 19, "published": "2015-10-16T00:00:00", "title": "RHEL 6 : chromium-browser (RHSA-2015:1912)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-6762", "CVE-2015-6760", "CVE-2015-6758", "CVE-2015-6759", "CVE-2015-6756", "CVE-2015-6763", "CVE-2015-6755", "CVE-2015-6757", "CVE-2015-6761"], "modified": "2015-10-16T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:chromium-browser-debuginfo", "cpe:/o:redhat:enterprise_linux:6.7", "p-cpe:/a:redhat:enterprise_linux:chromium-browser", "cpe:/o:redhat:enterprise_linux:6"], "id": "REDHAT-RHSA-2015-1912.NASL", "href": "https://www.tenable.com/plugins/nessus/86414", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2015:1912. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(86414);\n script_version(\"2.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/05/29\");\n\n script_cve_id(\"CVE-2015-6755\", \"CVE-2015-6756\", \"CVE-2015-6757\", \"CVE-2015-6758\", \"CVE-2015-6759\", \"CVE-2015-6760\", \"CVE-2015-6761\", \"CVE-2015-6762\", \"CVE-2015-6763\");\n script_xref(name:\"RHSA\", value:\"2015:1912\");\n\n script_name(english:\"RHEL 6 : chromium-browser (RHSA-2015:1912)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Updated chromium-browser packages that fix multiple security issues\nare now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nChromium is an open source web browser, powered by WebKit (Blink).\n\nSeveral flaws were found in the processing of malformed web content. A\nweb page containing malicious content could cause Chromium to crash,\nexecute arbitrary code, or disclose sensitive information when visited\nby the victim. (CVE-2015-6755, CVE-2015-6756, CVE-2015-6757,\nCVE-2015-6758, CVE-2015-6759, CVE-2015-6760, CVE-2015-6761,\nCVE-2015-6762, CVE-2015-6763)\n\nAll Chromium users should upgrade to these updated packages, which\ncontain Chromium version 46.0.2490.71, which corrects these issues.\nAfter installing the update, Chromium must be restarted for the\nchanges to take effect.\"\n );\n # http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7a25de1b\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2015:1912\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-6760\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-6761\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-6762\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-6763\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-6755\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-6757\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-6756\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-6759\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-6758\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"Update the affected chromium-browser and / or\nchromium-browser-debuginfo packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:chromium-browser\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:chromium-browser-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/10/15\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/10/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/10/16\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2015:1912\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"chromium-browser-46.0.2490.71-1.el6\", allowmaj:TRUE)) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"chromium-browser-46.0.2490.71-1.el6\", allowmaj:TRUE)) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"chromium-browser-debuginfo-46.0.2490.71-1.el6\", allowmaj:TRUE)) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"chromium-browser-debuginfo-46.0.2490.71-1.el6\", allowmaj:TRUE)) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromium-browser / chromium-browser-debuginfo\");\n }\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T10:46:39", "description": "Google Chrome Releases reports :\n\n24 security fixes in this release, including :\n\n- [519558] High CVE-2015-6755: Cross-origin bypass in Blink. Credit to\nMariusz Mlynski.\n\n- [507316] High CVE-2015-6756: Use-after-free in PDFium. Credit to\nanonymous.\n\n- [529520] High CVE-2015-6757: Use-after-free in ServiceWorker. Credit\nto Collin Payne.\n\n- [522131] High CVE-2015-6758: Bad-cast in PDFium. Credit to Atte\nKettunen of OUSPG.\n\n- [514076] Medium CVE-2015-6759: Information leakage in LocalStorage.\nCredit to Muneaki Nishimura (nishimunea).\n\n- [519642] Medium CVE-2015-6760: Improper error handling in libANGLE.\nCredit to lastland.net.\n\n- [447860,532967] Medium CVE-2015-6761: Memory corruption in FFMpeg.\nCredit to Aki Helin of OUSPG and anonymous.\n\n- [512678] Low CVE-2015-6762: CORS bypass via CSS fonts. Credit to\nMuneaki Nishimura (nishimunea).\n\n- [542517] CVE-2015-6763: Various fixes from internal audits, fuzzing\nand other initiatives.\n\n- Multiple vulnerabilities in V8 fixed at the tip of the 4.6 branch\n(currently 4.6.85.23).", "edition": 21, "published": "2015-10-14T00:00:00", "title": "FreeBSD : chromium -- multiple vulnerabilities (8301c04d-71df-11e5-9fcb-00262d5ed8ee)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-6762", "CVE-2015-6760", "CVE-2015-6758", "CVE-2015-6759", "CVE-2015-6756", "CVE-2015-6763", "CVE-2015-6755", "CVE-2015-6757", "CVE-2015-6761"], "modified": "2015-10-14T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:chromium-npapi", "cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:chromium-pulse", "p-cpe:/a:freebsd:freebsd:chromium"], "id": "FREEBSD_PKG_8301C04D71DF11E59FCB00262D5ED8EE.NASL", "href": "https://www.tenable.com/plugins/nessus/86377", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(86377);\n script_version(\"2.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2015-6755\", \"CVE-2015-6756\", \"CVE-2015-6757\", \"CVE-2015-6758\", \"CVE-2015-6759\", \"CVE-2015-6760\", \"CVE-2015-6761\", \"CVE-2015-6762\", \"CVE-2015-6763\");\n\n script_name(english:\"FreeBSD : chromium -- multiple vulnerabilities (8301c04d-71df-11e5-9fcb-00262d5ed8ee)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Google Chrome Releases reports :\n\n24 security fixes in this release, including :\n\n- [519558] High CVE-2015-6755: Cross-origin bypass in Blink. Credit to\nMariusz Mlynski.\n\n- [507316] High CVE-2015-6756: Use-after-free in PDFium. Credit to\nanonymous.\n\n- [529520] High CVE-2015-6757: Use-after-free in ServiceWorker. Credit\nto Collin Payne.\n\n- [522131] High CVE-2015-6758: Bad-cast in PDFium. Credit to Atte\nKettunen of OUSPG.\n\n- [514076] Medium CVE-2015-6759: Information leakage in LocalStorage.\nCredit to Muneaki Nishimura (nishimunea).\n\n- [519642] Medium CVE-2015-6760: Improper error handling in libANGLE.\nCredit to lastland.net.\n\n- [447860,532967] Medium CVE-2015-6761: Memory corruption in FFMpeg.\nCredit to Aki Helin of OUSPG and anonymous.\n\n- [512678] Low CVE-2015-6762: CORS bypass via CSS fonts. Credit to\nMuneaki Nishimura (nishimunea).\n\n- [542517] CVE-2015-6763: Various fixes from internal audits, fuzzing\nand other initiatives.\n\n- Multiple vulnerabilities in V8 fixed at the tip of the 4.6 branch\n(currently 4.6.85.23).\"\n );\n # http://googlechromereleases.blogspot.nl/2015/10/stable-channel-update.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a3ea664b\"\n );\n # https://vuxml.freebsd.org/freebsd/8301c04d-71df-11e5-9fcb-00262d5ed8ee.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?e9373035\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium-npapi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium-pulse\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/10/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/10/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/10/14\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"chromium<46.0.2490.71\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"chromium-npapi<46.0.2490.71\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"chromium-pulse<46.0.2490.71\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-02-01T03:46:41", "description": "The version of Google Chrome installed on the remote Mac OS X host is\nprior to 46.0.2490.71. It is, therefore, affected by multiple\nvulnerabilities :\n\n - A same-origin bypass vulnerability exists in Blink that\n allows an attacker to bypass the same-origin policy.\n (CVE-2015-6755)\n\n - A use-after-free error exists in PDFium. A remote\n attacker can exploit this to dereference already freed\n memory, potentially resulting in the execution of\n arbitrary code or a denial of service condition.\n (CVE-2015-6756)\n\n - A use-after-free error exists in ServiceWorker. A remote\n attacker can exploit this to dereference already freed\n memory, potentially resulting in the execution of\n arbitrary code. (CVE-2015-6757)\n\n - An unspecified bad cast issue exists in PDFium that a\n remote attacker can exploit to have an unspecified\n impact. (CVE-2015-6758)\n\n - An unspecified flaw exists in LocalStorage that allows\n an attacker to disclose sensitive information.\n (CVE-2015-6759)\n\n - An unspecified flaw exists when handling errors that\n allows an attacker to have an unspecified impact.\n (CVE-2015-6760)\n\n - A memory corruption issues exists in FFMpeg due to\n improper validation of user-supplied input. A remote\n attacker can exploit this to execute arbitrary code.\n (CVE-2015-6761)\n\n - An unspecified flaw exists when handling CSS fonts. An\n attacker can exploit this to bypass cross-origin\n resource sharing (CORS) restrictions. (CVE-2015-6762)\n\n - Multiple unspecified high severity issues exist that\n allow an attacker to have an unspecified impact.\n (CVE-2015-6763)", "edition": 25, "published": "2015-10-14T00:00:00", "title": "Google Chrome < 46.0.2490.71 Multiple Vulnerabilities (Mac OS X)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-6762", "CVE-2015-6760", "CVE-2015-6758", "CVE-2015-6759", "CVE-2015-6756", "CVE-2015-6763", "CVE-2015-6755", "CVE-2015-6757", "CVE-2015-6761"], "modified": "2021-02-02T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "MACOSX_GOOGLE_CHROME_45_0_2490_71.NASL", "href": "https://www.tenable.com/plugins/nessus/86381", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(86381);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/11/20\");\n\n script_cve_id(\n \"CVE-2015-6755\",\n \"CVE-2015-6756\",\n \"CVE-2015-6757\",\n \"CVE-2015-6758\",\n \"CVE-2015-6759\",\n \"CVE-2015-6760\",\n \"CVE-2015-6761\",\n \"CVE-2015-6762\",\n \"CVE-2015-6763\"\n );\n\n script_name(english:\"Google Chrome < 46.0.2490.71 Multiple Vulnerabilities (Mac OS X)\");\n script_summary(english:\"Checks the version number of Google Chrome.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Mac OS X host contains a web browser that is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote Mac OS X host is\nprior to 46.0.2490.71. It is, therefore, affected by multiple\nvulnerabilities :\n\n - A same-origin bypass vulnerability exists in Blink that\n allows an attacker to bypass the same-origin policy.\n (CVE-2015-6755)\n\n - A use-after-free error exists in PDFium. A remote\n attacker can exploit this to dereference already freed\n memory, potentially resulting in the execution of\n arbitrary code or a denial of service condition.\n (CVE-2015-6756)\n\n - A use-after-free error exists in ServiceWorker. A remote\n attacker can exploit this to dereference already freed\n memory, potentially resulting in the execution of\n arbitrary code. (CVE-2015-6757)\n\n - An unspecified bad cast issue exists in PDFium that a\n remote attacker can exploit to have an unspecified\n impact. (CVE-2015-6758)\n\n - An unspecified flaw exists in LocalStorage that allows\n an attacker to disclose sensitive information.\n (CVE-2015-6759)\n\n - An unspecified flaw exists when handling errors that\n allows an attacker to have an unspecified impact.\n (CVE-2015-6760)\n\n - A memory corruption issues exists in FFMpeg due to\n improper validation of user-supplied input. A remote\n attacker can exploit this to execute arbitrary code.\n (CVE-2015-6761)\n\n - An unspecified flaw exists when handling CSS fonts. An\n attacker can exploit this to bypass cross-origin\n resource sharing (CORS) restrictions. (CVE-2015-6762)\n\n - Multiple unspecified high severity issues exist that\n allow an attacker to have an unspecified impact.\n (CVE-2015-6763)\");\n # http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?7a25de1b\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome 46.0.2490.71 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-6763\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/10/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/10/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/10/14\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_google_chrome_installed.nbin\");\n script_require_keys(\"MacOSX/Google Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"MacOSX/Google Chrome/Installed\");\n\ngoogle_chrome_check_version(fix:'46.0.2490.71', severity:SECURITY_HOLE);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-02-01T03:19:04", "description": "The version of Google Chrome installed on the remote Windows host is\nprior to 46.0.2490.71. It is, therefore, affected by multiple\nvulnerabilities :\n\n - A same-origin bypass vulnerability exists in Blink that\n allows an attacker to bypass the same-origin policy.\n (CVE-2015-6755)\n\n - A use-after-free error exists in PDFium. A remote\n attacker can exploit this to dereference already freed\n memory, potentially resulting in the execution of\n arbitrary code or a denial of service condition.\n (CVE-2015-6756)\n\n - A use-after-free error exists in ServiceWorker. A remote\n attacker can exploit this to dereference already freed\n memory, potentially resulting in the execution of\n arbitrary code. (CVE-2015-6757)\n\n - An unspecified bad cast issue exists in PDFium that a\n remote attacker can exploit to have an unspecified\n impact. (CVE-2015-6758)\n\n - An unspecified flaw exists in LocalStorage that allows\n an attacker to disclose sensitive information.\n (CVE-2015-6759)\n\n - An unspecified flaw exists when handling errors that\n allows an attacker to have an unspecified impact.\n (CVE-2015-6760)\n\n - A memory corruption issues exists in FFMpeg due to\n improper validation of user-supplied input. A remote\n attacker can exploit this to execute arbitrary code.\n (CVE-2015-6761)\n\n - An unspecified flaw exists when handling CSS fonts. An\n attacker can exploit this to bypass cross-origin\n resource sharing (CORS) restrictions. (CVE-2015-6762)\n\n - Multiple unspecified high severity issues exist that\n allow an attacker to have an unspecified impact.\n (CVE-2015-6763)", "edition": 25, "published": "2015-10-14T00:00:00", "title": "Google Chrome < 46.0.2490.71 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-6762", "CVE-2015-6760", "CVE-2015-6758", "CVE-2015-6759", "CVE-2015-6756", "CVE-2015-6763", "CVE-2015-6755", "CVE-2015-6757", "CVE-2015-6761"], "modified": "2021-02-02T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "GOOGLE_CHROME_45_0_2490_71.NASL", "href": "https://www.tenable.com/plugins/nessus/86380", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(86380);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/11/20\");\n\n script_cve_id(\n \"CVE-2015-6755\",\n \"CVE-2015-6756\",\n \"CVE-2015-6757\",\n \"CVE-2015-6758\",\n \"CVE-2015-6759\",\n \"CVE-2015-6760\",\n \"CVE-2015-6761\",\n \"CVE-2015-6762\",\n \"CVE-2015-6763\"\n );\n\n script_name(english:\"Google Chrome < 46.0.2490.71 Multiple Vulnerabilities\");\n script_summary(english:\"Checks the version number of Google Chrome.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host contains a web browser that is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote Windows host is\nprior to 46.0.2490.71. It is, therefore, affected by multiple\nvulnerabilities :\n\n - A same-origin bypass vulnerability exists in Blink that\n allows an attacker to bypass the same-origin policy.\n (CVE-2015-6755)\n\n - A use-after-free error exists in PDFium. A remote\n attacker can exploit this to dereference already freed\n memory, potentially resulting in the execution of\n arbitrary code or a denial of service condition.\n (CVE-2015-6756)\n\n - A use-after-free error exists in ServiceWorker. A remote\n attacker can exploit this to dereference already freed\n memory, potentially resulting in the execution of\n arbitrary code. (CVE-2015-6757)\n\n - An unspecified bad cast issue exists in PDFium that a\n remote attacker can exploit to have an unspecified\n impact. (CVE-2015-6758)\n\n - An unspecified flaw exists in LocalStorage that allows\n an attacker to disclose sensitive information.\n (CVE-2015-6759)\n\n - An unspecified flaw exists when handling errors that\n allows an attacker to have an unspecified impact.\n (CVE-2015-6760)\n\n - A memory corruption issues exists in FFMpeg due to\n improper validation of user-supplied input. A remote\n attacker can exploit this to execute arbitrary code.\n (CVE-2015-6761)\n\n - An unspecified flaw exists when handling CSS fonts. An\n attacker can exploit this to bypass cross-origin\n resource sharing (CORS) restrictions. (CVE-2015-6762)\n\n - Multiple unspecified high severity issues exist that\n allow an attacker to have an unspecified impact.\n (CVE-2015-6763)\");\n # http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?7a25de1b\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome 46.0.2490.71 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-6763\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/10/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/10/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/10/14\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"google_chrome_installed.nasl\");\n script_require_keys(\"SMB/Google_Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"SMB/Google_Chrome/Installed\");\ninstalls = get_kb_list(\"SMB/Google_Chrome/*\");\n\ngoogle_chrome_check_version(installs:installs, fix:'46.0.2490.71', severity:SECURITY_HOLE);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-20T15:29:08", "description": "It was discovered that ContainerNode::parserInsertBefore in Blink\nwould incorrectly proceed with a DOM tree insertion in some\ncircumstances. If a user were tricked in to opening a specially\ncrafted website, an attacker could potentially exploit this to bypass\nsame origin restrictions. (CVE-2015-6755)\n\nA use-after-free was discovered in the service worker implementation\nin Chromium. