ID REDHAT-RHSA-2017-3401.NASL Type nessus Reporter This script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2017-12-08T00:00:00
Description
An update for chromium-browser is now available for Red Hat Enterprise
Linux 6 Supplementary.
Red Hat Product Security has rated this update as having a security
impact of Critical. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.
Chromium is an open source web browser, powered by WebKit (Blink).
This update upgrades Chromium to version 63.0.3239.84.
Security Fix(es) :
Multiple flaws were found in the processing of malformed web
content. A web page containing malicious content could cause Chromium
to crash, execute arbitrary code, or disclose sensitive information
when visited by the victim. (CVE-2017-15407, CVE-2017-15408,
CVE-2017-15409, CVE-2017-15410, CVE-2017-15411, CVE-2017-15412,
CVE-2017-15413, CVE-2017-15415, CVE-2017-15416, CVE-2017-15417,
CVE-2017-15418, CVE-2017-15419, CVE-2017-15420, CVE-2017-15422,
CVE-2017-15423, CVE-2017-15424, CVE-2017-15425, CVE-2017-15426,
CVE-2017-15427)
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Red Hat Security Advisory RHSA-2017:3401. The text
# itself is copyright (C) Red Hat, Inc.
#
include("compat.inc");
if (description)
{
script_id(105091);
script_version("3.12");
script_set_attribute(attribute:"plugin_modification_date", value:"2020/05/29");
script_cve_id("CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427");
script_xref(name:"RHSA", value:"2017:3401");
script_name(english:"RHEL 6 : chromium-browser (RHSA-2017:3401)");
script_summary(english:"Checks the rpm output for the updated packages");
script_set_attribute(
attribute:"synopsis",
value:"The remote Red Hat host is missing one or more security updates."
);
script_set_attribute(
attribute:"description",
value:
"An update for chromium-browser is now available for Red Hat Enterprise
Linux 6 Supplementary.
Red Hat Product Security has rated this update as having a security
impact of Critical. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.
Chromium is an open source web browser, powered by WebKit (Blink).
This update upgrades Chromium to version 63.0.3239.84.
Security Fix(es) :
* Multiple flaws were found in the processing of malformed web
content. A web page containing malicious content could cause Chromium
to crash, execute arbitrary code, or disclose sensitive information
when visited by the victim. (CVE-2017-15407, CVE-2017-15408,
CVE-2017-15409, CVE-2017-15410, CVE-2017-15411, CVE-2017-15412,
CVE-2017-15413, CVE-2017-15415, CVE-2017-15416, CVE-2017-15417,
CVE-2017-15418, CVE-2017-15419, CVE-2017-15420, CVE-2017-15422,
CVE-2017-15423, CVE-2017-15424, CVE-2017-15425, CVE-2017-15426,
CVE-2017-15427)"
);
script_set_attribute(
attribute:"see_also",
value:"https://chromereleases.googleblog.com/2017/12/"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/errata/RHSA-2017:3401"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2017-15407"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2017-15408"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2017-15409"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2017-15410"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2017-15411"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2017-15412"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2017-15413"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2017-15415"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2017-15416"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2017-15417"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2017-15418"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2017-15419"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2017-15420"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2017-15422"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2017-15423"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2017-15424"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2017-15425"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2017-15426"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2017-15427"
);
script_set_attribute(
attribute:"solution",
value:
"Update the affected chromium-browser and / or
chromium-browser-debuginfo packages."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:chromium-browser");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:chromium-browser-debuginfo");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6");
script_set_attribute(attribute:"vuln_publication_date", value:"2018/08/28");
script_set_attribute(attribute:"patch_publication_date", value:"2017/12/07");
script_set_attribute(attribute:"plugin_publication_date", value:"2017/12/08");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Red Hat Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
os_ver = os_ver[1];
if (! preg(pattern:"^6([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 6.x", "Red Hat " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
if (!empty_or_null(yum_updateinfo))
{
rhsa = "RHSA-2017:3401";
yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
if (!empty_or_null(yum_report))
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : yum_report