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit this to cause a denial\nof service via application crash, or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2015-6757)\n\nIt was discovered that Blink did not ensure that the origin of\nLocalStorage resources are considered unique. If a user were tricked\nin to opening a specially crafted website, an attacker could\npotentially exploit this to obtain sensitive information.\n(CVE-2015-6759)\n\nA race condition and memory corruption was discovered in FFmpeg. If a\nuser were tricked in to opening a specially crafted website, an\nattacker could potentially exploit this to cause a denial of service\nvia renderer crash, or execute arbitrary code with the privileges of\nthe sandboxed render process. (CVE-2015-6761)\n\nIt was discovered that CSSFontFaceSrcValue::fetch in Blink did not use\nCORS in some circumstances. If a user were tricked in to opening a\nspecially crafted website, an attacker could potentially exploit this\nto bypass same origin restrictions. (CVE-2015-6762)\n\nMultiple security issues were discovered in Chromium. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to read uninitialized memory, cause a denial\nof service via application crash or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2015-6763)\n\nMultiple security issues were discovered in V8. If a user were tricked\nin to opening a specially crafted website, an attacker could\npotentially exploit these to read uninitialized memory, cause a denial\nof service via renderer crash or execute arbitrary code with the\nprivileges of the sandboxed render process. (CVE-2015-7834).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 22, "published": "2015-10-21T00:00:00", "title": "Ubuntu 14.04 LTS / 15.04 : oxide-qt vulnerabilities (USN-2770-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-6762", "CVE-2015-7834", "CVE-2015-6759", "CVE-2015-6763", "CVE-2015-6755", "CVE-2015-6757", "CVE-2015-6761"], "modified": "2015-10-21T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:15.04", "p-cpe:/a:canonical:ubuntu_linux:liboxideqtcore0", "cpe:/o:canonical:ubuntu_linux:14.04"], "id": "UBUNTU_USN-2770-1.NASL", "href": "https://www.tenable.com/plugins/nessus/86491", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2770-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(86491);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2015-6755\", \"CVE-2015-6757\", \"CVE-2015-6759\", \"CVE-2015-6761\", \"CVE-2015-6762\", \"CVE-2015-6763\", \"CVE-2015-7834\");\n script_xref(name:\"USN\", value:\"2770-1\");\n\n script_name(english:\"Ubuntu 14.04 LTS / 15.04 : oxide-qt vulnerabilities (USN-2770-1)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was discovered that ContainerNode::parserInsertBefore in Blink\nwould incorrectly proceed with a DOM tree insertion in some\ncircumstances. If a user were tricked in to opening a specially\ncrafted website, an attacker could potentially exploit this to bypass\nsame origin restrictions. (CVE-2015-6755)\n\nA use-after-free was discovered in the service worker implementation\nin Chromium. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit this to cause a denial\nof service via application crash, or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2015-6757)\n\nIt was discovered that Blink did not ensure that the origin of\nLocalStorage resources are considered unique. If a user were tricked\nin to opening a specially crafted website, an attacker could\npotentially exploit this to obtain sensitive information.\n(CVE-2015-6759)\n\nA race condition and memory corruption was discovered in FFmpeg. If a\nuser were tricked in to opening a specially crafted website, an\nattacker could potentially exploit this to cause a denial of service\nvia renderer crash, or execute arbitrary code with the privileges of\nthe sandboxed render process. (CVE-2015-6761)\n\nIt was discovered that CSSFontFaceSrcValue::fetch in Blink did not use\nCORS in some circumstances. If a user were tricked in to opening a\nspecially crafted website, an attacker could potentially exploit this\nto bypass same origin restrictions. (CVE-2015-6762)\n\nMultiple security issues were discovered in Chromium. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to read uninitialized memory, cause a denial\nof service via application crash or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2015-6763)\n\nMultiple security issues were discovered in V8. If a user were tricked\nin to opening a specially crafted website, an attacker could\npotentially exploit these to read uninitialized memory, cause a denial\nof service via renderer crash or execute arbitrary code with the\nprivileges of the sandboxed render process. (CVE-2015-7834).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/2770-1/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected liboxideqtcore0 package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:liboxideqtcore0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:15.04\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/10/15\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/10/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/10/21\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2015-2020 Canonical, Inc. / NASL script (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(14\\.04|15\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 14.04 / 15.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"14.04\", pkgname:\"liboxideqtcore0\", pkgver:\"1.10.3-0ubuntu0.14.04.1\")) flag++;\nif (ubuntu_check(osver:\"15.04\", pkgname:\"liboxideqtcore0\", pkgver:\"1.10.3-0ubuntu0.15.04.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"liboxideqtcore0\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-20T15:29:08", "description": "USN-2770-1 fixed vulnerabilities in Oxide in Ubuntu 14.04 LTS and\nUbuntu 15.04. This update provides the corresponding updates for\nUbuntu 15.10.\n\nIt was discovered that ContainerNode::parserInsertBefore in Blink\nwould incorrectly proceed with a DOM tree insertion in some\ncircumstances. If a user were tricked in to opening a specially\ncrafted website, an attacker could potentially exploit this to bypass\nsame origin restrictions. (CVE-2015-6755)\n\nA use-after-free was discovered in the service worker\nimplementation in Chromium. If a user were tricked in to\nopening a specially crafted website, an attacker could\npotentially exploit this to cause a denial of service via\napplication crash, or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2015-6757)\n\nIt was discovered that Blink did not ensure that the origin\nof LocalStorage resources are considered unique. If a user\nwere tricked in to opening a specially crafted website, an\nattacker could potentially exploit this to obtain sensitive\ninformation. (CVE-2015-6759)\n\nA race condition and memory corruption was discovered in\nFFmpeg. If a user were tricked in to opening a specially\ncrafted website, an attacker could potentially exploit this\nto cause a denial of service via renderer crash, or execute\narbitrary code with the privileges of the sandboxed render\nprocess. (CVE-2015-6761)\n\nIt was discovered that CSSFontFaceSrcValue::fetch in Blink\ndid not use CORS in some circumstances. If a user were\ntricked in to opening a specially crafted website, an\nattacker could potentially exploit this to bypass same\norigin restrictions. (CVE-2015-6762)\n\nMultiple security issues were discovered in Chromium. If a\nuser were tricked in to opening a specially crafted website,\nan attacker could potentially exploit these to read\nuninitialized memory, cause a denial of service via\napplication crash or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2015-6763)\n\nMultiple security issues were discovered in V8. If a user\nwere tricked in to opening a specially crafted website, an\nattacker could potentially exploit these to read\nuninitialized memory, cause a denial of service via renderer\ncrash or execute arbitrary code with the privileges of the\nsandboxed render process. (CVE-2015-7834).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 22, "published": "2015-10-23T00:00:00", "title": "Ubuntu 15.10 : oxide-qt vulnerabilities (USN-2770-2)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-6762", "CVE-2015-7834", "CVE-2015-6759", "CVE-2015-6763", "CVE-2015-6755", "CVE-2015-6757", "CVE-2015-6761"], "modified": "2015-10-23T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:15.10", "p-cpe:/a:canonical:ubuntu_linux:liboxideqtcore0"], "id": "UBUNTU_USN-2770-2.NASL", "href": "https://www.tenable.com/plugins/nessus/86565", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2770-2. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(86565);\n script_version(\"2.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2015-6755\", \"CVE-2015-6757\", \"CVE-2015-6759\", \"CVE-2015-6761\", \"CVE-2015-6762\", \"CVE-2015-6763\", \"CVE-2015-7834\");\n script_xref(name:\"USN\", value:\"2770-2\");\n\n script_name(english:\"Ubuntu 15.10 : oxide-qt vulnerabilities (USN-2770-2)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"USN-2770-1 fixed vulnerabilities in Oxide in Ubuntu 14.04 LTS and\nUbuntu 15.04. This update provides the corresponding updates for\nUbuntu 15.10.\n\nIt was discovered that ContainerNode::parserInsertBefore in Blink\nwould incorrectly proceed with a DOM tree insertion in some\ncircumstances. If a user were tricked in to opening a specially\ncrafted website, an attacker could potentially exploit this to bypass\nsame origin restrictions. (CVE-2015-6755)\n\nA use-after-free was discovered in the service worker\nimplementation in Chromium. If a user were tricked in to\nopening a specially crafted website, an attacker could\npotentially exploit this to cause a denial of service via\napplication crash, or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2015-6757)\n\nIt was discovered that Blink did not ensure that the origin\nof LocalStorage resources are considered unique. If a user\nwere tricked in to opening a specially crafted website, an\nattacker could potentially exploit this to obtain sensitive\ninformation. (CVE-2015-6759)\n\nA race condition and memory corruption was discovered in\nFFmpeg. If a user were tricked in to opening a specially\ncrafted website, an attacker could potentially exploit this\nto cause a denial of service via renderer crash, or execute\narbitrary code with the privileges of the sandboxed render\nprocess. (CVE-2015-6761)\n\nIt was discovered that CSSFontFaceSrcValue::fetch in Blink\ndid not use CORS in some circumstances. If a user were\ntricked in to opening a specially crafted website, an\nattacker could potentially exploit this to bypass same\norigin restrictions. (CVE-2015-6762)\n\nMultiple security issues were discovered in Chromium. If a\nuser were tricked in to opening a specially crafted website,\nan attacker could potentially exploit these to read\nuninitialized memory, cause a denial of service via\napplication crash or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2015-6763)\n\nMultiple security issues were discovered in V8. If a user\nwere tricked in to opening a specially crafted website, an\nattacker could potentially exploit these to read\nuninitialized memory, cause a denial of service via renderer\ncrash or execute arbitrary code with the privileges of the\nsandboxed render process. (CVE-2015-7834).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/2770-2/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected liboxideqtcore0 package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:liboxideqtcore0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:15.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/10/15\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/10/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/10/23\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2015-2020 Canonical, Inc. / NASL script (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(15\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 15.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"15.10\", pkgname:\"liboxideqtcore0\", pkgver:\"1.10.3-0ubuntu0.15.10.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"liboxideqtcore0\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-12T09:49:16", "description": "Several vulnerabilities have been discovered in the chromium web\nbrowser.\n\n - CVE-2015-1303\n Mariusz Mlynski discovered a way to bypass the Same\n Origin Policy in the DOM implementation.\n\n - CVE-2015-1304\n Mariusz Mlynski discovered a way to bypass the Same\n Origin Policy in the v8 JavaScript library.\n\n - CVE-2015-6755\n Mariusz Mlynski discovered a way to bypass the Same\n Origin Policy in blink/webkit.\n\n - CVE-2015-6756\n A use-after-free issue was found in the pdfium library.\n\n - CVE-2015-6757\n Collin Payne found a use-after-free issue in the\n ServiceWorker implementation.\n\n - CVE-2015-6758\n Atte Kettunen found an issue in the pdfium library.\n\n - CVE-2015-6759\n Muneaki Nishimura discovered an information leak.\n\n - CVE-2015-6760\n Ronald Crane discovered a logic error in the ANGLE\n library involving lost device events.\n\n - CVE-2015-6761\n Aki Helin and Khalil Zhani discovered a memory\n corruption issue in the ffmpeg library.\n\n - CVE-2015-6762\n Muneaki Nishimura discovered a way to bypass the Same\n Origin Policy in the CSS implementation.\n\n - CVE-2015-6763\n The chrome 46 development team found and fixed various\n issues during internal auditing. Also multiple issues\n were fixed in the v8 JavaScript library, version\n 4.6.85.23.", "edition": 21, "published": "2015-10-21T00:00:00", "title": "Debian DSA-3376-1 : chromium-browser - security update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-6762", "CVE-2015-6760", "CVE-2015-6758", "CVE-2015-1303", "CVE-2015-6759", "CVE-2015-6756", "CVE-2015-6763", "CVE-2015-6755", "CVE-2015-1304", "CVE-2015-6757", "CVE-2015-6761"], "modified": "2015-10-21T00:00:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "p-cpe:/a:debian:debian_linux:chromium-browser"], "id": "DEBIAN_DSA-3376.NASL", "href": "https://www.tenable.com/plugins/nessus/86486", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-3376. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(86486);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2015-1303\", \"CVE-2015-1304\", \"CVE-2015-6755\", \"CVE-2015-6756\", \"CVE-2015-6757\", \"CVE-2015-6758\", \"CVE-2015-6759\", \"CVE-2015-6760\", \"CVE-2015-6761\", \"CVE-2015-6762\", \"CVE-2015-6763\");\n script_xref(name:\"DSA\", value:\"3376\");\n\n script_name(english:\"Debian DSA-3376-1 : chromium-browser - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities have been discovered in the chromium web\nbrowser.\n\n - CVE-2015-1303\n Mariusz Mlynski discovered a way to bypass the Same\n Origin Policy in the DOM implementation.\n\n - CVE-2015-1304\n Mariusz Mlynski discovered a way to bypass the Same\n Origin Policy in the v8 JavaScript library.\n\n - CVE-2015-6755\n Mariusz Mlynski discovered a way to bypass the Same\n Origin Policy in blink/webkit.\n\n - CVE-2015-6756\n A use-after-free issue was found in the pdfium library.\n\n - CVE-2015-6757\n Collin Payne found a use-after-free issue in the\n ServiceWorker implementation.\n\n - CVE-2015-6758\n Atte Kettunen found an issue in the pdfium library.\n\n - CVE-2015-6759\n Muneaki Nishimura discovered an information leak.\n\n - CVE-2015-6760\n Ronald Crane discovered a logic error in the ANGLE\n library involving lost device events.\n\n - CVE-2015-6761\n Aki Helin and Khalil Zhani discovered a memory\n corruption issue in the ffmpeg library.\n\n - CVE-2015-6762\n Muneaki Nishimura discovered a way to bypass the Same\n Origin Policy in the CSS implementation.\n\n - CVE-2015-6763\n The chrome 46 development team found and fixed various\n issues during internal auditing. Also multiple issues\n were fixed in the v8 JavaScript library, version\n 4.6.85.23.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1303\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1304\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-6755\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-6756\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-6757\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-6758\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-6759\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-6760\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-6761\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-6762\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-6763\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/chromium-browser\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2015/dsa-3376\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the chromium-browser packages.\n\nFor the stable distribution (jessie), these problems have been fixed\nin version 46.0.2490.71-1~deb8u1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:chromium-browser\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/10/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/10/21\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"8.0\", prefix:\"chromedriver\", reference:\"46.0.2490.71-1~deb8u1\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"chromium\", reference:\"46.0.2490.71-1~deb8u1\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"chromium-dbg\", reference:\"46.0.2490.71-1~deb8u1\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"chromium-inspector\", reference:\"46.0.2490.71-1~deb8u1\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"chromium-l10n\", reference:\"46.0.2490.71-1~deb8u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-20T12:30:19", "description": "This update contains nodejs 4.2.4 and fixes the following issues :\n\n - CVE-2015-6764: unspecified out-of-bounds access\n vulnerability (boo#956902)\n\n - CVE-2015-8027: unspecified denial of service\n vulnerability (boo#956901)\n\nThe following non-security bugs were fixed :\n\n - boo#948045: Nodejs 4.0 rpm does not install\n addon-rpm.gypi\n\n - boo#961254: common.gypi should install at\n /usr/share/node and npm requires nodejs-devel\n\nAlso contains all upstream bug fixes and improvements in the 4.2.2,\n4.2.3 and 4.2.4 releases.", "edition": 18, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2016-01-25T00:00:00", "title": "openSUSE Security Update : nodejs (openSUSE-2016-46)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-6764", "CVE-2015-8027"], "modified": "2016-01-25T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:nodejs", "p-cpe:/a:novell:opensuse:nodejs-devel", "p-cpe:/a:novell:opensuse:nodejs-debugsource", "cpe:/o:novell:opensuse:42.1", "cpe:/o:novell:opensuse:13.2", "p-cpe:/a:novell:opensuse:npm", "cpe:/o:novell:opensuse:13.1", "p-cpe:/a:novell:opensuse:nodejs-debuginfo"], "id": "OPENSUSE-2016-46.NASL", "href": "https://www.tenable.com/plugins/nessus/88130", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2016-46.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(88130);\n script_version(\"2.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2015-6764\", \"CVE-2015-8027\");\n\n script_name(english:\"openSUSE Security Update : nodejs (openSUSE-2016-46)\");\n script_summary(english:\"Check for the openSUSE-2016-46 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update contains nodejs 4.2.4 and fixes the following issues :\n\n - CVE-2015-6764: unspecified out-of-bounds access\n vulnerability (boo#956902)\n\n - CVE-2015-8027: unspecified denial of service\n vulnerability (boo#956901)\n\nThe following non-security bugs were fixed :\n\n - boo#948045: Nodejs 4.0 rpm does not install\n addon-rpm.gypi\n\n - boo#961254: common.gypi should install at\n /usr/share/node and npm requires nodejs-devel\n\nAlso contains all upstream bug fixes and improvements in the 4.2.2,\n4.2.3 and 4.2.4 releases.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=948045\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=956901\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=956902\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=961254\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected nodejs packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:nodejs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:nodejs-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:nodejs-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:nodejs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:npm\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/01/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/01/25\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE13\\.1|SUSE13\\.2|SUSE42\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"13.1 / 13.2 / 42.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE13.1\", reference:\"nodejs-4.2.4-9.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"nodejs-debuginfo-4.2.4-9.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"nodejs-debugsource-4.2.4-9.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"nodejs-devel-4.2.4-9.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"nodejs-4.2.4-9.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"nodejs-debuginfo-4.2.4-9.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"nodejs-debugsource-4.2.4-9.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"nodejs-devel-4.2.4-9.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"nodejs-4.2.4-15.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"nodejs-debuginfo-4.2.4-15.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"nodejs-debugsource-4.2.4-15.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"nodejs-devel-4.2.4-15.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"npm-4.2.4-15.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"nodejs / nodejs-debuginfo / nodejs-debugsource / nodejs-devel / npm\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-12T11:04:58", "description": "The remote host is affected by the vulnerability described in GLSA-201603-09\n(Chromium: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in the Chromium web\n browser. Please review the CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker could possibly execute arbitrary code with the\n privileges of the process, cause a Denial of Service condition, obtain\n sensitive information, or bypass security restrictions.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 24, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2016-03-14T00:00:00", "title": "GLSA-201603-09 : Chromium: Multiple vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-6776", "CVE-2016-1628", "CVE-2016-1634", "CVE-2015-6775", "CVE-2016-1638", "CVE-2015-6789", "CVE-2015-6766", "CVE-2015-6762", "CVE-2015-8126", "CVE-2015-1288", "CVE-2015-1281", "CVE-2015-6764", "CVE-2016-1612", "CVE-2015-6770", "CVE-2015-6760", "CVE-2015-6781", "CVE-2015-1291", "CVE-2016-1615", "CVE-2015-1275", "CVE-2016-1626", "CVE-2016-1618", "CVE-2015-1297", "CVE-2015-1286", "CVE-2016-1613", "CVE-2015-1298", "CVE-2015-1295", "CVE-2015-6771", "CVE-2015-1289", "CVE-2015-1296", "CVE-2015-1270", "CVE-2015-6784", "CVE-2015-1272", "CVE-2015-1283", "CVE-2015-1279", "CVE-2015-1274", "CVE-2015-1300", "CVE-2015-1287", "CVE-2016-1621", "CVE-2016-1631", "CVE-2015-6774", "CVE-2015-6778", "CVE-2016-1640", "CVE-2016-1632", "CVE-2015-1282", "CVE-2016-1622", "CVE-2015-6772", "CVE-2015-1285", "CVE-2016-1639", "CVE-2016-1616", "CVE-2015-1302", "CVE-2015-1293", "CVE-2015-6758", "CVE-2015-1303", "CVE-2015-1294", "CVE-2016-1635", "CVE-2015-1276", "CVE-2015-1278", "CVE-2016-1620", "CVE-2015-6767", "CVE-2015-6783", "CVE-2016-1636", "CVE-2015-6787", "CVE-2015-6792", "CVE-2015-1277", "CVE-2016-1627", "CVE-2015-6786", "CVE-2016-1641", "CVE-2016-1633", "CVE-2016-1624", "CVE-2016-1617", "CVE-2015-6791", "CVE-2016-1629", "CVE-2015-6780", "CVE-2015-6785", "CVE-2015-6790", "CVE-2016-1619", "CVE-2015-1271", "CVE-2015-1292", "CVE-2015-6779", "CVE-2015-6788", "CVE-2015-6759", "CVE-2015-1273", "CVE-2015-6756", "CVE-2015-6768", "CVE-2015-6763", "CVE-2016-1630", "CVE-2016-1637", "CVE-2015-6765", "CVE-2015-6755", "CVE-2015-6769", "CVE-2015-6773", "CVE-2015-1304", "CVE-2015-6777", "CVE-2015-1280", "CVE-2015-1299", "CVE-2015-6757", "CVE-2016-1623", "CVE-2015-6782", "CVE-2016-1625", "CVE-2015-1284", "CVE-2016-1614", "CVE-2015-6761"], "modified": "2016-03-14T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:chromium"], "id": "GENTOO_GLSA-201603-09.NASL", "href": "https://www.tenable.com/plugins/nessus/89902", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201603-09.\n#\n# The advisory text is Copyright (C) 2001-2016 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(89902);\n script_version(\"2.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2015-1270\", \"CVE-2015-1271\", \"CVE-2015-1272\", \"CVE-2015-1273\", \"CVE-2015-1274\", \"CVE-2015-1275\", \"CVE-2015-1276\", \"CVE-2015-1277\", \"CVE-2015-1278\", \"CVE-2015-1279\", \"CVE-2015-1280\", \"CVE-2015-1281\", \"CVE-2015-1282\", \"CVE-2015-1283\", \"CVE-2015-1284\", \"CVE-2015-1285\", \"CVE-2015-1286\", \"CVE-2015-1287\", \"CVE-2015-1288\", \"CVE-2015-1289\", \"CVE-2015-1291\", \"CVE-2015-1292\", \"CVE-2015-1293\", \"CVE-2015-1294\", \"CVE-2015-1295\", \"CVE-2015-1296\", \"CVE-2015-1297\", \"CVE-2015-1298\", \"CVE-2015-1299\", \"CVE-2015-1300\", \"CVE-2015-1302\", \"CVE-2015-1303\", \"CVE-2015-1304\", \"CVE-2015-6755\", \"CVE-2015-6756\", \"CVE-2015-6757\", \"CVE-2015-6758\", \"CVE-2015-6759\", \"CVE-2015-6760\", \"CVE-2015-6761\", \"CVE-2015-6762\", \"CVE-2015-6763\", \"CVE-2015-6764\", \"CVE-2015-6765\", \"CVE-2015-6766\", \"CVE-2015-6767\", \"CVE-2015-6768\", \"CVE-2015-6769\", \"CVE-2015-6770\", \"CVE-2015-6771\", \"CVE-2015-6772\", \"CVE-2015-6773\", \"CVE-2015-6774\", \"CVE-2015-6775\", \"CVE-2015-6776\", \"CVE-2015-6777\", \"CVE-2015-6778\", \"CVE-2015-6779\", \"CVE-2015-6780\", \"CVE-2015-6781\", \"CVE-2015-6782\", \"CVE-2015-6783\", \"CVE-2015-6784\", \"CVE-2015-6785\", \"CVE-2015-6786\", \"CVE-2015-6787\", \"CVE-2015-6788\", \"CVE-2015-6789\", \"CVE-2015-6790\", \"CVE-2015-6791\", \"CVE-2015-6792\", \"CVE-2015-8126\", \"CVE-2016-1612\", \"CVE-2016-1613\", \"CVE-2016-1614\", \"CVE-2016-1615\", \"CVE-2016-1616\", \"CVE-2016-1617\", \"CVE-2016-1618\", \"CVE-2016-1619\", \"CVE-2016-1620\", \"CVE-2016-1621\", \"CVE-2016-1622\", \"CVE-2016-1623\", \"CVE-2016-1624\", \"CVE-2016-1625\", \"CVE-2016-1626\", \"CVE-2016-1627\", \"CVE-2016-1628\", \"CVE-2016-1629\", \"CVE-2016-1630\", \"CVE-2016-1631\", \"CVE-2016-1632\", \"CVE-2016-1633\", \"CVE-2016-1634\", \"CVE-2016-1635\", \"CVE-2016-1636\", \"CVE-2016-1637\", \"CVE-2016-1638\", \"CVE-2016-1639\", \"CVE-2016-1640\", \"CVE-2016-1641\");\n script_xref(name:\"GLSA\", value:\"201603-09\");\n\n script_name(english:\"GLSA-201603-09 : Chromium: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201603-09\n(Chromium: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in the Chromium web\n browser. Please review the CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker could possibly execute arbitrary code with the\n privileges of the process, cause a Denial of Service condition, obtain\n sensitive information, or bypass security restrictions.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201603-09\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Chromium users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose\n '>=www-client/chromium-49.0.2623.87'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/03/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/03/14\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"www-client/chromium\", unaffected:make_list(\"ge 49.0.2623.87\"), vulnerable:make_list(\"lt 49.0.2623.87\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Chromium\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-07T10:49:09", "description": "NVD reports :\n\nThe update_dimensions function in libavcodec/vp8.c in FFmpeg through\n2.8.1, as used in Google Chrome before 46.0.2490.71 and other\nproducts, relies on a coefficient-partition count during\nmulti-threaded operation, which allows remote attackers to cause a\ndenial of service (race condition and memory corruption) or possibly\nhave unspecified other impact via a crafted WebM file.\n\nThe ljpeg_decode_yuv_scan function in libavcodec/mjpegdec.c in FFmpeg\nbefore 2.8.2 omits certain width and height checks, which allows\nremote attackers to cause a denial of service (out-of-bounds array\naccess) or possibly have unspecified other impact via crafted MJPEG\ndata.\n\nThe ff_hevc_parse_sps function in libavcodec/hevc_ps.c in FFmpeg\nbefore 2.8.2 does not validate the Chroma Format Indicator, which\nallows remote attackers to cause a denial of service (out-of-bounds\narray access) or possibly have unspecified other impact via crafted\nHigh Efficiency Video Coding (HEVC) data.\n\nThe decode_uncompressed function in libavcodec/faxcompr.c in FFmpeg\nbefore 2.8.2 does not validate uncompressed runs, which allows remote\nattackers to cause a denial of service (out-of-bounds array access) or\npossibly have unspecified other impact via crafted CCITT FAX data.\n\nThe init_tile function in libavcodec/jpeg2000dec.c in FFmpeg before\n2.8.2 does not enforce minimum-value and maximum-value constraints on\ntile coordinates, which allows remote attackers to cause a denial of\nservice (out-of-bounds array access) or possibly have unspecified\nother impact via crafted JPEG 2000 data.\n\nThe jpeg2000_read_main_headers function in libavcodec/jpeg2000dec.c in\nFFmpeg before 2.6.5, 2.7.x before 2.7.3, and 2.8.x through 2.8.2 does\nnot enforce uniqueness of the SIZ marker in a JPEG 2000 image, which\nallows remote attackers to cause a denial of service (out-of-bounds\nheap-memory access) or possibly have unspecified other impact via a\ncrafted image with two or more of these markers.\n\nInteger overflow in the ff_ivi_init_planes function in\nlibavcodec/ivi.c in FFmpeg before 2.6.5, 2.7.x before 2.7.3, and 2.8.x\nthrough 2.8.2 allows remote attackers to cause a denial of service\n(out-of-bounds heap-memory access) or possibly have unspecified other\nimpact via crafted image dimensions in Indeo Video Interactive data.\n\nThe smka_decode_frame function in libavcodec/smacker.c in FFmpeg\nbefore 2.6.5, 2.7.x before 2.7.3, and 2.8.x through 2.8.2 does not\nverify that the data size is consistent with the number of channels,\nwhich allows remote attackers to cause a denial of service\n(out-of-bounds array access) or possibly have unspecified other impact\nvia crafted Smacker data.", "edition": 17, "published": "2015-12-03T00:00:00", "title": "FreeBSD : ffmpeg -- multiple vulnerabilities (b0da85af-21a3-4c15-a137-fe9e4bc86002)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-8216", "CVE-2015-8217", "CVE-2015-8363", "CVE-2015-8219", "CVE-2015-8218", "CVE-2015-8365", "CVE-2015-8364", "CVE-2015-6761"], "modified": "2015-12-03T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:ffmpeg26", "p-cpe:/a:freebsd:freebsd:avidemux2", "p-cpe:/a:freebsd:freebsd:ffmpeg-devel", "p-cpe:/a:freebsd:freebsd:libav", "p-cpe:/a:freebsd:freebsd:mythtv-frontend", "p-cpe:/a:freebsd:freebsd:ffmpeg-011", "p-cpe:/a:freebsd:freebsd:ffmpeg25", "p-cpe:/a:freebsd:freebsd:avidemux26", "p-cpe:/a:freebsd:freebsd:mplayer", "p-cpe:/a:freebsd:freebsd:plexhometheater", "cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:avidemux", "p-cpe:/a:freebsd:freebsd:mencoder", "p-cpe:/a:freebsd:freebsd:ffmpeg1", "p-cpe:/a:freebsd:freebsd:ffmpeg2", "p-cpe:/a:freebsd:freebsd:ffmpeg24", "p-cpe:/a:freebsd:freebsd:ffmpeg23", "p-cpe:/a:freebsd:freebsd:mythtv", "p-cpe:/a:freebsd:freebsd:kodi", "p-cpe:/a:freebsd:freebsd:ffmpeg", "p-cpe:/a:freebsd:freebsd:gstreamer-ffmpeg", "p-cpe:/a:freebsd:freebsd:handbrake", "p-cpe:/a:freebsd:freebsd:ffmpeg0"], "id": "FREEBSD_PKG_B0DA85AF21A34C15A137FE9E4BC86002.NASL", "href": "https://www.tenable.com/plugins/nessus/87178", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2020 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(87178);\n script_version(\"2.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2015-6761\", \"CVE-2015-8216\", \"CVE-2015-8217\", \"CVE-2015-8218\", \"CVE-2015-8219\", \"CVE-2015-8363\", \"CVE-2015-8364\", \"CVE-2015-8365\");\n\n script_name(english:\"FreeBSD : ffmpeg -- multiple vulnerabilities (b0da85af-21a3-4c15-a137-fe9e4bc86002)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"NVD reports :\n\nThe update_dimensions function in libavcodec/vp8.c in FFmpeg through\n2.8.1, as used in Google Chrome before 46.0.2490.71 and other\nproducts, relies on a coefficient-partition count during\nmulti-threaded operation, which allows remote attackers to cause a\ndenial of service (race condition and memory corruption) or possibly\nhave unspecified other impact via a crafted WebM file.\n\nThe ljpeg_decode_yuv_scan function in libavcodec/mjpegdec.c in FFmpeg\nbefore 2.8.2 omits certain width and height checks, which allows\nremote attackers to cause a denial of service (out-of-bounds array\naccess) or possibly have unspecified other impact via crafted MJPEG\ndata.\n\nThe ff_hevc_parse_sps function in libavcodec/hevc_ps.c in FFmpeg\nbefore 2.8.2 does not validate the Chroma Format Indicator, which\nallows remote attackers to cause a denial of service (out-of-bounds\narray access) or possibly have unspecified other impact via crafted\nHigh Efficiency Video Coding (HEVC) data.\n\nThe decode_uncompressed function in libavcodec/faxcompr.c in FFmpeg\nbefore 2.8.2 does not validate uncompressed runs, which allows remote\nattackers to cause a denial of service (out-of-bounds array access) or\npossibly have unspecified other impact via crafted CCITT FAX data.\n\nThe init_tile function in libavcodec/jpeg2000dec.c in FFmpeg before\n2.8.2 does not enforce minimum-value and maximum-value constraints on\ntile coordinates, which allows remote attackers to cause a denial of\nservice (out-of-bounds array access) or possibly have unspecified\nother impact via crafted JPEG 2000 data.\n\nThe jpeg2000_read_main_headers function in libavcodec/jpeg2000dec.c in\nFFmpeg before 2.6.5, 2.7.x before 2.7.3, and 2.8.x through 2.8.2 does\nnot enforce uniqueness of the SIZ marker in a JPEG 2000 image, which\nallows remote attackers to cause a denial of service (out-of-bounds\nheap-memory access) or possibly have unspecified other impact via a\ncrafted image with two or more of these markers.\n\nInteger overflow in the ff_ivi_init_planes function in\nlibavcodec/ivi.c in FFmpeg before 2.6.5, 2.7.x before 2.7.3, and 2.8.x\nthrough 2.8.2 allows remote attackers to cause a denial of service\n(out-of-bounds heap-memory access) or possibly have unspecified other\nimpact via crafted image dimensions in Indeo Video Interactive data.\n\nThe smka_decode_frame function in libavcodec/smacker.c in FFmpeg\nbefore 2.6.5, 2.7.x before 2.7.3, and 2.8.x through 2.8.2 does not\nverify that the data size is consistent with the number of channels,\nwhich allows remote attackers to cause a denial of service\n(out-of-bounds array access) or possibly have unspecified other impact\nvia crafted Smacker data.\"\n );\n # https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=dabea74d0e82ea80cd344f630497cafcb3ef872c\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?df1a1bd8\"\n );\n # https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=d24888ef19ba38b787b11d1ee091a3d94920c76a\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?863da8c9\"\n );\n # https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=93f30f825c08477fe8f76be00539e96014cc83c8\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f905b5c0\"\n );\n # https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=d4a731b84a08f0f3839eaaaf82e97d8d9c67da46\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?abf9f942\"\n );\n # https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=43492ff3ab68a343c1264801baa1d5a02de10167\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?38aeb8a2\"\n );\n # https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=44a7f17d0b20e6f8d836b2957e3e357b639f19a2\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?83fa2994\"\n );\n # https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=df91aa034b82b77a3c4e01791f4a2b2ff6c82066\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a9020836\"\n );\n # https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=4a9af07a49295e014b059c1ab624c40345af5892\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a67cce36\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://ffmpeg.org/security.html\"\n );\n # https://vuxml.freebsd.org/freebsd/b0da85af-21a3-4c15-a137-fe9e4bc86002.