);
exit(0);
}
else
{
audit_message = "affected by Red Hat security advisory " + rhsa;
audit(AUDIT_OS_NOT, audit_message);
}
}
else
{
flag = 0;
if (rpm_check(release:"RHEL6", cpu:"i686", reference:"chromium-browser-63.0.3239.84-1.el6_9", allowmaj:TRUE)) flag++;
if (rpm_check(release:"RHEL6", cpu:"x86_64", reference:"chromium-browser-63.0.3239.84-1.el6_9", allowmaj:TRUE)) flag++;
if (rpm_check(release:"RHEL6", cpu:"i686", reference:"chromium-browser-debuginfo-63.0.3239.84-1.el6_9", allowmaj:TRUE)) flag++;
if (rpm_check(release:"RHEL6", cpu:"x86_64", reference:"chromium-browser-debuginfo-63.0.3239.84-1.el6_9", allowmaj:TRUE)) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get() + redhat_report_package_caveat()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "chromium-browser / chromium-browser-debuginfo");
}
}
{"id": "REDHAT-RHSA-2017-3401.NASL", "bulletinFamily": "scanner", "title": "RHEL 6 : chromium-browser (RHSA-2017:3401)", "description": "An update for chromium-browser is now available for Red Hat Enterprise\nLinux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Critical. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nChromium is an open source web browser, powered by WebKit (Blink).\n\nThis update upgrades Chromium to version 63.0.3239.84.\n\nSecurity Fix(es) :\n\n* Multiple flaws were found in the processing of malformed web\ncontent. A web page containing malicious content could cause Chromium\nto crash, execute arbitrary code, or disclose sensitive information\nwhen visited by the victim. (CVE-2017-15407, CVE-2017-15408,\nCVE-2017-15409, CVE-2017-15410, CVE-2017-15411, CVE-2017-15412,\nCVE-2017-15413, CVE-2017-15415, CVE-2017-15416, CVE-2017-15417,\nCVE-2017-15418, CVE-2017-15419, CVE-2017-15420, CVE-2017-15422,\nCVE-2017-15423, CVE-2017-15424, CVE-2017-15425, CVE-2017-15426,\nCVE-2017-15427)", "published": "2017-12-08T00:00:00", "modified": "2017-12-08T00:00:00", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "href": "https://www.tenable.com/plugins/nessus/105091", "reporter": "This script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["https://access.redhat.com/errata/RHSA-2017:3401", "https://access.redhat.com/security/cve/cve-2017-15426", "https://access.redhat.com/security/cve/cve-2017-15424", "https://access.redhat.com/security/cve/cve-2017-15416", "https://access.redhat.com/security/cve/cve-2017-15423", "https://access.redhat.com/security/cve/cve-2017-15410", "https://access.redhat.com/security/cve/cve-2017-15417", "https://access.redhat.com/security/cve/cve-2017-15415", "https://chromereleases.googleblog.com/2017/12/", "https://access.redhat.com/security/cve/cve-2017-15411", "https://access.redhat.com/security/cve/cve-2017-15409", "https://access.redhat.com/security/cve/cve-2017-15408", "https://access.redhat.com/security/cve/cve-2017-15407", "https://access.redhat.com/security/cve/cve-2017-15412", "https://access.redhat.com/security/cve/cve-2017-15420", "https://access.redhat.com/security/cve/cve-2017-15422", "https://access.redhat.com/security/cve/cve-2017-15413", "https://access.redhat.com/security/cve/cve-2017-15427", "https://access.redhat.com/security/cve/cve-2017-15425", "https://access.redhat.com/security/cve/cve-2017-15418", "https://access.redhat.com/security/cve/cve-2017-15419"], "cvelist": ["CVE-2017-15417", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15407", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15415", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-15420"], "type": "nessus", "lastseen": "2020-05-31T20:12:15", "edition": 20, "viewCount": 1, "enchantments": {"dependencies": {"references": [{"type": "kaspersky", "idList": ["KLA11152"]}, {"type": "redhat", "idList": ["RHSA-2017:3401", "RHSA-2020:1190", "RHSA-2018:0287"]}, {"type": "archlinux", "idList": ["ASA-201712-5"]}, {"type": "nessus", "idList": ["OPENSUSE-2017-1349.NASL", "FEDORA_2017-EA44F172E3.NASL", "DEBIAN_DSA-4064.NASL", "MACOSX_GOOGLE_CHROME_63_0_3239_84.NASL", "FEDORA_2017-C2645AA935.NASL", "FEDORA_2018-E08D828ED9.NASL", "GENTOO_GLSA-201801-03.NASL", "FREEBSD_PKG_1D951E85FFDB11E78B91E8E0B747A45A.NASL", "FEDORA_2018-C0D3DB441F.NASL", "GOOGLE_CHROME_63_0_3239_84.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310874300", "OPENVAS:1361412562310812235", "OPENVAS:1361412562310874144", "OPENVAS:1361412562310812237", "OPENVAS:1361412562310851660", "OPENVAS:1361412562310873974", "OPENVAS:1361412562310873977", "OPENVAS:1361412562310812236", "OPENVAS:1361412562310874155", "OPENVAS:1361412562310704064"]}, {"type": "debian", "idList": ["DEBIAN:DSA-4150-1:2E864", "DEBIAN:DSA-4064-1:25480", "DEBIAN:DSA-4086-1:58F72", "DEBIAN:DLA-1211-1:EA9E0"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2017:3244-1", "OPENSUSE-SU-2017:3245-1"]}, {"type": "fedora", "idList": ["FEDORA:855A9625F2AD", "FEDORA:EC7F86046254", "FEDORA:2E8D96005552", "FEDORA:5CFCF60A5875", "FEDORA:0F54C60BE23D", "FEDORA:93899601DD82", "FEDORA:CAFF160478EB"]}, {"type": "freebsd", "idList": ["1D951E85-FFDB-11E7-8B91-E8E0B747A45A"]}, {"type": "gentoo", "idList": ["GLSA-201801-03"]}, {"type": "cve", "idList": ["CVE-2017-15409", "CVE-2017-15427", "CVE-2017-15423", "CVE-2017-15407", "CVE-2017-15426", "CVE-2017-15410", "CVE-2017-15424", "CVE-2017-15418", "CVE-2017-15413", "CVE-2017-15425"]}, {"type": "ubuntu", "idList": ["USN-3610-1", "USN-3513-1", "USN-3513-2"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:21A806FB62D8EE8039931A5D1193F96D", "CFOUNDRY:81EBD6DFAEE8502A1AEE7ACA1D96C999"]}, {"type": "threatpost", "idList": ["THREATPOST:BC7785C1AA5CE337FD6268A2941438EE"]}, {"type": "centos", "idList": ["CESA-2020:1190"]}], "modified": "2020-05-31T20:12:15", "rev": 2}, "score": {"value": 7.5, "vector": "NONE", "modified": "2020-05-31T20:12:15", "rev": 2}, "vulnersScore": 7.5}, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2017:3401. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(105091);\n script_version(\"3.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/05/29\");\n\n script_cve_id(\"CVE-2017-15407\", \"CVE-2017-15408\", \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\", \"CVE-2017-15412\", \"CVE-2017-15413\", \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15417\", \"CVE-2017-15418\", \"CVE-2017-15419\", \"CVE-2017-15420\", \"CVE-2017-15422\", \"CVE-2017-15423\", \"CVE-2017-15424\", \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2017-15427\");\n script_xref(name:\"RHSA\", value:\"2017:3401\");\n\n script_name(english:\"RHEL 6 : chromium-browser (RHSA-2017:3401)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"An update for chromium-browser is now available for Red Hat Enterprise\nLinux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Critical. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nChromium is an open source web browser, powered by WebKit (Blink).\n\nThis update upgrades Chromium to version 63.0.3239.84.\n\nSecurity Fix(es) :\n\n* Multiple flaws were found in the processing of malformed web\ncontent. A web page containing malicious content could cause Chromium\nto crash, execute arbitrary code, or disclose sensitive information\nwhen visited by the victim. (CVE-2017-15407, CVE-2017-15408,\nCVE-2017-15409, CVE-2017-15410, CVE-2017-15411, CVE-2017-15412,\nCVE-2017-15413, CVE-2017-15415, CVE-2017-15416, CVE-2017-15417,\nCVE-2017-15418, CVE-2017-15419, CVE-2017-15420, CVE-2017-15422,\nCVE-2017-15423, CVE-2017-15424, CVE-2017-15425, CVE-2017-15426,\nCVE-2017-15427)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://chromereleases.googleblog.com/2017/12/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2017:3401\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15407\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15408\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15409\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15410\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15411\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15412\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15413\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15415\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15416\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15417\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15418\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15419\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15420\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15422\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15423\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15424\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15425\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15426\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-15427\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"Update the affected chromium-browser and / or\nchromium-browser-debuginfo packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:chromium-browser\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:chromium-browser-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/08/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/12/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/12/08\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2017:3401\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"chromium-browser-63.0.3239.84-1.el6_9\", allowmaj:TRUE)) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"chromium-browser-63.0.3239.84-1.el6_9\", allowmaj:TRUE)) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"chromium-browser-debuginfo-63.0.3239.84-1.el6_9\", allowmaj:TRUE)) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"chromium-browser-debuginfo-63.0.3239.84-1.el6_9\", allowmaj:TRUE)) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromium-browser / chromium-browser-debuginfo\");\n }\n}\n", "naslFamily": "Red Hat Local Security Checks", "pluginID": "105091", "cpe": ["p-cpe:/a:redhat:enterprise_linux:chromium-browser-debuginfo", "p-cpe:/a:redhat:enterprise_linux:chromium-browser", "cpe:/o:redhat:enterprise_linux:6"], "scheme": null, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}}