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c18a0e41\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:avidemux\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:avidemux2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:avidemux26\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:ffmpeg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:ffmpeg-011\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:ffmpeg-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:ffmpeg0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:ffmpeg1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:ffmpeg2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:ffmpeg23\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:ffmpeg24\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:ffmpeg25\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:ffmpeg26\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:gstreamer-ffmpeg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:handbrake\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:kodi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:libav\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:mencoder\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:mplayer\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:mythtv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:mythtv-frontend\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:plexhometheater\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/11/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/12/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/12/03\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"libav>=0\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"gstreamer-ffmpeg>=0\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"handbrake<1.2.0\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"ffmpeg>=2.8,1<2.8.3,1\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"ffmpeg<2.7.3,1\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"ffmpeg26<2.6.5\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"ffmpeg25<2.5.9\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"ffmpeg24<2.4.12\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"ffmpeg-devel>=0\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"ffmpeg23>=0\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"ffmpeg2>=0\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"ffmpeg1>=0\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"ffmpeg-011>=0\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"ffmpeg0>=0\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"avidemux<=2.6.11\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"avidemux2<=2.6.11\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"avidemux26<=2.6.11\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"kodi<16.0\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"mplayer<1.1.r20150822_7\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"mencoder<1.1.r20150822_7\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"mythtv<=0.27.5,1\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"mythtv-frontend<=0.27.5,1\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"plexhometheater>=0\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "archlinux": [{"lastseen": "2016-09-02T18:44:43", "bulletinFamily": "unix", "cvelist": ["CVE-2015-6762", "CVE-2015-6760", "CVE-2015-6758", "CVE-2015-6759", "CVE-2015-6756", "CVE-2015-6763", "CVE-2015-6755", "CVE-2015-6757", "CVE-2015-6761"], "description": "- CVE-2015-6755 (cross-origin bypass):\n\nCross-origin bypass in Blink. Credit to Mariusz Mlynski.\n\n- CVE-2015-6756 (use-after-free):\n\nUse-after-free in PDFium.\n\n- CVE-2015-6757 (use-after-free):\n\nUse-after-free in ServiceWorker. Credit to Collin Payne.\n\n- CVE-2015-6758:\n\nBad-cast in PDFium. Credit to Atte Kettunen of OUSPG.\n\n- CVE-2015-6759 (information leakage):\n\nInformation leakage in LocalStorage. Credit to Muneaki Nishimura\n(nishimunea).\n\n- CVE-2015-6760 (improper error handling):\n\nImproper error handling in libANGLE. Credit to lastland.net.\n\n- CVE-2015-6761 (memory corruption):\n\nMemory corruption in FFMpeg. Credit to Aki Helin of OUSPG and anonymous.\n\n- CVE-2015-6762 (cross-origin resource sharing bypass):\n\nCORS bypass via CSS fonts. Credit to Muneaki Nishimura (nishimunea).\n\n- CVE-2015-6763:\n\nVarious fixes from internal audits, fuzzing and other initiatives.", "modified": "2015-10-14T00:00:00", "published": "2015-10-14T00:00:00", "id": "ASA-201510-8", "href": "https://lists.archlinux.org/pipermail/arch-security/2015-October/000410.html", "type": "archlinux", "title": "chromium: multiple issues", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2016-09-02T18:44:44", "bulletinFamily": "unix", "cvelist": ["CVE-2015-6764", "CVE-2015-8027"], "description": "- CVE-2015-6764 (V8 out-of-bounds access vulnerability):\n\nA bug was discovered in V8's implementation of JSON.stringify() that can\nresult in out-of-bounds reads on arrays. The patch was included in this\nweek's update of Chrome Stable. While this bug is high severity for\nbrowsers, it is considered lower risk for Node.js users as it requires\nthe execution of third-party JavaScript within an application in order\nto be exploitable.\n\nNode.js users who expose services that process untrusted user-supplied\nJavaScript are at obvious risk. However, we recommend that all users of\nimpacted versions of Node.js upgrade to the appropriate patched version\nin order to protect against malicious third-party JavaScript that may be\nexecuted within a Node.js process by other means.\n\n- CVE-2015-8027 (denial of service):\n\nThis critical denial of service (DoS) vulnerability impacts all versions\nof v0.12.x through to v5.x, inclusive. The vulnerability was discovered\nby Node.js core team member Fedor Indutny and relates to HTTP\npipelining. Under certain conditions an HTTP socket may no longer have a\nparser associated with it but a pipelined request can trigger a pause or\nresume on the non-existent parser thereby causing an uncaughtException\nto be thrown. As these conditions can be created by an external attacker\nand cause a Node.js service to be shut down we consider this a critical\nvulnerability. It is recommended that users of impacted versions of\nNode.js exposing HTTP services upgrade to the appropriate patched\nversions as soon as practical.", "modified": "2015-12-05T00:00:00", "published": "2015-12-05T00:00:00", "id": "ASA-201512-4", "href": "https://lists.archlinux.org/pipermail/arch-security/2015-December/000462.html", "type": "archlinux", "title": "nodejs: multiple issues", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2016-09-02T18:44:42", "bulletinFamily": "unix", "cvelist": ["CVE-2015-6776", "CVE-2015-6775", "CVE-2015-6766", "CVE-2015-6764", "CVE-2015-6770", "CVE-2015-6781", "CVE-2015-6771", "CVE-2015-6784", "CVE-2015-6774", "CVE-2015-6778", "CVE-2015-6772", "CVE-2015-6767", "CVE-2015-6787", "CVE-2015-6786", "CVE-2015-6780", "CVE-2015-6785", "CVE-2015-6779", "CVE-2015-6768", "CVE-2015-6765", "CVE-2015-6769", "CVE-2015-6773", "CVE-2015-6777", "CVE-2015-6782"], "description": "- CVE-2015-6764:\n\nOut of bounds access in v8. Credit to Guang Gong of Qihoo 360 via pwn2own.\n\n- CVE-2015-6765, CVE-2015-6766, CVE-2015-6767:\n\nUse-after-free in AppCache.\n\n- CVE-2015-6768, CVE-2015-6770, CVE-2015-6772:\n\nCross-origin bypass in DOM. Credit to Mariusz Mlynski.\n\n- CVE-2015-6769:\n\nCross-origin bypass in core. Credit to Mariusz Mlynski.\n\n- CVE-2015-6771:\n\nOut of bounds access in v8.\n\n- CVE-2015-6773:\n\nOut of bounds access in Skia. Credit to cloudfuzzer.\n\n- CVE-2015-6774:\n\nUse-after-free in Extensions.\n\n- CVE-2015-6775:\n\nType confusion in PDFium. Credit to Atte Kettunen of OUSPG.\n\n- CVE-2015-6776:\n\nOut of bounds access in PDFium. Credit to Hanno Böck.\n\n- CVE-2015-6777:\n\nUse-after-free in DOM. Credit to Long Liu of Qihoo 360Vulcan Team.\n\n- CVE-2015-6778:\n\nOut of bounds access in PDFium. Credit to Karl Skomski.\n\n- CVE-2015-6779:\n\nScheme bypass in PDFium. Credit to Til Jasper Ullrich.\n\n- CVE-2015-6780:\n\nUse-after-free in Infobars. Credit to Khalil Zhani.\n\n- CVE-2015-6781:\n\nInteger overflow in Sfntly. Credit to miaubiz.\n\n- CVE-2015-6782:\n\nContent spoofing in Omnibox. Credit to Luan Herrera.\n\n- CVE-2015-6784:\n\nEscaping issue in saved pages. Credit to Inti De Ceukelaire.\n\n- CVE-2015-6785:\n\nWildcard matching issue in CSP. Credit to Michael Ficarra / Shape Security.\n\n- CVE-2015-6786:\n\nScheme bypass in CSP. Credit to Michael Ficarra / Shape Security.\n\n- CVE-2015-6787:\n\nVarious fixes from internal audits, fuzzing and other initiatives.", "modified": "2015-12-02T00:00:00", "published": "2015-12-02T00:00:00", "id": "ASA-201512-1", "href": "https://lists.archlinux.org/pipermail/arch-security/2015-December/000440.html", "type": "archlinux", "title": "chromium: multiple issues", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "freebsd": [{"lastseen": "2019-05-29T18:33:02", "bulletinFamily": "unix", "cvelist": ["CVE-2015-6762", "CVE-2015-6760", "CVE-2015-6758", "CVE-2015-6759", "CVE-2015-6756", "CVE-2015-6763", "CVE-2015-6755", "CVE-2015-6757", "CVE-2015-6761"], "description": "\nGoogle Chrome Releases reports:\n\n24 security fixes in this release, including:\n\n[519558] High CVE-2015-6755: Cross-origin bypass in Blink.\n\t Credit to Mariusz Mlynski.\n[507316] High CVE-2015-6756: Use-after-free in PDFium. Credit\n\t to anonymous.\n[529520] High CVE-2015-6757: Use-after-free in ServiceWorker.\n\t Credit to Collin Payne.\n[522131] High CVE-2015-6758: Bad-cast in PDFium. Credit to Atte\n\t Kettunen of OUSPG.\n[514076] Medium CVE-2015-6759: Information leakage in\n\t LocalStorage. Credit to Muneaki Nishimura (nishimunea).\n[519642] Medium CVE-2015-6760: Improper error handling in\n\t libANGLE. Credit to lastland.net.\n[447860,532967] Medium CVE-2015-6761: Memory corruption in\n\t FFMpeg. Credit to Aki Helin of OUSPG and anonymous.\n[512678] Low CVE-2015-6762: CORS bypass via CSS fonts. Credit\n\t to Muneaki Nishimura (nishimunea).\n [542517] CVE-2015-6763: Various fixes from internal audits,\n\t fuzzing and other initiatives.\nMultiple vulnerabilities in V8 fixed at the tip of the 4.6\n\t branch (currently 4.6.85.23).\n\n\n", "edition": 4, "modified": "2015-10-13T00:00:00", "published": "2015-10-13T00:00:00", "id": "8301C04D-71DF-11E5-9FCB-00262D5ED8EE", "href": "https://vuxml.freebsd.org/freebsd/8301c04d-71df-11e5-9fcb-00262d5ed8ee.html", "title": "chromium -- multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-02-23T12:39:26", "bulletinFamily": "unix", "cvelist": ["CVE-2015-8216", "CVE-2015-8217", "CVE-2015-8363", "CVE-2015-8219", "CVE-2015-8218", "CVE-2015-8365", "CVE-2015-8364", "CVE-2015-6761"], "description": "\nNVD reports:\n\nThe update_dimensions function in libavcodec/vp8.c in\n\t FFmpeg through 2.8.1, as used in Google Chrome before\n\t 46.0.2490.71 and other products, relies on a\n\t coefficient-partition count during multi-threaded operation,\n\t which allows remote attackers to cause a denial of service\n\t (race condition and memory corruption) or possibly have\n\t unspecified other impact via a crafted WebM file.\n\n\nThe ljpeg_decode_yuv_scan function in\n\t libavcodec/mjpegdec.c in FFmpeg before 2.8.2 omits certain\n\t width and height checks, which allows remote attackers to\n\t cause a denial of service (out-of-bounds array access) or\n\t possibly have unspecified other impact via crafted MJPEG\n\t data.\n\n\nThe ff_hevc_parse_sps function in libavcodec/hevc_ps.c in\n\t FFmpeg before 2.8.2 does not validate the Chroma Format\n\t Indicator, which allows remote attackers to cause a denial\n\t of service (out-of-bounds array access) or possibly have\n\t unspecified other impact via crafted High Efficiency Video\n\t Coding (HEVC) data.\n\n\nThe decode_uncompressed function in libavcodec/faxcompr.c\n\t in FFmpeg before 2.8.2 does not validate uncompressed runs,\n\t which allows remote attackers to cause a denial of service\n\t (out-of-bounds array access) or possibly have unspecified\n\t other impact via crafted CCITT FAX data.\n\n\nThe init_tile function in libavcodec/jpeg2000dec.c in\n\t FFmpeg before 2.8.2 does not enforce minimum-value and\n\t maximum-value constraints on tile coordinates, which allows\n\t remote attackers to cause a denial of service (out-of-bounds\n\t array access) or possibly have unspecified other impact via\n\t crafted JPEG 2000 data.\n\n\nThe jpeg2000_read_main_headers function in\n\t libavcodec/jpeg2000dec.c in FFmpeg before 2.6.5, 2.7.x\n\t before 2.7.3, and 2.8.x through 2.8.2 does not enforce\n\t uniqueness of the SIZ marker in a JPEG 2000 image, which\n\t allows remote attackers to cause a denial of service\n\t (out-of-bounds heap-memory access) or possibly have\n\t unspecified other impact via a crafted image with two or\n\t more of these markers.\n\n\nInteger overflow in the ff_ivi_init_planes function in\n\t libavcodec/ivi.c in FFmpeg before 2.6.5, 2.7.x before 2.7.3,\n\t and 2.8.x through 2.8.2 allows remote attackers to cause a\n\t denial of service (out-of-bounds heap-memory access) or\n\t possibly have unspecified other impact via crafted image\n\t dimensions in Indeo Video Interactive data.\n\n\nThe smka_decode_frame function in libavcodec/smacker.c in\n\t FFmpeg before 2.6.5, 2.7.x before 2.7.3, and 2.8.x through\n\t 2.8.2 does not verify that the data size is consistent with\n\t the number of channels, which allows remote attackers to\n\t cause a denial of service (out-of-bounds array access) or\n\t possibly have unspecified other impact via crafted Smacker\n\t data.\n\n", "edition": 8, "modified": "2018-03-25T00:00:00", "published": "2015-11-27T00:00:00", "id": "B0DA85AF-21A3-4C15-A137-FE9E4BC86002", "href": "https://vuxml.freebsd.org/freebsd/b0da85af-21a3-4c15-a137-fe9e4bc86002.html", "title": "ffmpeg -- multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "threatpost": [{"lastseen": "2018-10-06T22:56:10", "bulletinFamily": "info", "cvelist": ["CVE-2015-6755", "CVE-2015-6756", "CVE-2015-6757", "CVE-2015-6758", "CVE-2015-6759", "CVE-2015-6760", "CVE-2015-6761", "CVE-2015-6762"], "description": "Google has made some changes to the way it presents browser warnings in Chrome.\n\nStarting with Chrome 46, don\u2019t expect to see the yellow warning icon on HTTPS pages with minor errors. Google announced on Tuesday that it would start marking those pages with the neutral icon it uses on unencrypted HTTPS pages; the change, it said, will affect HTTPS pages with mixed content.\n\n\u201cSite operators face a dilemma: Switching an HTTP site to HTTPS can initially result in mixed content, which is undesirable in the long term but important for debugging the migration. During this process the site may not be fully secured, but it will usually not be less secure than before,\u201d Lucas Garron and Chris Palmer of the Chrome security team wrote in a [blog post](<https://googleonlinesecurity.blogspot.com/2015/10/simplifying-page-security-icon-in-chrome.html>) yesterday. \u201cRemoving the yellow \u201ccaution triangle\u201d badge means that most users will not perceive a warning on mixed content pages during such a migration. We hope that this will encourage site operators to switch to HTTPS sooner rather than later.\u201d\n\nSecure HTTPS pages will continue to get the green closed padlock icon, while HTTP and HTTPS with errors pages will show a gray neutral icon. Broken HTTPS will remain with the red strikethrough icon.\n\n\u201cWe have to strike a balance: representing the security state of a webpage as accurately as possible, while making sure users are not overwhelmed with too many possible states and details,\u201d Garron and Palmer wrote. \u201cWe\u2019ve come to understand that our yellow \u201ccaution triangle\u201d badge can be confusing when compared to the HTTP page icon, and we believe that it is better not to emphasize the difference in security between these two states to most users.\u201d\n\nChrome 46 also includes [24 security fixes](<http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html>) that were also announced yesterday, including eight from external sources that earned bounties ranging from $8837 to $500.\n\nThe bugs that earned bounties are:\n\n[$8837][519558] High CVE-2015-6755: Cross-origin bypass in Blink. Credit to Mariusz Mlynski.\n\n[$6337][507316] High CVE-2015-6756: Use-after-free in PDFium. Credit to anonymous.\n\n[$3500][529520] High CVE-2015-6757: Use-after-free in ServiceWorker. Credit to Collin Payne.\n\n[$3000][522131] High CVE-2015-6758: Bad-cast in PDFium. Credit to Atte Kettunen of OUSPG.\n\n[$1000][514076] Medium CVE-2015-6759: Information leakage in LocalStorage. Credit to Muneaki Nishimura (nishimunea).\n\n[$1000][519642] Medium CVE-2015-6760: Improper error handling in libANGLE. Credit to lastland.net.\n\n[$500][447860 & 532967] Medium CVE-2015-6761: Memory corruption in FFMpeg. Credit to Aki Helin of OUSPG and anonymous.\n\n[$500][512678] Low CVE-2015-6762: CORS bypass via CSS fonts. Credit to Muneaki Nishimura (nishimunea).\n", "modified": "2015-10-14T18:28:19", "published": "2015-10-14T14:28:19", "id": "THREATPOST:C51401709B419BF04B7D260B9F842C61", "href": "https://threatpost.com/google-patches-chrome-changes-mixed-content-warnings/115029/", "type": "threatpost", "title": "Chrome 46 Patches, Mixed Content Warning Changes", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-10-06T22:56:01", "bulletinFamily": "info", "cvelist": ["CVE-2015-6764", "CVE-2015-6765", "CVE-2015-6766", "CVE-2015-6767", "CVE-2015-6768", "CVE-2015-6769", "CVE-2015-6770", "CVE-2015-6771", "CVE-2015-6772", "CVE-2015-6773", "CVE-2015-6774", "CVE-2015-6775", "CVE-2015-6776", "CVE-2015-6777", "CVE-2015-6778", "CVE-2015-6779", "CVE-2015-6780", "CVE-2015-6781", "CVE-2015-6782", "CVE-2015-6783", "CVE-2015-6784", "CVE-2015-6785", "CVE-2015-6786"], "description": "Google announced this week it will end Chrome support for older, 32-bit Linux distributions early next year and will maintain the browser on more popular distributions of the software.\n\nSpecifically Google plans to stop pushing updates and security fixes to those running Chrome on 32-bit Linux, Ubuntu Precise 12.04, and Debian 7. Most computers manufactured in the last 10 years come complete with 64-bit processors, so it\u2019s likely the move has been in the works for some time.\n\nDirk Pranke, a software engineer with Google, explained the company\u2019s plan in a post to Chromium\u2019s [dev mailing group](<https://groups.google.com/a/chromium.org/forum/#!topic/chromium-dev/FoE6sL-p6oU>) on Monday, and confirmed support would end in early March 2016.\n\nPranke clarified that while Google is doing away with Chrome for 32-bit versions of Linux, it won\u2019t entirely spurn the more avid Linux users who run it through their distribution\u2019s software repositories. Pranke claims that Google still plans on supporting the Chromium source code \u2013 upon which Chrome is based \u2013 for 32-bit build configurations on Linux. Pranke is encouraging users who run the Precise version of Ubuntu to upgrade to the more up to date Trusty version.\n\nThe move is the latest by Google to bring Chrome up to date, ensuring it runs on a contemporary, secure platform.\n\nIn November, the company announced it would [end Chrome support for Windows XP, Vista, Mac OS X 10.6, 10.7, and 10.8](<http://chrome.blogspot.com/2015/11/updates-to-chrome-platform-support.html>) in April 2016, because none are actively supported by Microsoft or Apple, and running the browser on any of the operating systems could make users more susceptible to viruses and malware.\n\nGoogle also pushed out the latest stable version of Chrome this week, Chrome 47, addressing 41 security bugs.\n\nThe most pressing issue, a use-after-free bug in AppCache, was branded critical and net one anonymous security researcher $10,000.\n\nThe rest of the vulnerabilities are a collection of cross-origin bypass bugs, overflow bugs, and out of bounds access bugs:\n\n * [$10000] [558589] Critical CVE-2015-6765: Use-after-free in AppCache. Credit to anonymous. \n[$11337] [551044] High CVE-2015-6766: Use-after-free in AppCache. Credit to anonymous. \n[$10000] [554908] High CVE-2015-6767: Use-after-free in AppCache. Credit to anonymous. \n[$8000] [556724] High CVE-2015-6768: Cross-origin bypass in DOM. Credit to Mariusz Mlynski. \n[$7500] [534923] High CVE-2015-6769: Cross-origin bypass in core. Credit to Mariusz Mlynski. \n[$7500] [541206] High CVE-2015-6770: Cross-origin bypass in DOM. Credit to Mariusz Mlynski. \n[$7500] [544991] High CVE-2015-6771: Out of bounds access in v8. Credit to anonymous. \n[$7500] [546545] High CVE-2015-6772: Cross-origin bypass in DOM. Credit to Mariusz Mlynski. \n[$7500] [554946] High CVE-2015-6764: Out of bounds access in v8. Credit to Guang Gong of Qihoo 360 via pwn2own. \n[$5000] [491660] High CVE-2015-6773: Out of bounds access in Skia. Credit to cloudfuzzer. \n[$5000] [549251] High CVE-2015-6774: Use-after-free in Extensions. Credit to anonymous. \n[$3500] [529012] High CVE-2015-6775: Type confusion in PDFium. Credit to Atte Kettunen of OUSPG. \n[$3000] [457480] High CVE-2015-6776: Out of bounds access in PDFium. Credit to Hanno B\u00f6ck. \n[$3000] [544020] High CVE-2015-6777: Use-after-free in DOM. Credit to Long Liu of Qihoo 360Vulcan Team. \n[$2000] [514891] Medium CVE-2015-6778: Out of bounds access in PDFium. Credit to Karl Skomski. \n[$2000] [528505] Medium CVE-2015-6779: Scheme bypass in PDFium. Credit to Til Jasper Ullrich. \n[$1000] [490492] Medium CVE-2015-6780: Use-after-free in Infobars. Credit to Khalil Zhani. \n[$1000] [497302] Medium CVE-2015-6781: Integer overflow in Sfntly. Credit to miaubiz. \n[$1000] [536652] Medium CVE-2015-6782: Content spoofing in Omnibox. Credit to Luan Herrera. \n[$1000] [537205] Medium CVE-2015-6783: Signature validation issue in Android Crazy Linker. Credit to Michal Bednarski. \n[$500] [503217] Low CVE-2015-6784: Escaping issue in saved pages. Credit to Inti De Ceukelaire. \n[$500] [534542] Low CVE-2015-6785: Wildcard matching issue in CSP. Credit to Michael Ficarra / Shape Security. \n[$500] [534570] Low CVE-2015-6786: Scheme bypass in CSP. Credit to Michael Ficarra / Shape Security.\n", "modified": "2015-12-02T16:18:45", "published": "2015-12-02T11:18:45", "id": "THREATPOST:BE11754C207B42C812B42708BCD8C646", "href": "https://threatpost.com/google-ends-chrome-support-on-32-bit-linux-releases-chrome-47/115526/", "type": "threatpost", "title": "Google Plans to End Chrome for 32-bit Linux, Releases Chrome 47", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "ubuntu": [{"lastseen": "2020-07-02T11:36:25", "bulletinFamily": "unix", "cvelist": ["CVE-2015-6762", "CVE-2015-7834", "CVE-2015-6759", "CVE-2015-6763", "CVE-2015-6755", "CVE-2015-6757", "CVE-2015-6761"], "description": "It was discovered that ContainerNode::parserInsertBefore in Blink would \nincorrectly proceed with a DOM tree insertion in some circumstances. If a \nuser were tricked in to opening a specially crafted website, an attacker \ncould potentially exploit this to bypass same origin restrictions. \n(CVE-2015-6755)\n\nA use-after-free was discovered in the service worker implementation in \nChromium. If a user were tricked in to opening a specially crafted \nwebsite, an attacker could potentially exploit this to cause a denial of \nservice via application crash, or execute arbitrary code with the \nprivileges of the user invoking the program. (CVE-2015-6757)\n\nIt was discovered that Blink did not ensure that the origin of \nLocalStorage resources are considered unique. If a user were tricked in to \nopening a specially crafted website, an attacker could potentially exploit \nthis to obtain sensitive information. (CVE-2015-6759)\n\nA race condition and memory corruption was discovered in FFmpeg. If a user \nwere tricked in to opening a specially crafted website, an attacker could \npotentially exploit this to cause a denial of service via renderer crash, \nor execute arbitrary code with the privileges of the sandboxed render \nprocess. (CVE-2015-6761)\n\nIt was discovered that CSSFontFaceSrcValue::fetch in Blink did not use \nCORS in some circumstances. If a user were tricked in to opening a \nspecially crafted website, an attacker could potentially exploit this to \nbypass same origin restrictions. (CVE-2015-6762)\n\nMultiple security issues were discovered in Chromium. If a user were \ntricked in to opening a specially crafted website, an attacker could \npotentially exploit these to read uninitialized memory, cause a denial \nof service via application crash or execute arbitrary code with the \nprivileges of the user invoking the program. (CVE-2015-6763)\n\nMultiple security issues were discovered in V8. If a user were tricked \nin to opening a specially crafted website, an attacker could potentially \nexploit these to read uninitialized memory, cause a denial of service via \nrenderer crash or execute arbitrary code with the privileges of the \nsandboxed render process. (CVE-2015-7834)", "edition": 5, "modified": "2015-10-20T00:00:00", "published": "2015-10-20T00:00:00", "id": "USN-2770-1", "href": "https://ubuntu.com/security/notices/USN-2770-1", "title": "Oxide vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-09T00:33:13", "bulletinFamily": "unix", "cvelist": ["CVE-2015-6762", "CVE-2015-7834", "CVE-2015-6759", "CVE-2015-6763", "CVE-2015-6755", "CVE-2015-6757", "CVE-2015-6761"], "description": "USN-2770-1 fixed vulnerabilities in Oxide in Ubuntu 14.04 LTS and Ubuntu \n15.04. This update provides the corresponding updates for Ubuntu 15.10.\n\nOriginal advisory details:\n\nIt was discovered that ContainerNode::parserInsertBefore in Blink would \nincorrectly proceed with a DOM tree insertion in some circumstances. If a \nuser were tricked in to opening a specially crafted website, an attacker \ncould potentially exploit this to bypass same origin restrictions. \n(CVE-2015-6755)\n\nA use-after-free was discovered in the service worker implementation in \nChromium. If a user were tricked in to opening a specially crafted \nwebsite, an attacker could potentially exploit this to cause a denial of \nservice via application crash, or execute arbitrary code with the \nprivileges of the user invoking the program. (CVE-2015-6757)\n\nIt was discovered that Blink did not ensure that the origin of \nLocalStorage resources are considered unique. If a user were tricked in to \nopening a specially crafted website, an attacker could potentially exploit \nthis to obtain sensitive information. (CVE-2015-6759)\n\nA race condition and memory corruption was discovered in FFmpeg. If a user \nwere tricked in to opening a specially crafted website, an attacker could \npotentially exploit this to cause a denial of service via renderer crash, \nor execute arbitrary code with the privileges of the sandboxed render \nprocess. (CVE-2015-6761)\n\nIt was discovered that CSSFontFaceSrcValue::fetch in Blink did not use \nCORS in some circumstances. If a user were tricked in to opening a \nspecially crafted website, an attacker could potentially exploit this to \nbypass same origin restrictions. (CVE-2015-6762)\n\nMultiple security issues were discovered in Chromium. If a user were \ntricked in to opening a specially crafted website, an attacker could \npotentially exploit these to read uninitialized memory, cause a denial \nof service via application crash or execute arbitrary code with the \nprivileges of the user invoking the program. (CVE-2015-6763)\n\nMultiple security issues were discovered in V8. If a user were tricked \nin to opening a specially crafted website, an attacker could potentially \nexploit these to read uninitialized memory, cause a denial of service via \nrenderer crash or execute arbitrary code with the privileges of the \nsandboxed render process. (CVE-2015-7834)", "edition": 5, "modified": "2015-10-22T00:00:00", "published": "2015-10-22T00:00:00", "id": "USN-2770-2", "href": "https://ubuntu.com/security/notices/USN-2770-2", "title": "Oxide vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "securityvulns": [{"lastseen": "2018-08-31T11:11:02", "bulletinFamily": "software", "cvelist": ["CVE-2015-6762", "CVE-2015-6760", "CVE-2015-6758", "CVE-2015-1303", "CVE-2015-6759", "CVE-2015-6756", "CVE-2015-6763", "CVE-2015-6755", "CVE-2015-1304", "CVE-2015-6757", "CVE-2015-6761"], "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA512\r\n\r\n- -------------------------------------------------------------------------\r\nDebian Security Advisory DSA-3376-1 security@debian.org\r\nhttps://www.debian.org/security/ Michael Gilbert\r\nOctober 20, 2015 https://www.debian.org/security/faq\r\n- -------------------------------------------------------------------------\r\n\r\nPackage : chromium-browser\r\nCVE ID : CVE-2015-1303 CVE-2015-1304 CVE-2015-6755 CVE-2015-6756\r\n CVE-2015-6757 CVE-2015-6758 CVE-2015-6759 CVE-2015-6760\r\n CVE-2015-6761 CVE-2015-6762 CVE-2015-6763\r\n\r\nSeveral vulnerabilities have been discovered in the chromium web browser.\r\n\r\nCVE-2015-1303\r\n\r\n Mariusz Mlynski discovered a way to bypass the Same Origin Policy\r\n in the DOM implementation.\r\n\r\nCVE-2015-1304\r\n\r\n Mariusz Mlynski discovered a way to bypass the Same Origin Policy\r\n in the v8 javascript library.\r\n\r\nCVE-2015-6755\r\n\r\n Mariusz Mlynski discovered a way to bypass the Same Origin Policy\r\n in blink/webkit.\r\n\r\nCVE-2015-6756\r\n\r\n A use-after-free issue was found in the pdfium library.\r\n\r\nCVE-2015-6757\r\n\r\n Collin Payne found a use-after-free issue in the ServiceWorker\r\n implementation.\r\n\r\nCVE-2015-6758\r\n\r\n Atte Kettunen found an issue in the pdfium library.\r\n\r\nCVE-2015-6759\r\n\r\n Muneaki Nishimura discovered an information leak.\r\n\r\nCVE-2015-6760\r\n\r\n Ronald Crane discovered a logic error in the ANGLE library\r\n involving lost device events.\r\n\r\nCVE-2015-6761\r\n\r\n Aki Helin and Khalil Zhani discovered a memory corruption issue in\r\n the ffmpeg library.\r\n\r\nCVE-2015-6762\r\n\r\n Muneaki Nishimura discovered a way to bypass the Same Origin Policy\r\n in the CSS implementation.\r\n\r\nCVE-2015-6763\r\n\r\n The chrome 46 development team found and fixed various issues\r\n during internal auditing. Also multiple issues were fixed in\r\n the v8 javascript library, version 4.6.85.23.\r\n\r\nFor the stable distribution (jessie), these problems have been fixed in\r\nversion 46.0.2490.71-1~deb8u1.\r\n\r\nFor the testing (stretch) and unstable (sid) distributions, these\r\nproblems have been fixed in version 46.0.2490.71-1.\r\n\r\nWe recommend that you upgrade your chromium-browser packages.\r\n\r\nFurther information about Debian Security Advisories, how to apply\r\nthese updates to your system and frequently asked questions can be\r\nfound at: https://www.debian.org/security/\r\n\r\nMailing list: debian-security-announce@lists.debian.org\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1\r\n\r\niQQcBAEBCgAGBQJWJwEHAAoJELjWss0C1vRzawcf/2VLLVk0XIIvX6TajYjXf+O+\r\nMFWcbB/EVhdMcF3JTekflcv/LRbYq2TnqWPb0W/AM7hOCWbk4mgD6stbe7l/j2QW\r\n0o3FZkL7pCJL72kvXPxGdvHFs+Qhemrd8AAS9nIqWnqGGcTSC2IdFOLEXec77an7\r\npvQCjT6g/gBb2ywbip7Pv9G3n6oMGTwcBAklm+7So6OjZZpcFrfEqkv8a9zgqH6B\r\niSaoMws7iYaBisKn/5ot91lLbDIuRkSX8RfbG7b6s2v9WiN8bzPZUUJYpsBxf7m/\r\nBY7bZYqpMhjDOEMQJ8NedgHnLabjpBXJi7gn444eHS9VGDgEBtduCJhUQ7oqq/Bl\r\nPEZdBardMDwmV/DSDKGH0WHsAzmDInk5Bd9/yqNspIl0azYaEownEg5mQeU06G3Z\r\noIXX6l+hYzMRrLPEachAdHUyz7PhYU9X5uPUDtpkaGuJsylh2vyW5pGTumhdf/nt\r\nae6VRy5p57HD7atQc+lesNUbO5225QFwaBRf3t/e/nHyYWZHZS9hFWyPha1EGpEy\r\nwuYYnjhSTh/kThEjDkROz3ayNod6NRJ8BkUfsgoj+Ui1cUASFdJtih/S2k70YM1e\r\nmvq5P3kHEUrYVvHpM+m9ZyzbwcluQKS4he3WGlSTEAyS8BIoohZb6QQO+lTOYo2/\r\nqjqBYRhe2GMlW8AYynjQsSdQcHpBxX+qH4kS5+C5swH7c7NogZo7KWdPENW8LQgP\r\nirXB/u+RMbje5X3Qec/pG85vX196r+UUUQNV2ZFIlXbqgKGHWEeJ3+cNulJE2xet\r\nXI5pthBmzxEG0Xpw2OOkjkpRg0W7C0QBlNRbCqsk6KhobhxapoqNmkb2BTxbAs8r\r\nwqrL8R+c0JM0dYH+PuZeZmOyL3XJxHU9cCJUn2f0oCrBKLLSG9gj0v1a5ntqSEjH\r\nA00PXcXq8IXXnIu+xXe6fU3RxcVY0YykKkZKkh003gRItOC45PBP3/gu3KRStNpB\r\nzz4iL2jq4uwEPPgWAGS9BQrDgWaRxDnJPuF0C+uwfdTPLclHSKLewWbgH2zPa5ff\r\nXV60fxw6PM3VyGO1lCfEOVoHHt1jtN9JlM14SuNLaC+y/jFqcVVJJOdqGKAjAqNk\r\nO7fep+G46EPkpy9zTeM+CuekDdU8lClq8caLEC03zQK0C+0QA50zCRxJ6yBzpr8+\r\nDstSjRoqCJLPbFTpHtMK9MEcEXXOyw+9d7/wF9sexNMhq0ONGs0KNFPb+H4dSG+A\r\nLeYtlrgELMQYhWq2y4CB/5EKlljDY99axy/HyICfaRejcTPs6a6x7+vyrcoCcAAm\r\nCo9vSkn7QQJKB942+uOPmcd9bjDhboLrBARbN8q4Rk0tYMYUqa2mwnyYAnSq1xE=\r\n=OCPh\r\n-----END PGP SIGNATURE-----\r\n\r\n", "edition": 1, "modified": "2015-10-25T00:00:00", "published": "2015-10-25T00:00:00", "id": "SECURITYVULNS:DOC:32571", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:32571", "title": "[SECURITY] [DSA 3376-1] chromium-browser security update", "type": "securityvulns", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:02", "bulletinFamily": "software", "cvelist": ["CVE-2015-6762", "CVE-2015-6760", "CVE-2015-6758", "CVE-2015-1303", "CVE-2015-6759", "CVE-2015-6756", "CVE-2015-6763", "CVE-2015-6755", "CVE-2015-1304", "CVE-2015-6757", "CVE-2015-6761"], "description": "Restrictions bypass, memory corruptions, information disclosure.", "edition": 1, "modified": "2015-10-25T00:00:00", "published": "2015-10-25T00:00:00", "id": "SECURITYVULNS:VULN:14737", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:14737", "title": "Google Chrome / Chromium / Oxide multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "debian": [{"lastseen": "2020-08-12T00:57:25", "bulletinFamily": "unix", "cvelist": ["CVE-2015-6762", "CVE-2015-6760", "CVE-2015-6758", "CVE-2015-1303", "CVE-2015-6759", "CVE-2015-6756", "CVE-2015-6763", "CVE-2015-6755", "CVE-2015-1304", "CVE-2015-6757", "CVE-2015-6761"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3376-1 security@debian.org\nhttps://www.debian.org/security/ Michael Gilbert\nOctober 20, 2015 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : chromium-browser\nCVE ID : CVE-2015-1303 CVE-2015-1304 CVE-2015-6755 CVE-2015-6756\n CVE-2015-6757 CVE-2015-6758 CVE-2015-6759 CVE-2015-6760\n CVE-2015-6761 CVE-2015-6762 CVE-2015-6763\n\nSeveral vulnerabilities have been discovered in the chromium web browser.\n\nCVE-2015-1303\n\n Mariusz Mlynski discovered a way to bypass the Same Origin Policy\n in the DOM implementation.\n\nCVE-2015-1304\n\n Mariusz Mlynski discovered a way to bypass the Same Origin Policy\n in the v8 javascript library.\n\nCVE-2015-6755\n\n Mariusz Mlynski discovered a way to bypass the Same Origin Policy\n in blink/webkit.\n\nCVE-2015-6756\n\n A use-after-free issue was found in the pdfium library.\n\nCVE-2015-6757\n\n Collin Payne found a use-after-free issue in the ServiceWorker\n implementation.\n\nCVE-2015-6758\n\n Atte Kettunen found an issue in the pdfium library.\n\nCVE-2015-6759\n\n Muneaki Nishimura discovered an information leak.\n\nCVE-2015-6760\n\n Ronald Crane discovered a logic error in the ANGLE library\n involving lost device events.\n\nCVE-2015-6761\n\n Aki Helin and Khalil Zhani discovered a memory corruption issue in\n the ffmpeg library.\n\nCVE-2015-6762\n\n Muneaki Nishimura discovered a way to bypass the Same Origin Policy\n in the CSS implementation.\n\nCVE-2015-6763\n\n The chrome 46 development team found and fixed various issues\n during internal auditing. Also multiple issues were fixed in\n the v8 javascript library, version 4.6.85.23.\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 46.0.2490.71-1~deb8u1.\n\nFor the testing (stretch) and unstable (sid) distributions, these\nproblems have been fixed in version 46.0.2490.71-1.\n\nWe recommend that you upgrade your chromium-browser packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 8, "modified": "2015-10-21T03:52:32", "published": "2015-10-21T03:52:32", "id": "DEBIAN:DSA-3376-1:92CEB", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2015/msg00275.html", "title": "[SECURITY] [DSA 3376-1] chromium-browser security update", "type": "debian", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-11T01:29:55", "bulletinFamily": "unix", "cvelist": ["CVE-2015-8216", "CVE-2015-6826", "CVE-2015-8217", "CVE-2015-8363", "CVE-2016-10191", "CVE-2015-6820", "CVE-2015-6824", "CVE-2015-6818", "CVE-2015-6822", "CVE-2015-6823", "CVE-2016-10190", "CVE-2015-8663", "CVE-2015-6825", "CVE-2014-9317", "CVE-2015-8364", "CVE-2015-8662", "CVE-2015-6821", "CVE-2015-8661", "CVE-2015-6761"], "description": "Package : libav\nVersion : 6:11.12-1~deb8u2\nCVE ID : CVE-2014-9317 CVE-2015-6761 CVE-2015-6818 CVE-2015-6820 \n CVE-2015-6821 CVE-2015-6822\n CVE-2015-6825 CVE-2015-6826 CVE-2015-8216 CVE-2015-8217 \n CVE-2015-8363 CVE-2015-8364 CVE-2015-8661 CVE-2015-8662 \n CVE-2015-8663 CVE-2016-10190 CVE-2016-10191\n\n\nSeveral security issues have been corrected in multiple demuxers and\ndecoders of the libav multimedia library.\n\nCVE-2014-9317\n\n The decode_ihdr_chunk function in libavcodec/pngdec.c allowed remote\n attackers to cause a denial of service (out-of-bounds heap access)\n and possibly had other unspecified impact via an IDAT before an IHDR\n in a PNG file. The issue got addressed by checking IHDR/IDAT order.