{"kaspersky": [{"lastseen": "2020-09-02T11:50:23", "bulletinFamily": "info", "cvelist": ["CVE-2017-15417", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15407", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15415", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-15420"], "description": "### *Detect date*:\n12/07/2017\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, obtain sensitive information, spoof user interface, bypass security restrictions and possibly to execute arbitrary code.\n\n### *Affected products*:\nGoogle Chrome versions earlier than 63.0.3239.84\n\n### *Solution*:\nUpdate to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk. \n[Download Google Chrome](<https://www.google.com/chrome/browser/desktop/>)\n\n### *Original advisories*:\n[Stable Channel Update for Desktop](<https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Google Chrome](<https://threats.kaspersky.com/en/product/Google-Chrome/>)\n\n### *CVE-IDS*:\n[CVE-2017-15422](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15422>)6.5High \n[CVE-2017-15423](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15423>)5.3High \n[CVE-2017-15424](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15424>)6.5High \n[CVE-2017-15425](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15425>)6.5High \n[CVE-2017-15426](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15426>)6.5High \n[CVE-2017-15427](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15427>)6.1High \n[CVE-2017-15407](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15407>)8.8Critical \n[CVE-2017-15408](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15408>)8.8Critical \n[CVE-2017-15409](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15409>)8.8Critical \n[CVE-2017-15410](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15410>)8.8Critical \n[CVE-2017-15411](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15411>)8.8Critical \n[CVE-2017-15412](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15412>)8.8Critical \n[CVE-2017-15413](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15413>)8.8Critical \n[CVE-2017-15415](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15415>)6.5High \n[CVE-2017-15416](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15416>)6.5High \n[CVE-2017-15417](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15417>)5.3High \n[CVE-2017-15418](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15418>)4.3Warning \n[CVE-2017-15419](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15419>)6.5High \n[CVE-2017-15420](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15420>)6.5High", "edition": 43, "modified": "2020-05-22T00:00:00", "published": "2017-12-07T00:00:00", "id": "KLA11152", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11152", "title": "\r KLA11152Multiple vulnerabilities in Google Chrome ", "type": "kaspersky", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "redhat": [{"lastseen": "2019-08-13T18:45:33", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427"], "description": "Chromium is an open-source web browser, powered by WebKit (Blink).\n\nThis update upgrades Chromium to version 63.0.3239.84.\n\nSecurity Fix(es):\n\n* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2017-15407, CVE-2017-15408, CVE-2017-15409, CVE-2017-15410, CVE-2017-15411, CVE-2017-15412, CVE-2017-15413, CVE-2017-15415, CVE-2017-15416, CVE-2017-15417, CVE-2017-15418, CVE-2017-15419, CVE-2017-15420, CVE-2017-15422, CVE-2017-15423, CVE-2017-15424, CVE-2017-15425, CVE-2017-15426, CVE-2017-15427)", "modified": "2018-06-07T18:21:49", "published": "2017-12-08T00:20:02", "id": "RHSA-2017:3401", "href": "https://access.redhat.com/errata/RHSA-2017:3401", "type": "redhat", "title": "(RHSA-2017:3401) Critical: chromium-browser security update", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T14:34:18", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15412"], "description": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 4 serves as a replacement of Red Hat JBoss Core Services Apache HTTP Server 2.4.23, and includes bug fixes (including fixes from previous Service Pack 1,2 and 3), which are documented in the Release Notes document linked to in the References. \n\nSecurity Fix(es):\n\nDetails around this issue, including information about the CVE, severity of the issue, and the CVSS score can be found on the CVE page listed in the Reference section below.\n\n* chromium-browser: use after free in libxml (CVE-2017-15412, Important)", "modified": "2018-02-08T17:38:47", "published": "2018-02-08T17:38:27", "id": "RHSA-2018:0287", "href": "https://access.redhat.com/errata/RHSA-2018:0287", "type": "redhat", "title": "(RHSA-2018:0287) Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 security update ", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-04-02T17:41:43", "bulletinFamily": "unix", "cvelist": ["CVE-2015-8035", "CVE-2016-5131", "CVE-2017-15412", "CVE-2017-18258", "CVE-2018-14404", "CVE-2018-14567"], "description": "The libxml2 library is a development toolbox providing the implementation of various XML standards.\n\nSecurity Fix(es):\n\n* libxml2: Use after free triggered by XPointer paths beginning with range-to (CVE-2016-5131)\n\n* libxml2: Use after free in xmlXPathCompOpEvalPositionalPredicate() function in xpath.c (CVE-2017-15412)\n\n* libxml2: DoS caused by incorrect error detection during XZ decompression (CVE-2015-8035)\n\n* libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c (CVE-2018-14404)\n\n* libxml2: Unrestricted memory usage in xz_head() function in xzlib.c (CVE-2017-18258)\n\n* libxml2: Infinite loop caused by incorrect error detection during LZMA decompression (CVE-2018-14567)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.8 Release Notes linked from the References section.", "modified": "2020-03-31T14:09:57", "published": "2020-03-31T13:30:25", "id": "RHSA-2020:1190", "href": "https://access.redhat.com/errata/RHSA-2020:1190", "type": "redhat", "title": "(RHSA-2020:1190) Moderate: libxml2 security update", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "archlinux": [{"lastseen": "2020-09-22T18:36:42", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427"], "description": "Arch Linux Security Advisory ASA-201712-5\n=========================================\n\nSeverity: Critical\nDate : 2017-12-07\nCVE-ID : CVE-2017-15407 CVE-2017-15408 CVE-2017-15409 CVE-2017-15410\nCVE-2017-15411 CVE-2017-15412 CVE-2017-15413 CVE-2017-15415\nCVE-2017-15416 CVE-2017-15417 CVE-2017-15418 CVE-2017-15419\nCVE-2017-15420 CVE-2017-15422 CVE-2017-15423 CVE-2017-15424\nCVE-2017-15425 CVE-2017-15426 CVE-2017-15427\nPackage : chromium\nType : multiple issues\nRemote : Yes\nLink : https://security.archlinux.org/AVG-544\n\nSummary\n=======\n\nThe package chromium before version 63.0.3239.84-1 is vulnerable to\nmultiple issues including arbitrary code execution, content spoofing,\ninformation disclosure and access restriction bypass.\n\nResolution\n==========\n\nUpgrade to 63.0.3239.84-1.\n\n# pacman -Syu \"chromium>=63.0.3239.84-1\"\n\nThe problems have been fixed upstream in version 63.0.3239.84.\n\nWorkaround\n==========\n\nNone.\n\nDescription\n===========\n\n- CVE-2017-15407 (arbitrary code execution)\n\nAn out of bounds write has been found in the QUIC component of the\nChromium browser before 63.0.3239.84.\n\n- CVE-2017-15408 (arbitrary code execution)\n\nA heap-based buffer overflow has been found in the PDFium component of\nthe Chromium browser before 63.0.3239.84.\n\n- CVE-2017-15409 (arbitrary code execution)\n\nAn out of bounds write has been found in the Skia component of the\nChromium browser before 63.0.3239.84.\n\n- CVE-2017-15410 (arbitrary code execution)\n\nA use after free has been found in the PDFium component of the Chromium\nbrowser before 63.0.3239.84.\n\n- CVE-2017-15411 (arbitrary code execution)\n\nA use after free has been found in the PDFium component of the Chromium\nbrowser before 63.0.3239.84.\n\n- CVE-2017-15412 (arbitrary code execution)\n\nA use after free has been found in the libxml component of the Chromium\nbrowser before 63.0.3239.84.\n\n- CVE-2017-15413 (arbitrary code execution)\n\nA type confusion has been found in the WebAssembly component of the\nChromium browser before 63.0.3239.84.\n\n- CVE-2017-15415 (information disclosure)\n\nA pointer information disclosure has been found in the IPC call\ncomponent of the Chromium browser before 63.0.3239.84.\n\n- CVE-2017-15416 (information disclosure)\n\nAn out of bounds read has been found in the Blink component of the\nChromium browser before 63.0.3239.84.\n\n- CVE-2017-15417 (information disclosure)\n\nA cross-origin information disclosure has been found in the Skia\ncomponent of the Chromium browser before 63.0.3239.84.\n\n- CVE-2017-15418 (information disclosure)\n\nA use of uninitialized value has been found in the Skia component of\nthe Chromium browser before 63.0.3239.84.\n\n- CVE-2017-15419 (information disclosure)\n\nA cross-origin leak of redirect URL has been found in the Blink\ncomponent of the Chromium browser before 63.0.3239.84.\n\n- CVE-2017-15420 (content spoofing)\n\nA URL spoofing issue has been found in the Omnibox component of the\nChromium browser before 63.0.3239.84.\n\n- CVE-2017-15422 (arbitrary code execution)\n\nAn integer overflow has been found in the ICU component of the Chromium\nbrowser before 63.0.3239.84.\n\n- CVE-2017-15423 (information disclosure)\n\nAn information disclosure issue has been found in the SPAKE\nimplementation of the BoringSSL component of the Chromium browser\nbefore 63.0.3239.84.\n\n- CVE-2017-15424 (content spoofing)\n\nA URL spoofing issue has been found in the Omnibox component of the\nChromium browser before 63.0.3239.84.\n\n- CVE-2017-15425 (content spoofing)\n\nA URL spoofing issue has been found in the Omnibox component of the\nChromium browser before 63.0.3239.84.\n\n- CVE-2017-15426 (content spoofing)\n\nA URL spoofing issue has been found in the Omnibox component of the\nChromium browser before 63.0.3239.84.\n\n- CVE-2017-15427 (access restriction bypass)\n\nAn insufficient blocking of Javascript issue has been found in the\nOmnibox component of the Chromium browser before 63.0.3239.84.\n\nImpact\n======\n\nA remote attacker can execute arbitrary code on the affected host,\nspoof the URL, access sensitive information and bypass security\nmeasures.