\n\nCVE-2015-6761\n\n The update_dimensions function in libavcodec/vp8.c in libav relies on\n a coefficient-partition count during multi-threaded operation, which\n allowed remote attackers to cause a denial of service (race condition\n and memory corruption) or possibly have unspecified other impact via\n a crafted WebM file. This issue has been resolved by using\n num_coeff_partitions in thread/buffer setup. The variable is not a\n constant and can lead to race conditions.\n\nCVE-2015-6818\n\n The decode_ihdr_chunk function in libavcodec/pngdec.c did not enforce\n uniqueness of the IHDR (aka image header) chunk in a PNG image, which\n allowed remote attackers to cause a denial of service (out-of-bounds\n array access) or possibly have unspecified other impact via a crafted\n image with two or more of these chunks. This has now been fixed by\n only allowing one IHDR chunk. Multiple IHDR chunks are forbidden in\n PNG.\n\nCVE-2015-6820\n\n The ff_sbr_apply function in libavcodec/aacsbr.c did not check for a\n matching AAC frame syntax element before proceeding with Spectral\n Band Replication calculations, which allowed remote attackers to\n cause a denial of service (out-of-bounds array access) or possibly\n have unspecified other impact via crafted AAC data. This has now been\n fixed by checking that the element type matches before applying SBR.\n\nCVE-2015-6821\n\n The ff_mpv_common_init function in libavcodec/mpegvideo.c did not\n properly maintain the encoding context, which allowed remote\n attackers to cause a denial of service (invalid pointer access) or\n possibly have unspecified other impact via crafted MPEG data. The\n issue has been resolved by clearing pointers in ff_mpv_common_init().\n This ensures that no stale pointers leak through on any path.\n\nCVE-2015-6822\n\n The destroy_buffers function in libavcodec/sanm.c did not properly\n maintain height and width values in the video context, which allowed\n remote attackers to cause a denial of service (segmentation violation\n and application crash) or possibly have unspecified other impact via\n crafted LucasArts Smush video data. The solution to this was to reset\n sizes in destroy_buffers() in avcodec/sanm.c.\n\nCVE-2015-6823\n\n Other than stated in the debian/changelog file, this issue\n has not yet been fixed for libav in Debian jessie LTS.\n\nCVE-2015-6824\n\n Other than stated in the debian/changelog file, this issue\n has not yet been fixed for libav in Debian jessie LTS.\n\nCVE-2015-6825\n\n The ff_frame_thread_init function in libavcodec/pthread_frame.c\n mishandled certain memory-allocation failures, which allowed remote\n attackers to cause a denial of service (invalid pointer access) or\n possibly have unspecified other impact via a crafted file, as\n demonstrated by an AVI file. Clearing priv_data in\n avcodec/pthread_frame.c has resolved this and now avoids stale\n pointer in error case.\n\nCVE-2015-6826\n\n The ff_rv34_decode_init_thread_copy function in libavcodec/rv34.c did\n not initialize certain structure members, which allowed remote\n attackers to cause a denial of service (invalid pointer access) or\n possibly have unspecified other impact via crafted (1) RV30 or (2)\n RV40 RealVideo data. This issue got addressed by clearing pointers in\n ff_rv34_decode_init_thread_copy() in avcodec/rv34.c, which avoids\n leaving stale pointers.\n\nCVE-2015-8216\n\n The ljpeg_decode_yuv_scan function in libavcodec/mjpegdec.c in FFmpeg\n omitted certain width and height checks, which allowed remote\n attackers to cause a denial of service (out-of-bounds array access)\n or possibly have unspecified other impact via crafted MJPEG data. The\n issues have been fixed by adding a check for index to\n avcodec/mjpegdec.c in ljpeg_decode_yuv_scan() before using it, which\n fixes an out of array access.\n\nCVE-2015-8217\n\n The ff_hevc_parse_sps function in libavcodec/hevc_ps.c did not\n validate the Chroma Format Indicator, which allowed remote attackers\n to cause a denial of service (out-of-bounds array access) or possibly\n have unspecified other impact via crafted High Efficiency Video\n Coding (HEVC) data. A check of chroma_format_idc in avcodec/hevc_ps.c\n has now been added to fix this out of array access.\n\nCVE-2015-8363\n\n The jpeg2000_read_main_headers function in libavcodec/jpeg2000dec.c\n did not enforce uniqueness of the SIZ marker in a JPEG 2000 image,\n which allowed remote attackers to cause a denial of service\n (out-of-bounds heap-memory access) or possibly have unspecified other\n impact via a crafted image with two or more of these markers. In\n avcodec/jpeg2000dec.c a check for duplicate SIZ marker has been added\n to fix this.\n\nCVE-2015-8364\n\n Integer overflow in the ff_ivi_init_planes function in\n libavcodec/ivi.c allowed remote attackers to cause a denial of\n service (out-of-bounds heap-memory access) or possibly have\n unspecified other impact via crafted image dimensions in Indeo Video\n Interactive data. A check of image dimensions has been added to the\n code (in avcodec/ivi.c) that fixes this integer overflow now.\n\nCVE-2015-8661\n\n The h264_slice_header_init function in libavcodec/h264_slice.c did\n not validate the relationship between the number of threads and the\n number of slices, which allowed remote attackers to cause a denial of\n service (out-of-bounds array access) or possibly have unspecified\n other impact via crafted H.264 data. In avcodec/h264_slice.c now\n max_contexts gets limited when slice_context_count is initialized.\n This avoids an out of array access.\n\nCVE-2015-8662\n\n The ff_dwt_decode function in libavcodec/jpeg2000dwt.c did not\n validate the number of decomposition levels before proceeding with\n Discrete Wavelet Transform decoding, which allowed remote attackers\n to cause a denial of service (out-of-bounds array access) or possibly\n have unspecified other impact via crafted JPEG 2000 data. In\n avcodec/jpeg2000dwt.c a check of ndeclevels has been added before\n calling dwt_decode*(). This fixes an out of array access.\n\nCVE-2015-8663\n\n The ff_get_buffer function in libavcodec/utils.c preserved width and\n height values after a failure, which allowed remote attackers to\n cause a denial of service (out-of-bounds array access) or possibly\n have unspecified other impact via a crafted .mov file. Now,\n dimensions get cleared in ff_get_buffer() on failure, which fixes\n the cause for an out of array access.\n\nCVE-2016-10190\n\n A heap-based buffer overflow in libavformat/http.c allowed remote web\n servers to execute arbitrary code via a negative chunk size in an\n HTTP response. In libavformat/http.c the length/offset-related\n variables have been made unsigned. This fix required inclusion of\n two other changes ported from ffmpeg upstream Git (commits 3668701f\n and 362c17e6).\n\nCVE-2016-10191\n\n Another heap-based buffer overflow in libavformat/rtmppkt.c allowed\n remote attackers to execute arbitrary code by leveraging failure to\n check for RTMP packet size mismatches. By checking for packet size\n mismatched, this out of array access has been resolved.\n\nFor Debian 8 "Jessie", these problems have been fixed in version\n6:11.12-1~deb8u2.\n\nWe recommend that you upgrade your libav packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n\n-- \n\nmike gabriel aka sunweaver (Debian Developer)\nfon: +49 (1520) 1976 148\n\nGnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22 0782 9AF4 6B30 2577 1B31\nmail: sunweaver@debian.org, http://sunweavers.net\n", "edition": 8, "modified": "2018-12-20T21:52:50", "published": "2018-12-20T21:52:50", "id": "DEBIAN:DLA-1611-1:76FB2", "href": "https://lists.debian.org/debian-lts-announce/2018/debian-lts-announce-201812/msg00009.html", "title": "[SECURITY] [DLA 1611-1] libav security update", "type": "debian", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-08-12T01:00:43", "bulletinFamily": "unix", "cvelist": ["CVE-2015-6776", "CVE-2015-6775", "CVE-2015-6766", "CVE-2015-6764", "CVE-2015-6770", "CVE-2015-6781", "CVE-2015-6771", "CVE-2015-6784", "CVE-2015-6774", "CVE-2015-6778", "CVE-2015-6772", "CVE-2015-1302", "CVE-2015-6767", "CVE-2015-6786", "CVE-2015-6780", "CVE-2015-6785", "CVE-2015-6779", "CVE-2015-6768", "CVE-2015-6765", "CVE-2015-6769", "CVE-2015-6773", "CVE-2015-6777", "CVE-2015-6782"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3415-1 security@debian.org\nhttps://www.debian.org/security/ Michael Gilbert\nDecember 09, 2015 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : chromium-browser\nCVE ID : CVE-2015-1302 CVE-2015-6764 CVE-2015-6765 CVE-2015-6766\n CVE-2015-6767 CVE-2015-6768 CVE-2015-6769 CVE-2015-6770\n CVE-2015-6771 CVE-2015-6772 CVE-2015-6773 CVE-2015-6774\n CVE-2015-6775 CVE-2015-6776 CVE-2015-6777 CVE-2015-6778\n CVE-2015-6779 CVE-2015-6780 CVE-2015-6781 CVE-2015-6782\n CVE-2015-6784 CVE-2015-6785 CVE-2015-6786\n\nSeveral vulnerabilities have been discovered in the chromium web browser.\n\nCVE-2015-1302\n\n Rub Wu discovered an information leak in the pdfium library.\n\nCVE-2015-6764\n\n Guang Gong discovered an out-of-bounds read issue in the v8\n javascript library.\n\nCVE-2015-6765\n\n A use-after-free issue was discovered in AppCache.\n\nCVE-2015-6766\n\n A use-after-free issue was discovered in AppCache.\n\nCVE-2015-6767\n\n A use-after-free issue was discovered in AppCache.\n\nCVE-2015-6768\n\n Mariusz Mlynski discovered a way to bypass the Same Origin\n Policy.\n\nCVE-2015-6769\n\n Mariusz Mlynski discovered a way to bypass the Same Origin\n Policy.\n\nCVE-2015-6770\n\n Mariusz Mlynski discovered a way to bypass the Same Origin\n Policy.\n\nCVE-2015-6771\n\n An out-of-bounds read issue was discovered in the v8\n javascript library.\n\nCVE-2015-6772\n\n Mariusz Mlynski discovered a way to bypass the Same Origin\n Policy.\n\nCVE-2015-6773\n\n cloudfuzzer discovered an out-of-bounds read issue in the\n skia library.\n\nCVE-2015-6774\n\n A use-after-free issue was found in extensions binding.\n\nCVE-2015-6775\n\n Atte Kettunen discovered a type confusion issue in the pdfium\n library.\n\nCVE-2015-6776\n\n Hanno B\u00c3\u00b6ck dicovered and out-of-bounds access issue in the\n openjpeg library, which is used by pdfium.\n\nCVE-2015-6777\n\n Long Liu found a use-after-free issue.\n\nCVE-2015-6778\n\n Karl Skomski found an out-of-bounds read issue in the pdfium\n library.\n\nCVE-2015-6779\n\n Til Jasper Ullrich discovered that the pdfium library does\n not sanitize "chrome:" URLs.\n\nCVE-2015-6780\n\n Khalil Zhani discovered a use-after-free issue.\n\nCVE-2015-6781\n\n miaubiz discovered an integer overflow issue in the sfntly\n library.\n\nCVE-2015-6782\n\n Luan Herrera discovered a URL spoofing issue.\n\nCVE-2015-6784\n\n Inti De Ceukelaire discovered a way to inject HTML into\n serialized web pages.\n\nCVE-2015-6785\n\n Michael Ficarra discovered a way to bypass the Content\n Security Policy.\n\nCVE-2015-6786\n\n Michael Ficarra discovered another way to bypass the Content\n Security Policy.\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 47.0.2526.73-1~deb8u1.\n\nFor the testing distribution (stretch), these problems will be fixed soon.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 47.0.2526.73-1.\n\nWe recommend that you upgrade your chromium-browser packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 8, "modified": "2015-12-10T02:37:57", "published": "2015-12-10T02:37:57", "id": "DEBIAN:DSA-3415-1:E369A", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2015/msg00320.html", "title": "[SECURITY] [DSA 3415-1] chromium-browser security update", "type": "debian", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "cve": [{"lastseen": "2021-02-02T06:21:28", "description": "The update_dimensions function in libavcodec/vp8.c in FFmpeg through 2.8.1, as used in Google Chrome before 46.0.2490.71 and other products, relies on a coefficient-partition count during multi-threaded operation, which allows remote attackers to cause a denial of service (race condition and memory corruption) or possibly have unspecified other impact via a crafted WebM file.", "edition": 6, "cvss3": {}, "published": "2015-10-15T10:59:00", "title": "CVE-2015-6761", "type": "cve", "cwe": ["CWE-362"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-6761"], "modified": "2018-12-21T11:29:00", "cpe": ["cpe:/a:google:chrome:45.0.2454.101", "cpe:/a:ffmpeg:ffmpeg:2.8.1"], "id": "CVE-2015-6761", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-6761", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:ffmpeg:ffmpeg:2.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:45.0.2454.101:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:21:28", "description": "The Image11::map function in renderer/d3d/d3d11/Image11.cpp in libANGLE, as used in Google Chrome before 46.0.2490.71, mishandles mapping failures after device-lost events, which allows remote attackers to cause a denial of service (invalid read or write) or possibly have unspecified other impact via vectors involving a removed device.", "edition": 6, "cvss3": {}, "published": "2015-10-15T10:59:00", "title": "CVE-2015-6760", "type": "cve", "cwe": ["CWE-17"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-6760"], "modified": "2016-12-24T02:59:00", "cpe": ["cpe:/a:google:chrome:45.0.2454.101"], "id": "CVE-2015-6760", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-6760", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:google:chrome:45.0.2454.101:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:21:30", "description": "Multiple unspecified vulnerabilities in Google V8 before 4.6.85.23, as used in Google Chrome before 46.0.2490.71, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "edition": 6, "cvss3": {}, "published": "2015-10-15T10:59:00", "title": "CVE-2015-7834", "type": "cve", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-7834"], "modified": "2016-12-24T02:59:00", "cpe": ["cpe:/a:google:chrome:45.0.2454.101", "cpe:/a:google:v8:4.6.85.22"], "id": "CVE-2015-7834", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7834", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:google:v8:4.6.85.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:45.0.2454.101:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:21:28", "description": "The CSSFontFaceSrcValue::fetch function in core/css/CSSFontFaceSrcValue.cpp in the Cascading Style Sheets (CSS) implementation in Blink, as used in Google Chrome before 46.0.2490.71, does not use the CORS cross-origin request algorithm when a font's URL appears to be a same-origin URL, which allows remote web servers to bypass the Same Origin Policy via a redirect.", "edition": 6, "cvss3": {}, "published": "2015-10-15T10:59:00", "title": "CVE-2015-6762", "type": "cve", "cwe": ["CWE-254"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-6762"], "modified": "2016-12-24T02:59:00", "cpe": ["cpe:/a:google:chrome:45.0.2454.101"], "id": "CVE-2015-6762", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-6762", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:google:chrome:45.0.2454.101:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:21:28", "description": "Use-after-free vulnerability in content/browser/service_worker/embedded_worker_instance.cc in the ServiceWorker implementation in Google Chrome before 46.0.2490.71 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging object destruction in a callback.\n<a href=\"http://cwe.mitre.org/data/definitions/416.html\">CWE-416: Use After Free</a>", "edition": 6, "cvss3": {}, "published": "2015-10-15T10:59:00", "title": "CVE-2015-6757", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-6757"], "modified": "2016-12-24T02:59:00", "cpe": ["cpe:/a:google:chrome:45.0.2454.101"], "id": "CVE-2015-6757", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-6757", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:google:chrome:45.0.2454.101:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:21:28", "description": "Use-after-free vulnerability in the CPDFSDK_PageView implementation in fpdfsdk/src/fsdk_mgr.cpp in PDFium, as used in Google Chrome before 46.0.2490.71, allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by leveraging mishandling of a focused annotation in a PDF document.