\n\nReferences\n==========\n\nhttps://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html\nhttps://crbug.com/778505\nhttps://crbug.com/762374\nhttps://crbug.com/763972\nhttps://crbug.com/765921\nhttps://crbug.com/770148\nhttps://crbug.com/727039\nhttps://crbug.com/766666\nhttps://crbug.com/765512\nhttps://crbug.com/779314\nhttps://crbug.com/699028\nhttps://crbug.com/765858\nhttps://crbug.com/780312\nhttps://crbug.com/777419\nhttps://crbug.com/774382\nhttps://github.com/google/boringssl/commit/696c13bd6ab78011adfe7b775519c8b7cc82b604\nhttps://crbug.com/778101\nhttps://crbug.com/756226\nhttps://crbug.com/756456\nhttps://crbug.com/756735\nhttps://crbug.com/768910\nhttps://security.archlinux.org/CVE-2017-15407\nhttps://security.archlinux.org/CVE-2017-15408\nhttps://security.archlinux.org/CVE-2017-15409\nhttps://security.archlinux.org/CVE-2017-15410\nhttps://security.archlinux.org/CVE-2017-15411\nhttps://security.archlinux.org/CVE-2017-15412\nhttps://security.archlinux.org/CVE-2017-15413\nhttps://security.archlinux.org/CVE-2017-15415\nhttps://security.archlinux.org/CVE-2017-15416\nhttps://security.archlinux.org/CVE-2017-15417\nhttps://security.archlinux.org/CVE-2017-15418\nhttps://security.archlinux.org/CVE-2017-15419\nhttps://security.archlinux.org/CVE-2017-15420\nhttps://security.archlinux.org/CVE-2017-15422\nhttps://security.archlinux.org/CVE-2017-15423\nhttps://security.archlinux.org/CVE-2017-15424\nhttps://security.archlinux.org/CVE-2017-15425\nhttps://security.archlinux.org/CVE-2017-15426\nhttps://security.archlinux.org/CVE-2017-15427", "modified": "2017-12-07T00:00:00", "published": "2017-12-07T00:00:00", "id": "ASA-201712-5", "href": "https://security.archlinux.org/ASA-201712-5", "type": "archlinux", "title": "[ASA-201712-5] chromium: multiple issues", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "openvas": [{"lastseen": "2019-07-04T19:02:13", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-15417", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15427", "CVE-2017-15407", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15415", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-15420"], "description": "Several vulnerabilities have been discovered in the chromium web browser.\n\nCVE-2017-15407\nNed Williamson discovered an out-of-bounds write issue.\n\nCVE-2017-15408\nKe Liu discovered a heap overflow issue in the pdfium library.\n\nCVE-2017-15409\nAn out-of-bounds write issue was discovered in the skia library.\n\nCVE-2017-15410\nLuat Nguyen discovered a use-after-free issue in the pdfium library.\n\nCVE-2017-15411\nLuat Nguyen discovered a use-after-free issue in the pdfium library.\n\nCVE-2017-15413\nGaurav Dewan discovered a type confusion issue.\n\nCVE-2017-15415\nViktor Brange discovered an information disclosure issue.\n\nCVE-2017-15416\nNed Williamson discovered an out-of-bounds read issue.\n\nCVE-2017-15417\nMax May discovered an information disclosure issue in the skia\nlibrary.\n\nCVE-2017-15418\nKushal Arvind Shah discovered an uninitialized value in the skia\nlibrary.\n\nCVE-2017-15419\nJun Kokatsu discoved an information disclosure issue.\n\nCVE-2017-15420\nWenXu Wu discovered a URL spoofing issue.\n\nCVE-2017-15423\nGreg Hudson discovered an issue in the boringssl library.\n\nCVE-2017-15424\nKhalil Zhani discovered a URL spoofing issue.\n\nCVE-2017-15425\nxisigr discovered a URL spoofing issue.\n\nCVE-2017-15426\nWenXu Wu discovered a URL spoofing issue.\n\nCVE-2017-15427\nJunaid Farhan discovered an issue with the omnibox.", "modified": "2019-07-04T00:00:00", "published": "2017-12-12T00:00:00", "id": "OPENVAS:1361412562310704064", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310704064", "type": "openvas", "title": "Debian Security Advisory DSA 4064-1 (chromium-browser - security update)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Auto-generated from advisory DSA 4064-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2017 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License as published by\n# the Free Software Foundation; either version 2 of the License, or\n# (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.704064\");\n script_version(\"2019-07-04T09:25:28+0000\");\n script_cve_id(\"CVE-2017-15407\", \"CVE-2017-15408\", \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\", \"CVE-2017-15413\", \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15417\", \"CVE-2017-15418\", \"CVE-2017-15419\", \"CVE-2017-15420\", \"CVE-2017-15423\", \"CVE-2017-15424\", \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2017-15427\");\n script_name(\"Debian Security Advisory DSA 4064-1 (chromium-browser - security update)\");\n script_tag(name:\"last_modification\", value:\"2019-07-04 09:25:28 +0000 (Thu, 04 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2017-12-12 00:00:00 +0100 (Tue, 12 Dec 2017)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"https://www.debian.org/security/2017/dsa-4064.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2017 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB9\");\n script_tag(name:\"affected\", value:\"chromium-browser on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the stable distribution (stretch), these problems have been fixed in\nversion 63.0.3239.84-1~deb9u1.