\n<a href=\"http://cwe.mitre.org/data/definitions/416.html\">CWE-416: Use After Free</a>", "edition": 6, "cvss3": {}, "published": "2015-10-15T10:59:00", "title": "CVE-2015-6756", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-6756"], "modified": "2016-12-24T02:59:00", "cpe": ["cpe:/a:google:chrome:45.0.2454.101"], "id": "CVE-2015-6756", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-6756", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:google:chrome:45.0.2454.101:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:21:28", "description": "The CPDF_Document::GetPage function in fpdfapi/fpdf_parser/fpdf_parser_document.cpp in PDFium, as used in Google Chrome before 46.0.2490.71, does not properly perform a cast of a dictionary object, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document.", "edition": 6, "cvss3": {}, "published": "2015-10-15T10:59:00", "title": "CVE-2015-6758", "type": "cve", "cwe": ["CWE-17"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-6758"], "modified": "2016-12-24T02:59:00", "cpe": ["cpe:/a:google:chrome:45.0.2454.101"], "id": "CVE-2015-6758", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-6758", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:google:chrome:45.0.2454.101:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:21:28", "description": "The ContainerNode::parserInsertBefore function in core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 46.0.2490.71, proceeds with a DOM tree insertion in certain cases where a parent node no longer contains a child node, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code.", "edition": 6, "cvss3": {}, "published": "2015-10-15T10:59:00", "title": "CVE-2015-6755", "type": "cve", "cwe": ["CWE-264"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-6755"], "modified": "2016-12-24T02:59:00", "cpe": ["cpe:/a:google:chrome:45.0.2454.101"], "id": "CVE-2015-6755", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-6755", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:google:chrome:45.0.2454.101:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:21:28", "description": "The BasicJsonStringifier::SerializeJSArray function in json-stringifier.h in the JSON stringifier in Google V8, as used in Google Chrome before 47.0.2526.73, improperly loads array elements, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via crafted JavaScript code.", "edition": 6, "cvss3": {}, "published": "2015-12-06T01:59:00", "title": "CVE-2015-6764", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-6764"], "modified": "2017-09-14T01:29:00", "cpe": ["cpe:/a:google:chrome:46.0.2490.86"], "id": "CVE-2015-6764", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-6764", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:google:chrome:46.0.2490.86:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:21:28", "description": "Multiple unspecified vulnerabilities in Google Chrome before 46.0.2490.71 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "edition": 6, "cvss3": {}, "published": "2015-10-15T10:59:00", "title": "CVE-2015-6763", "type": "cve", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-6763"], "modified": "2017-09-13T01:29:00", "cpe": ["cpe:/a:google:chrome:45.0.2454.101"], "id": "CVE-2015-6763", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-6763", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:google:chrome:45.0.2454.101:*:*:*:*:*:*:*"]}], "seebug": [{"lastseen": "2017-11-19T11:58:05", "description": "#### VULNERABILITY DETAILS\n\nFrom /WebKit/Source/core/dom/ContainerNode.cpp:\n\n`` void ContainerNode::parserInsertBefore(PassRefPtrWillBeRawPtr newChild, Node& nextChild) { (...) while (RefPtrWillBeRawPtr parent = newChild->parentNode()) parent->parserRemoveChild(*newChild);\n \n \n if (document() != newChild->document())\n document(). adoptNode(newChild. get(), ASSERT_NO_EXCEPTION);\n \n {\n EventDispatchForbiddenScope assertNoEventDispatch;\n ScriptForbiddenScope forbidScript;\n \n treeScope(). adoptIfNeeded(*newChild);\n insertBeforeCommon(nextChild, *newChild);\n newChild->updateAncestorConnectedSubframeCountforinsertion();\n ChildListMutationScope(*this). childAdded(*newChild);\n }\n \n notifyNodeInserted(*newChild, ChildrenChangeSourceParser);\n \n\n} ``\n\n|parserRemoveChild| can run script, and it can remove |nextChild| from the DOM or move the node around. When this happens, the tree will be in an inconsistent state after the |insertBeforeCommon| call, allowing an attacker to bypass the frame restrictions.\n\n#### VERSION\n\nChrome 44.0.2403.130 (Stable) \nChrome 45.0.2454.26 (Beta) \nChrome 46.0.2471.2 (Dev) \nChromium 46.0.2480.0 (Release build compiled today)\n\nAttachment: [CVE-2015-6755](<http://paper.seebug.org/papers/Archive/poc/CVE-2015-6755.zip>)\n", "published": "2017-04-24T00:00:00", "type": "seebug", "title": "Chrome Universal XSS via ContainerNode::parserInsertBefore (CVE-2015-6755)", "bulletinFamily": "exploit", "cvelist": ["CVE-2015-6755"], "modified": "2017-04-24T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-93035", "id": "SSV:93035", "sourceData": "", "sourceHref": "", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "exploitdb": [{"lastseen": "2016-02-04T08:48:00", "description": "Chrome - open-vcdiff OOB Read in Browser Process Integer Overflow. CVE-2015-6763. Dos exploit for lin_x86 platform", "published": "2015-11-19T00:00:00", "type": "exploitdb", "title": "Chrome - open-vcdiff OOB Read in Browser Process Integer Overflow", "bulletinFamily": "exploit", "cvelist": ["CVE-2015-6763"], "modified": "2015-11-19T00:00:00", "id": "EDB-ID:38763", "href": "https://www.exploit-db.com/exploits/38763/", "sourceData": "Source: https://code.google.com/p/google-security-research/issues/detail?id=513\r\n\r\nThere's an integer overflow issue in sanity checking section lengths when parsing the vcdiff format (used in SDCH content encoding). This results in the parser parsing outside of sane memory bounds when parsing the contents of a vcdiff window - see attached crash PoC.\r\n\r\n(/src/sdch/open-vcdiff/src/headerparser.cc)\r\n\r\nbool VCDiffHeaderParser::ParseSectionLengths(\r\n bool has_checksum,\r\n size_t* add_and_run_data_length,\r\n size_t* instructions_and_sizes_length,\r\n size_t* addresses_length,\r\n VCDChecksum* checksum) {\r\n ParseSize(\"length of data for ADDs and RUNs\", add_and_run_data_length); // <---- user controlled\r\n ParseSize(\"length of instructions section\", instructions_and_sizes_length); // <---- user controlled\r\n ParseSize(\"length of addresses for COPYs\", addresses_length); // <---- user controlled\r\n if (has_checksum) {\r\n ParseChecksum(\"Adler32 checksum value\", checksum);\r\n }\r\n if (RESULT_SUCCESS != return_code_) {\r\n return false;\r\n }\r\n if (!delta_encoding_start_) {\r\n VCD_DFATAL << \"Internal error: VCDiffHeaderParser::ParseSectionLengths \"\r\n \"was called before ParseWindowLengths\" << VCD_ENDL;\r\n return_code_ = RESULT_ERROR;\r\n return false;\r\n }\r\n const size_t delta_encoding_header_length =\r\n UnparsedData() - delta_encoding_start_;\r\n if (delta_encoding_length_ !=\r\n (delta_encoding_header_length +\r\n *add_and_run_data_length +\r\n *instructions_and_sizes_length +\r\n *addresses_length)) { // <---- Integer overflow here (32-bit systems only)\r\n VCD_ERROR << \"The length of the delta encoding does not match \"\r\n \"the size of the header plus the sizes of the data sections\"\r\n << VCD_ENDL;\r\n return_code_ = RESULT_ERROR;\r\n return false;\r\n }\r\n return true;\r\n}\r\n\r\nThese returned lengths are subsequently used to initialise length-checked buffer objects for continuing the parsing (vcdecoder.cc:1024) \r\n\r\nsize_t add_and_run_data_length = 0;\r\n size_t instructions_and_sizes_length = 0;\r\n size_t addresses_length = 0;\r\n if (!header_parser->ParseSectionLengths(has_checksum_,\r\n &add_and_run_data_length,\r\n &instructions_and_sizes_length,\r\n &addresses_length,\r\n &expected_checksum_)) {\r\n return header_parser->GetResult();\r\n }\r\n if (parent_->AllowInterleaved() &&\r\n // snip...\r\n } else {\r\n // If interleaved format is not used, then the whole window contents\r\n // must be available before decoding can begin. If only part of\r\n // the current window is available, then report end of data\r\n // and re-parse the whole header when DecodeChunk() is called again.\r\n if (header_parser->UnparsedSize() < (add_and_run_data_length +\r\n instructions_and_sizes_length +\r\n addresses_length)) {\r\n return RESULT_END_OF_DATA;\r\n }\r\n data_for_add_and_run_.Init(header_parser->UnparsedData(),\r\n add_and_run_data_length);\r\n instructions_and_sizes_.Init(data_for_add_and_run_.End(),\r\n instructions_and_sizes_length); \r\n addresses_for_copy_.Init(instructions_and_sizes_.End(), addresses_length);\r\n\r\nThis issue only affects 32-bit builds, since ParseSize is parsing a positive int32_t; on 64-bit builds it cannot be large enough to wrap a size_t.\r\n\r\nIt's unclear if this is exploitable as a browser-process infoleak; the results of SDCH decoding will be returned to a renderer process, but the way that the returned values are used mean that it is likely that the process will have to survive reads at opposite ends of the address space, which *should* be guaranteed to crash with a 2:2 address space split. It is possible that on 32-bit Windows with a 1:3 address space split this can be survived, or with careful crafting of the input file these reads can be avoided; I've not investigated further at this point.\r\n\r\nIt appears to be necessary to host the PoC on a legitimate domain; as localhost is not supported for SDCH.\r\n\r\nVERSION\r\nChrome Version: 47.0.2499.0\r\nOperating System: Linux x86\r\n\r\nREPRODUCTION CASE\r\nPlease include a demonstration of the security bug, such as an attached\r\nHTML or binary file that reproduces the bug when loaded in Chrome. PLEASE\r\nmake the file as small as possible and remove any content not required to\r\ndemonstrate the bug.\r\n\r\nFOR CRASHES, PLEASE INCLUDE THE FOLLOWING ADDITIONAL INFORMATION\r\nType of crash: browser\r\nCrash State: \r\n\r\neax 0xf9ae8a78\t-106001800\r\necx 0xe7502d43\t-414175933\r\nedx 0x7b83e020\t2072240160\r\nebx 0xf76597a0\t-144336992\r\nesp 0xe75025d0\t0xe75025d0\r\nebp 0xe7502798\t0xe7502798\r\nesi 0x5\t5\r\nedi 0xf9061200\t-117042688\r\neip 0xf1ddebee\t0xf1ddebee <open_vcdiff::VCDiffCodeTableReader::GetNextInstruction(int*, unsigned char*)+94>\r\neflags 0x210a93\t[ CF AF SF IF OF RF ID ]\r\ncs 0x23\t35\r\nss 0x2b\t43\r\nds 0x2b\t43\r\nes 0x2b\t43\r\nfs 0x0\t0\r\ngs 0x63\t99\r\n\r\n=> 0xf1ddebee <open_vcdiff::VCDiffCodeTableReader::GetNextInstruction(int*, unsigned char*)+94>:\tmovzbl (%edx),%ecx\r\n 0xf1ddebf1 <open_vcdiff::VCDiffCodeTableReader::GetNextInstruction(int*, unsigned char*)+97>:\tmov (%edi),%esi\r\n 0xf1ddebf3 <open_vcdiff::VCDiffCodeTableReader::GetNextInstruction(int*, unsigned char*)+99>:\tcmpb $0x0,0x100(%esi,%ecx,1)\r\n 0xf1ddebfb <open_vcdiff::VCDiffCodeTableReader::GetNextInstruction(int*, unsigned char*)+107>:\tje 0xf1ddec06 <open_vcdiff::VCDiffCodeTableReader::GetNextInstruction(int*, unsigned char*)+118>\r\n 0xf1ddebfd <open_vcdiff::VCDiffCodeTableReader::GetNextInstruction(int*, unsigned char*)+109>:\tmovsbl %cl,%edx\r\n\r\n#0 open_vcdiff::VCDiffCodeTableReader::GetNextInstruction (this=0xf9061200, size=0x5, mode=0xf9ae8a78 \" \\340\\203{Ox\\a\\376\\001\") at ../../sdch/open-vcdiff/src/decodetable.cc:78\r\n#1 0xf1ddcab5 in open_vcdiff::VCDiffDeltaFileWindow::DecodeBody (this=0xf90611c4, parseable_chunk=<optimized out>) at ../../sdch/open-vcdiff/src/vcdecoder.cc:1231\r\n#2 0xf1ddbc8b in open_vcdiff::VCDiffDeltaFileWindow::DecodeWindow (this=0xf90611c4, parseable_chunk=0xe75031a8) at ../../sdch/open-vcdiff/src/vcdecoder.cc:1359\r\n#3 0xf1ddb6f0 in open_vcdiff::VCDiffStreamingDecoderImpl::DecodeChunk (this=0xf90611b0, data=<optimized out>, len=<optimized out>, output_string=0x8) at ../../sdch/open-vcdiff/src/vcdecoder.cc:887\r\n#4 0xf1ddd499 in open_vcdiff::VCDiffStreamingDecoder::DecodeChunkToInterface (this=0x8b, data=0xe7503300 \"8\\026B\\367\\030'\\317\", <incomplete sequence \\371\\226>, len=3880792832, output_string=0xf76597a0 <_GLOBAL_OFFSET_TABLE_>) at ../../sdch/open-vcdiff/src/vcdecoder.cc:1393\r\n#5 0xf1d2b17f in DecodeChunk<std::basic_string<char> > (this=0x7b83e020, data=<optimized out>, len=3880791363, output=<optimized out>) at ../../sdch/open-vcdiff/src/google/vcdecoder.h:83\r\n#6 net::SdchFilter::ReadFilteredData (this=0xf9cf26e0, dest_buffer=0xd2ce0000 \"\", dest_len=<optimized out>) at ../../net/filter/sdch_filter.cc:424\r\n#7 0xf1d28990 in net::Filter::ReadData (this=0xf9cf26e0, dest_buffer=0x7b83e020 <error: Cannot access memory at address 0x7b83e020>, dest_len=0xe75033c8) at ../../net/filter/filter.cc:131\r\n#8 0xf1d2895c in net::Filter::ReadData (this=0xfd6b7c00, dest_buffer=<optimized out>, dest_len=0xe75033c8) at ../../net/filter/filter.cc:145\r\n#9 0xf1ca8dde in net::URLRequestJob::ReadFilteredData (this=0xf9891a00, bytes_read=<optimized out>) at ../../net/url_request/url_request_job.cc:673\r\n#10 0xf1ca8c1d in net::URLRequestJob::Read (this=0xf9891a00, buf=<optimized out>, buf_size=<optimized out>, bytes_read=0xe75034fc) at ../../net/url_request/url_request_job.cc:126\r\n\r\nProof of Concept:\r\nhttps://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/38763.zip\r\n\r\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/38763/"}], "zdt": [{"lastseen": "2018-02-07T03:29:50", "edition": 2, "description": "Exploit for linux platform in category dos / poc", "published": "2015-11-20T00:00:00", "type": "zdt", "title": "Chrome - open-vcdiff OOB Read in Browser Process Integer Overflow Exploit", "bulletinFamily": "exploit", "cvelist": ["CVE-2015-6763"], "modified": "2015-11-20T00:00:00", "id": "1337DAY-ID-24590", "href": "https://0day.today/exploit/description/24590", "sourceData": "Source: https://code.google.com/p/google-security-research/issues/detail?id=513\r\n \r\nThere's an integer overflow issue in sanity checking section lengths when parsing the vcdiff format (used in SDCH content encoding). This results in the parser parsing outside of sane memory bounds when parsing the contents of a vcdiff window - see attached crash PoC.\r\n \r\n(/src/sdch/open-vcdiff/src/headerparser.cc)\r\n \r\nbool VCDiffHeaderParser::ParseSectionLengths(\r\n bool has_checksum,\r\n size_t* add_and_run_data_length,\r\n size_t* instructions_and_sizes_length,\r\n size_t* addresses_length,\r\n VCDChecksum* checksum) {\r\n ParseSize(\"length of data for ADDs and RUNs\", add_and_run_data_length); // <---- user controlled\r\n ParseSize(\"length of instructions section\", instructions_and_sizes_length); // <---- user controlled\r\n ParseSize(\"length of addresses for COPYs\", addresses_length); // <---- user controlled\r\n if (has_checksum) {\r\n ParseChecksum(\"Adler32 checksum value\", checksum);\r\n }\r\n if (RESULT_SUCCESS != return_code_) {\r\n return false;\r\n }\r\n if (!delta_encoding_start_) {\r\n VCD_DFATAL << \"Internal error: VCDiffHeaderParser::ParseSectionLengths \"\r\n \"was called before ParseWindowLengths\" << VCD_ENDL;\r\n return_code_ = RESULT_ERROR;\r\n return false;\r\n }\r\n const size_t delta_encoding_header_length =\r\n UnparsedData() - delta_encoding_start_;\r\n if (delta_encoding_length_ !=\r\n (delta_encoding_header_length +\r\n *add_and_run_data_length +\r\n *instructions_and_sizes_length +\r\n *addresses_length)) { // <---- Integer overflow here (32-bit systems only)\r\n VCD_ERROR << \"The length of the delta encoding does not match \"\r\n \"the size of the header plus the sizes of the data sections\"\r\n << VCD_ENDL;\r\n return_code_ = RESULT_ERROR;\r\n return false;\r\n }\r\n return true;\r\n}\r\n \r\nThese returned lengths are subsequently used to initialise length-checked buffer objects for continuing the parsing (vcdecoder.cc:1024) \r\n \r\nsize_t add_and_run_data_length = 0;\r\n size_t instructions_and_sizes_length = 0;\r\n size_t addresses_length = 0;\r\n if (!header_parser->ParseSectionLengths(has_checksum_,\r\n &add_and_run_data_length,\r\n &instructions_and_sizes_length,\r\n &addresses_length,\r\n &expected_checksum_)) {\r\n return header_parser->GetResult();\r\n }\r\n if (parent_->AllowInterleaved() &&\r\n // snip...\r\n } else {\r\n // If interleaved format is not used, then the whole window contents\r\n // must be available before decoding can begin. If only part of\r\n // the current window is available, then report end of data\r\n // and re-parse the whole header when DecodeChunk() is called again.\r\n if (header_parser->UnparsedSize() < (add_and_run_data_length +\r\n instructions_and_sizes_length +\r\n addresses_length)) {\r\n return RESULT_END_OF_DATA;\r\n }\r\n data_for_add_and_run_.Init(header_parser->UnparsedData(),\r\n add_and_run_data_length);\r\n instructions_and_sizes_.Init(data_for_add_and_run_.End(),\r\n instructions_and_sizes_length); \r\n addresses_for_copy_.Init(instructions_and_sizes_.End(), addresses_length);\r\n \r\nThis issue only affects 32-bit builds, since ParseSize is parsing a positive int32_t; on 64-bit builds it cannot be large enough to wrap a size_t.\r\n \r\nIt's unclear if this is exploitable as a browser-process infoleak; the results of SDCH decoding will be returned to a renderer process, but the way that the returned values are used mean that it is likely that the process will have to survive reads at opposite ends of the address space, which *should* be guaranteed to crash with a 2:2 address space split. It is possible that on 32-bit Windows with a 1:3 address space split this can be survived, or with careful crafting of the input file these reads can be avoided; I've not investigated further at this point.\r\n \r\nIt appears to be necessary to host the PoC on a legitimate domain; as localhost is not supported for SDCH.\r\n \r\nVERSION\r\nChrome Version: 47.0.2499.0\r\nOperating System: Linux x86\r\n \r\nREPRODUCTION CASE\r\nPlease include a demonstration of the security bug, such as an attached\r\nHTML or binary file that reproduces the bug when loaded in Chrome. PLEASE\r\nmake the file as small as possible and remove any content not required to\r\ndemonstrate the bug.