\n\nWe recommend that you upgrade your chromium-browser packages.\");\n\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/chromium-browser\");\n script_tag(name:\"summary\", value:\"Several vulnerabilities have been discovered in the chromium web browser.\n\nCVE-2017-15407\nNed Williamson discovered an out-of-bounds write issue.\n\nCVE-2017-15408\nKe Liu discovered a heap overflow issue in the pdfium library.\n\nCVE-2017-15409\nAn out-of-bounds write issue was discovered in the skia library.\n\nCVE-2017-15410\nLuat Nguyen discovered a use-after-free issue in the pdfium library.\n\nCVE-2017-15411\nLuat Nguyen discovered a use-after-free issue in the pdfium library.\n\nCVE-2017-15413\nGaurav Dewan discovered a type confusion issue.\n\nCVE-2017-15415\nViktor Brange discovered an information disclosure issue.\n\nCVE-2017-15416\nNed Williamson discovered an out-of-bounds read issue.\n\nCVE-2017-15417\nMax May discovered an information disclosure issue in the skia\nlibrary.\n\nCVE-2017-15418\nKushal Arvind Shah discovered an uninitialized value in the skia\nlibrary.\n\nCVE-2017-15419\nJun Kokatsu discoved an information disclosure issue.\n\nCVE-2017-15420\nWenXu Wu discovered a URL spoofing issue.\n\nCVE-2017-15423\nGreg Hudson discovered an issue in the boringssl library.\n\nCVE-2017-15424\nKhalil Zhani discovered a URL spoofing issue.\n\nCVE-2017-15425\nxisigr discovered a URL spoofing issue.\n\nCVE-2017-15426\nWenXu Wu discovered a URL spoofing issue.\n\nCVE-2017-15427\nJunaid Farhan discovered an issue with the omnibox.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"chromedriver\", ver:\"63.0.3239.84-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"chromium\", ver:\"63.0.3239.84-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"chromium-driver\", ver:\"63.0.3239.84-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"chromium-l10n\", ver:\"63.0.3239.84-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"chromium-shell\", ver:\"63.0.3239.84-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"chromium-widevine\", ver:\"63.0.3239.84-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-31T18:27:08", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-15417", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15415", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-15420"], "description": "The remote host is missing an update for the ", "modified": "2020-01-31T00:00:00", "published": "2017-12-09T00:00:00", "id": "OPENVAS:1361412562310851660", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310851660", "type": "openvas", "title": "openSUSE: Security Advisory for chromium (openSUSE-SU-2017:3244-1)", "sourceData": "# Copyright (C) 2017 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.851660\");\n script_version(\"2020-01-31T08:23:39+0000\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:23:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2017-12-09 07:39:49 +0100 (Sat, 09 Dec 2017)\");\n script_cve_id(\"CVE-2017-15408\", \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\",\n \"CVE-2017-15412\", \"CVE-2017-15413\", \"CVE-2017-15415\", \"CVE-2017-15416\",\n \"CVE-2017-15417\", \"CVE-2017-15418\", \"CVE-2017-15419\", \"CVE-2017-15420\",\n \"CVE-2017-15422\", \"CVE-2017-15423\", \"CVE-2017-15424\", \"CVE-2017-15425\",\n \"CVE-2017-15426\", \"CVE-2017-15427\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"openSUSE: Security Advisory for chromium (openSUSE-SU-2017:3244-1)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'chromium'\n package(s) announced via the referenced advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"This update to Chromium 63.0.3239.84 fixes the following security issues:\n\n - CVE-2017-15408: Heap buffer overflow in PDFium\n\n - CVE-2017-15409: Out of bounds write in Skia\n\n - CVE-2017-15410: Use after free in PDFium\n\n - CVE-2017-15411: Use after free in PDFium\n\n - CVE-2017-15412: Use after free in libXML\n\n - CVE-2017-15413: Type confusion in WebAssembly\n\n - CVE-2017-15415: Pointer information disclosure in IPC call\n\n - CVE-2017-15416: Out of bounds read in Blink\n\n - CVE-2017-15417: Cross origin information disclosure in Skia\n\n - CVE-2017-15418: Use of uninitialized value in Skia\n\n - CVE-2017-15419: Cross origin leak of redirect URL in Blink\n\n - CVE-2017-15420: URL spoofing in Omnibox\n\n - CVE-2017-15422: Integer overflow in ICU\n\n - CVE-2017-15423: Issue with SPAKE implementation in BoringSSL\n\n - CVE-2017-15424: URL Spoof in Omnibox\n\n - CVE-2017-15425: URL Spoof in Omnibox\n\n - CVE-2017-15426: URL Spoof in Omnibox\n\n - CVE-2017-15427: Insufficient blocking of JavaScript in Omnibox\");\n\n script_tag(name:\"affected\", value:\"chromium on openSUSE Leap 42.3, openSUSE Leap 42.2\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2017:3244-1\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=(openSUSELeap42\\.2|openSUSELeap42\\.3)\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap42.2\") {\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver\", rpm:\"chromedriver~63.0.3239.84~104.41.1\", rls:\"openSUSELeap42.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver-debuginfo\", rpm:\"chromedriver-debuginfo~63.0.3239.84~104.41.1\", rls:\"openSUSELeap42.