\r\n \r\nFOR CRASHES, PLEASE INCLUDE THE FOLLOWING ADDITIONAL INFORMATION\r\nType of crash: browser\r\nCrash State: \r\n \r\neax 0xf9ae8a78 -106001800\r\necx 0xe7502d43 -414175933\r\nedx 0x7b83e020 2072240160\r\nebx 0xf76597a0 -144336992\r\nesp 0xe75025d0 0xe75025d0\r\nebp 0xe7502798 0xe7502798\r\nesi 0x5 5\r\nedi 0xf9061200 -117042688\r\neip 0xf1ddebee 0xf1ddebee <open_vcdiff::VCDiffCodeTableReader::GetNextInstruction(int*, unsigned char*)+94>\r\neflags 0x210a93 [ CF AF SF IF OF RF ID ]\r\ncs 0x23 35\r\nss 0x2b 43\r\nds 0x2b 43\r\nes 0x2b 43\r\nfs 0x0 0\r\ngs 0x63 99\r\n \r\n=> 0xf1ddebee <open_vcdiff::VCDiffCodeTableReader::GetNextInstruction(int*, unsigned char*)+94>: movzbl (%edx),%ecx\r\n 0xf1ddebf1 <open_vcdiff::VCDiffCodeTableReader::GetNextInstruction(int*, unsigned char*)+97>: mov (%edi),%esi\r\n 0xf1ddebf3 <open_vcdiff::VCDiffCodeTableReader::GetNextInstruction(int*, unsigned char*)+99>: cmpb $0x0,0x100(%esi,%ecx,1)\r\n 0xf1ddebfb <open_vcdiff::VCDiffCodeTableReader::GetNextInstruction(int*, unsigned char*)+107>: je 0xf1ddec06 <open_vcdiff::VCDiffCodeTableReader::GetNextInstruction(int*, unsigned char*)+118>\r\n 0xf1ddebfd <open_vcdiff::VCDiffCodeTableReader::GetNextInstruction(int*, unsigned char*)+109>: movsbl %cl,%edx\r\n \r\n#0 open_vcdiff::VCDiffCodeTableReader::GetNextInstruction (this=0xf9061200, size=0x5, mode=0xf9ae8a78 \" \\340\\203{Ox\\a\\376\\001\") at ../../sdch/open-vcdiff/src/decodetable.cc:78\r\n#1 0xf1ddcab5 in open_vcdiff::VCDiffDeltaFileWindow::DecodeBody (this=0xf90611c4, parseable_chunk=<optimized out>) at ../../sdch/open-vcdiff/src/vcdecoder.cc:1231\r\n#2 0xf1ddbc8b in open_vcdiff::VCDiffDeltaFileWindow::DecodeWindow (this=0xf90611c4, parseable_chunk=0xe75031a8) at ../../sdch/open-vcdiff/src/vcdecoder.cc:1359\r\n#3 0xf1ddb6f0 in open_vcdiff::VCDiffStreamingDecoderImpl::DecodeChunk (this=0xf90611b0, data=<optimized out>, len=<optimized out>, output_string=0x8) at ../../sdch/open-vcdiff/src/vcdecoder.cc:887\r\n#4 0xf1ddd499 in open_vcdiff::VCDiffStreamingDecoder::DecodeChunkToInterface (this=0x8b, data=0xe7503300 \"8\\026B\\367\\030'\\317\", <incomplete sequence \\371\\226>, len=3880792832, output_string=0xf76597a0 <_GLOBAL_OFFSET_TABLE_>) at ../../sdch/open-vcdiff/src/vcdecoder.cc:1393\r\n#5 0xf1d2b17f in DecodeChunk<std::basic_string<char> > (this=0x7b83e020, data=<optimized out>, len=3880791363, output=<optimized out>) at ../../sdch/open-vcdiff/src/google/vcdecoder.h:83\r\n#6 net::SdchFilter::ReadFilteredData (this=0xf9cf26e0, dest_buffer=0xd2ce0000 \"\", dest_len=<optimized out>) at ../../net/filter/sdch_filter.cc:424\r\n#7 0xf1d28990 in net::Filter::ReadData (this=0xf9cf26e0, dest_buffer=0x7b83e020 <error: Cannot access memory at address 0x7b83e020>, dest_len=0xe75033c8) at ../../net/filter/filter.cc:131\r\n#8 0xf1d2895c in net::Filter::ReadData (this=0xfd6b7c00, dest_buffer=<optimized out>, dest_len=0xe75033c8) at ../../net/filter/filter.cc:145\r\n#9 0xf1ca8dde in net::URLRequestJob::ReadFilteredData (this=0xf9891a00, bytes_read=<optimized out>) at ../../net/url_request/url_request_job.cc:673\r\n#10 0xf1ca8c1d in net::URLRequestJob::Read (this=0xf9891a00, buf=<optimized out>, buf_size=<optimized out>, bytes_read=0xe75034fc) at ../../net/url_request/url_request_job.cc:126\r\n \r\nProof of Concept:\r\nhttps://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/38763.zip\n\n# 0day.today [2018-02-07] #", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://0day.today/exploit/24590"}], "myhack58": [{"lastseen": "2017-06-14T16:17:02", "bulletinFamily": "info", "cvelist": ["CVE-2015-6764", "CVE-2016-9651", "CVE-2016-1646"], "edition": 1, "description": "1. Description \nA South American Amazon Basin rainforest butterfly, occasionally flapping a few wings, maybe in Texas cause a tornado? This I'm not sure I can determine is the program of any one of the minor errors after amplification are possible for the program to produce disastrous consequences. In the 11 months Seoul, South Korea held the PwnFest game, we use the V8 of a logic error(CVE-2016-9651)to achieve the Chrome remote arbitrary code execution, this logic is very small, can be said to be a product compared to the poor of the slag hole, but through a combination of some of Circo kinky clever, our final realization of the vulnerability of the stable use. This loophole revelation to me is:\u201cnever give up easily a loophole, no way to easily determine a vulnerability to non-utilization\u201d. \nThis article follows the structure of the organization: the second section describes the V8 engine in the\u201dinvisible\u201dobject of private property; the third section will lead us to the use of this subtle logic errors; the fourth section describes how to incorporate this logic into an out of bounds read vulnerability; the fifth section will introduce an out of bounds read vulnerability converted to out of bounds write vulnerability in the ideas, this section is of the whole use process in the most ingenious of the a ring; the sixth section is all part of the most difficult step, detailing how to perform a full memory space Feng Shui and how will The out of bounds write vulnerability into arbitrary memory address read and write; the seventh section describes from the arbitrary memory address read and write to arbitrary code execution. \n2. Stealth private property \nIn JavaScript, an object is an associative array, also can be seen as a key-value pair collection. These key-value pairs also referred to as object attributes. Properties of the key can be a string also can be a symbol, as shown below: \n! [](/Article/UploadPic/2017-6/2017614184944156. png? www. myhack58. com) \nCode fragment 1: The object properties \nThe above code fragment first defines an object normalObject, then give this object adds two properties. This can be by JavaScript to read and modify the properties of I call them public property. Can through the JavaScript Object Object provides two methods to get an object of All public properties of the button, the following JavaScript statement can give the code 1 normalObject object of All public properties of the key. \n! [](/Article/UploadPic/2017-6/2017614184944448. png? www. myhack58. com) \nExecution results: ownPublicKeys value[\"string\", Symbol(d)] \nIn the V8 engine, in addition to public properties, there are some special JavaScript objects there are some special properties that only the engine can be accessed, for user JavaScript is not visible, I will be such a property is called private property. In the V8 engine, the symbol(Symbol)also include two public symbols and private symbols, public symbols is a user JavaScript can create and use private symbols then only the engine can create, is for internal engine use. Private properties generally use private symbols as keys, because the user JavaScript can't get private symbols, all can not to the private symbol as a key to access private property. Since private property is concealed, then how can the observed private property? d8 is the V8 engine of the Shell program, by the d8 call the runtime function DebugPrint you can view the one object of all attributes. For example, we can through the following ways to view the code 1 as defined in the normalObject all properties: \n! [](/Article/UploadPic/2017-6/2017614184944952. png? www. myhack58. com) \nFrom the shown on the d8 output of the results, normalObject only has two public properties, not private properties. Now let us look at a special object the error object's properties. \n! [](/Article/UploadPic/2017-6/2017614184944434. png? www. myhack58. com) \nCompare specialObject object's public properties and all properties can be found in all the property than the public property the A KEY for stack_trace_symbol of the property, this property is a specialObject of a private property. The next section describes the private attributes of a v8 engine logic errors. \n3. Tiny logic error \nIn the introduction to this logic error before, first understand the next Object. assign this method,according to the ECMAScript/262 explanation[1]: \nThe assign function is used to copy the values of all of the enumerable own properties from one or more source objects to a target object \nSo the question is, private property is a v8 engine for internal use property, other JavaScript engines may simply not exist in private properties, the private properties should be enumerable, private property should not be in an assignment is copied, the ECMAScript is simply not made provisions. I guess the v8 developers in the realization of the Object. assign when there is no very careful considering this issue. Private property is for the v8 engine used inside of attributes, an object's private attributes should not be assigned to another object, otherwise it will lead to the private attribute value is the user JavaScript changes. v8 is a high performance JavaScript engine, in order to pursue high performance, many function implementations have two channels, a fast channel and a slow channel, when a certain condition is satisfied, the v8 engine will use the fast path to improve performance, because the use of fast track to a vulnerability in the case there are many precedents, such as CVE-2015-6764[2], CVE-2016-1646 is because walking fast channel problems. Similarly, in the realization of the Object. assign, the v8 also for the realization of the Quick passage,as the following code shown in[3]: The \n! [](/Article/UploadPic/2017-6/2017614184945980. png? www. myhack58. com) \nCode fragment 2: a logic error \nIn the Object. assign the fast path implementation, the first will determine the current assignment meets the go fast the channel conditions, if not satisfied, simply return failure go slow channel, if you meet the simple will of the source object, all the properties assigned to the target object, and not filter those keys is a proprietary symbol and having enumerated the characteristics of the properties. If the target object also has the same private property, it will result in private property re-assignment. This is the article you want to discuss logical errors. Google for this error the Fix is quite simple [4] is, to the object to increase any attribute, if this attribute is a private attribute, then this attribute is increased, non-enumerable properties. Now the butterfly has been found, that it is how flapping wings can achieve remote arbitrary code execution?, We from the first fan to start, the logic is converted to out of bounds read vulnerability. \n\n4. From logic errors to out of bounds read \nNow we have the object's enumerable private property re-assignment of capacity, in order to use this ability, I traverse a v8 in all of the private symbols[5], try to give these private symbols for the key private property re-assignment, hoping to be able to upset the v8 engine of the internal execution flow, it is disappointing to me and not much harvest, but there are two private symbol caught my attention, they are class_start_position_symbol and class_end_position_symbol, from these two symbols of the prefixes we guess which of the two private symbols possible with JavaScript in a class-related. So we define a class to observe all its attributes. \n\n\n**[1] [[2]](<87022_2.htm>) [[3]](<87022_3.htm>) [[4]](<87022_4.htm>) [next](<87022_2.htm>)**\n", "modified": "2017-06-14T00:00:00", "published": "2017-06-14T00:00:00", "href": "http://www.myhack58.com/Article/html/3/62/2017/87022.htm", "id": "MYHACK58:62201787022", "title": "The butterfly effect and the program error---a slag-hole the use-vulnerability warning-the black bar safety net", "type": "myhack58", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:50", "bulletinFamily": "unix", "cvelist": ["CVE-2015-6776", "CVE-2016-1628", "CVE-2016-1634", "CVE-2015-6775", "CVE-2016-1638", "CVE-2015-6789", "CVE-2015-6766", "CVE-2015-6762", "CVE-2015-8126", "CVE-2015-1288", "CVE-2015-1281", "CVE-2015-6764", "CVE-2016-1612", "CVE-2015-6770", "CVE-2015-6760", "CVE-2015-6781", "CVE-2015-1291", "CVE-2016-1615", "CVE-2015-1275", "CVE-2016-1626", "CVE-2016-1618", "CVE-2015-1297", "CVE-2015-1286", "CVE-2016-1613", "CVE-2015-1298", "CVE-2015-1295", "CVE-2015-6771", "CVE-2015-1289", "CVE-2015-1296", "CVE-2015-1270", "CVE-2015-6784", "CVE-2015-1272", "CVE-2015-1283", "CVE-2015-1279", "CVE-2015-1274", "CVE-2015-1300", "CVE-2015-1287", "CVE-2016-1621", "CVE-2016-1631", "CVE-2015-6774", "CVE-2015-6778", "CVE-2016-1640", "CVE-2016-1632", "CVE-2015-1282", "CVE-2016-1622", "CVE-2015-6772", "CVE-2015-1285", "CVE-2016-1639", "CVE-2016-1616", "CVE-2015-1302", "CVE-2015-1293", "CVE-2015-6758", "CVE-2015-1303", "CVE-2015-1294", "CVE-2016-1635", "CVE-2015-1276", "CVE-2015-1278", "CVE-2016-1620", "CVE-2015-6767", "CVE-2015-6783", "CVE-2016-1636", "CVE-2015-6787", "CVE-2015-6792", "CVE-2015-1277", "CVE-2016-1627", "CVE-2015-6786", "CVE-2016-1641", "CVE-2016-1633", "CVE-2016-1624", "CVE-2016-1617", "CVE-2015-6791", "CVE-2016-1629", "CVE-2015-6780", "CVE-2015-6785", "CVE-2015-6790", "CVE-2016-1619", "CVE-2015-1271", "CVE-2015-1292", "CVE-2015-6779", "CVE-2015-6788", "CVE-2015-6759", "CVE-2015-1273", "CVE-2015-6756", "CVE-2015-6768", "CVE-2015-6763", "CVE-2016-1630", "CVE-2016-1637", "CVE-2015-6765", "CVE-2015-6755", "CVE-2015-6769", "CVE-2015-6773", "CVE-2015-1304", "CVE-2015-6777", "CVE-2015-1280", "CVE-2015-1299", "CVE-2015-6757", "CVE-2016-1623", "CVE-2015-6782", "CVE-2016-1625", "CVE-2015-1284", "CVE-2016-1614", "CVE-2015-6761"], "edition": 1, "description": "### Background\n\nChromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. \n\n### Description\n\nMultiple vulnerabilities have been discovered in the Chromium web browser. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA remote attacker could possibly execute arbitrary code with the privileges of the process, cause a Denial of Service condition, obtain sensitive information, or bypass security restrictions. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Chromium users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose\n \">=www-client/chromium-49.0.2623.87\"", "modified": "2016-03-12T00:00:00", "published": "2016-03-12T00:00:00", "id": "GLSA-201603-09", "href": "https://security.gentoo.org/glsa/201603-09", "type": "gentoo", "title": "Chromium: Multiple vulnerabilities", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "apple": [{"lastseen": "2020-12-24T20:43:05", "bulletinFamily": "software", "cvelist": ["CVE-2016-1669", "CVE-2016-2086", "CVE-2015-6764", "CVE-2016-0705", "CVE-2015-8027", "CVE-2015-3194", "CVE-2016-0797", "CVE-2016-0702", "CVE-2015-3193", "CVE-2016-2216"], "description": "## About Apple security updates\n\nFor our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the [Apple security updates](<https://support.apple.com/kb/HT201222>) page.\n\nFor more information about security, see the [Apple Product Security](<https://www.apple.com/support/security/>) page. You can encrypt communications with Apple using the [Apple Product Security PGP Key](<https://support.apple.com/kb/HT201601>).\n\nApple security documents reference vulnerabilities by [CVE-ID](<http://cve.mitre.org/about/>) when possible.\n\n\n\n## Xcode 8.1\n\nReleased October 27, 2016\n\n**IDE Xcode Server**\n\nAvailable for: OS X El Capitan v10.11.5 and later\n\nImpact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution\n\nDescription: Multiple issues existed in Node.js in Xcode Server. These issues were addressed by updating to Node.js version 4.5.0.\n\nCVE-2016-1669\n\nCVE-2016-0705\n\nCVE-2016-0797\n\nCVE-2016-0702\n\nCVE-2016-2086\n\nCVE-2016-2216\n\nCVE-2015-8027\n\nCVE-2015-3193\n\nCVE-2015-3194\n\nCVE-2015-6764\n", "edition": 2, "modified": "2017-01-23T05:36:06", "published": "2017-01-23T05:36:06", "id": "APPLE:HT207268", "href": "https://support.apple.com/kb/HT207268", "title": "About the security content of Xcode 8.1 - Apple Support", "type": "apple", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "suse": [{"lastseen": "2016-09-04T11:40:06", "bulletinFamily": "unix", "cvelist": ["CVE-2015-6776", "CVE-2015-6775", "CVE-2015-6789", "CVE-2015-6766", "CVE-2015-6764", "CVE-2015-6770", "CVE-2015-6781", "CVE-2015-6771", "CVE-2015-6784", "CVE-2015-6774", "CVE-2015-6778", "CVE-2015-6772", "CVE-2015-6767", "CVE-2015-6783", "CVE-2015-6787", "CVE-2015-6786", "CVE-2015-6791", "CVE-2015-6780", "CVE-2015-6785", "CVE-2015-6790", "CVE-2015-6779", "CVE-2015-6788", "CVE-2015-6768", "CVE-2015-6765", "CVE-2015-6769", "CVE-2015-6773", "CVE-2015-6777", "CVE-2015-6782"], "description": "Chromium was updated to 47.0.2526.80 to fix security issues and bugs.\n\n The following vulnerabilities were fixed:\n\n * CVE-2015-6788: Type confusion in extensions\n * CVE-2015-6789: Use-after-free in Blink\n * CVE-2015-6790: Escaping issue in saved pages\n * CVE-2015-6791: Various fixes from internal audits, fuzzing and other\n initiatives\n\n The following vulnerabilities were fixed in 47.0.2526.73:\n\n * CVE-2015-6765: Use-after-free in AppCache\n * CVE-2015-6766: Use-after-free in AppCache\n * CVE-2015-6767: Use-after-free in AppCache\n * CVE-2015-6768: Cross-origin bypass in DOM\n * CVE-2015-6769: Cross-origin bypass in core\n * CVE-2015-6770: Cross-origin bypass in DOM\n * CVE-2015-6771: Out of bounds access in v8\n * CVE-2015-6772: Cross-origin bypass in DOM\n * CVE-2015-6764: Out of bounds access in v8\n * CVE-2015-6773: Out of bounds access in Skia\n * CVE-2015-6774: Use-after-free in Extensions\n * CVE-2015-6775: Type confusion in PDFium\n * CVE-2015-6776: Out of bounds access in PDFium\n * CVE-2015-6777: Use-after-free in DOM\n * CVE-2015-6778: Out of bounds access in PDFium\n * CVE-2015-6779: Scheme bypass in PDFium\n * CVE-2015-6780: Use-after-free in Infobars\n * CVE-2015-6781: Integer overflow in Sfntly\n * CVE-2015-6782: Content spoofing in Omnibox\n * CVE-2015-6783: Signature validation issue in Android Crazy Linker.\n * CVE-2015-6784: Escaping issue in saved pages\n * CVE-2015-6785: Wildcard matching issue in CSP\n * CVE-2015-6786: Scheme bypass in CSP\n * CVE-2015-6787: Various fixes from internal audits, fuzzing and other\n initiatives.\n * Multiple vulnerabilities in V8 fixed at the tip of the 4.7 branch\n (currently 4.7.80.23)\n\n", "edition": 1, "modified": "2015-12-17T13:11:20", "published": "2015-12-17T13:11:20", "href": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html", "id": "OPENSUSE-SU-2015:2291-1", "title": "Security update for Chromium (important)", "type": "suse", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:16:05", "bulletinFamily": "unix", "cvelist": ["CVE-2015-6776", "CVE-2015-6775", "CVE-2015-6789", "CVE-2015-6766", "CVE-2015-6764", "CVE-2015-6770", "CVE-2015-6781", "CVE-2015-6771", "CVE-2015-6784", "CVE-2015-6774", "CVE-2015-6778", "CVE-2015-6772", "CVE-2015-6767", "CVE-2015-6783", "CVE-2015-6787", "CVE-2015-6786", "CVE-2015-6791", "CVE-2015-6780", "CVE-2015-6785", "CVE-2015-6790", "CVE-2015-6779", "CVE-2015-6788", "CVE-2015-6768", "CVE-2015-6765", "CVE-2015-6769", "CVE-2015-6773", "CVE-2015-6777", "CVE-2015-6782"], "description": "Chromium was updated to 47.0.2526.80 to fix security issues and bugs.\n\n The following vulnerabilities were fixed:\n\n * CVE-2015-6788: Type confusion in extensions\n * CVE-2015-6789: Use-after-free in Blink\n * CVE-2015-6790: Escaping issue in saved pages\n * CVE-2015-6791: Various fixes from internal audits, fuzzing and other\n initiatives\n\n The following vulnerabilities were fixed in 47.0.2526.73:\n\n * CVE-2015-6765: Use-after-free in AppCache\n * CVE-2015-6766: Use-after-free in AppCache\n * CVE-2015-6767: Use-after-free in AppCache\n * CVE-2015-6768: Cross-origin bypass in DOM\n * CVE-2015-6769: Cross-origin bypass in core\n * CVE-2015-6770: Cross-origin bypass in DOM\n * CVE-2015-6771: Out of bounds access in v8\n * CVE-2015-6772: Cross-origin bypass in DOM\n * CVE-2015-6764: Out of bounds access in v8\n * CVE-2015-6773: Out of bounds access in Skia\n * CVE-2015-6774: Use-after-free in Extensions\n * CVE-2015-6775: Type confusion in PDFium\n * CVE-2015-6776: Out of bounds access in PDFium\n * CVE-2015-6777: Use-after-free in DOM\n * CVE-2015-6778: Out of bounds access in PDFium\n * CVE-2015-6779: Scheme bypass in PDFium\n * CVE-2015-6780: Use-after-free in Infobars\n * CVE-2015-6781: Integer overflow in Sfntly\n * CVE-2015-6782: Content spoofing in Omnibox\n * CVE-2015-6783: Signature validation issue in Android Crazy Linker.\n * CVE-2015-6784: Escaping issue in saved pages\n * CVE-2015-6785: Wildcard matching issue in CSP\n * CVE-2015-6786: Scheme bypass in CSP\n * CVE-2015-6787: Various fixes from internal audits, fuzzing and other\n initiatives.\n * Multiple vulnerabilities in V8 fixed at the tip of the 4.7 branch\n (currently 4.7.80.23)\n\n", "edition": 1, "modified": "2015-12-17T13:10:52", "published": "2015-12-17T13:10:52", "id": "OPENSUSE-SU-2015:2290-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html", "title": "Security update for Chromium (important)", "type": "suse", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}