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium\", rpm:\"chromium~63.0.3239.84~104.41.1\", rls:\"openSUSELeap42.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debuginfo\", rpm:\"chromium-debuginfo~63.0.3239.84~104.41.1\", rls:\"openSUSELeap42.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debugsource\", rpm:\"chromium-debugsource~63.0.3239.84~104.41.1\", rls:\"openSUSELeap42.2\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"openSUSELeap42.3\") {\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver\", rpm:\"chromedriver~63.0.3239.84~127.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver-debuginfo\", rpm:\"chromedriver-debuginfo~63.0.3239.84~127.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium\", rpm:\"chromium~63.0.3239.84~127.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debuginfo\", rpm:\"chromium-debuginfo~63.0.3239.84~127.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debugsource\", rpm:\"chromium-debugsource~63.0.3239.84~127.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:33:00", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-15417", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15429", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15407", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15415", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-15420"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2018-01-05T00:00:00", "id": "OPENVAS:1361412562310873974", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310873974", "type": "openvas", "title": "Fedora Update for chromium FEDORA-2017-c2645aa935", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2017_c2645aa935_chromium_fc27.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for chromium FEDORA-2017-c2645aa935\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.873974\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-01-05 23:59:42 +0100 (Fri, 05 Jan 2018)\");\n script_cve_id(\"CVE-2017-15412\", \"CVE-2017-15422\", \"CVE-2017-15407\", \"CVE-2017-15408\",\n \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\", \"CVE-2017-15413\",\n \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15417\", \"CVE-2017-15418\",\n \"CVE-2017-15419\", \"CVE-2017-15420\", \"CVE-2017-15423\", \"CVE-2017-15424\",\n \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2017-15427\", \"CVE-2017-15429\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for chromium FEDORA-2017-c2645aa935\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'chromium'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"chromium on Fedora 27\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_xref(name:\"FEDORA\", value:\"2017-c2645aa935\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDKVCC2YPMOARJA2KQ3Y7FNIN2JW46EH\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC27\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC27\")\n{\n\n if ((res = isrpmvuln(pkg:\"chromium\", rpm:\"chromium~63.0.3239.108~1.fc27\", rls:\"FC27\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-19T22:09:48", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-15417", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15407", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15415", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15430", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-15420"], "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2017-12-07T00:00:00", "id": "OPENVAS:1361412562310812237", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310812237", "type": "openvas", "title": "Google Chrome Security Updates(stable-channel-update-for-desktop-2017-12)-MAC OS X", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Security Updates(stable-channel-update-for-desktop-2017-12)-MAC OS X\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.812237\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2017-15407\", \"CVE-2017-15408\", \"CVE-2017-15409\", \"CVE-2017-15410\",\n \"CVE-2017-15411\", \"CVE-2017-15412\", \"CVE-2017-15413\", \"CVE-2017-15415\",\n \"CVE-2017-15416\", \"CVE-2017-15417\", \"CVE-2017-15418\", \"CVE-2017-15419\",\n \"CVE-2017-15420\", \"CVE-2017-15422\", \"CVE-2017-15423\", \"CVE-2017-15424\",\n \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2017-15427\", \"CVE-2017-15430\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2017-12-07 10:28:49 +0530 (Thu, 07 Dec 2017)\");\n script_name(\"Google Chrome Security Updates(stable-channel-update-for-desktop-2017-12)-MAC OS X\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The multiple flaws exists due to,\n\n - An out of bounds write error in in QUIC.\n\n - A heap buffer overflow error in PDFium.\n\n - An out of bounds write error in Skia.\n\n - An use after free error in PDFium.\n\n - An use after free error in libXML.\n\n - A type confusion error in WebAssembly.\n\n - Pointer information disclosure error in IPC call.\n\n - An out of bounds read error in Blink.\n\n - Cross origin information disclosure in Skia.\n\n - Use of uninitialized value in Skia.\n\n - Cross origin leak of redirect URL in Blink.\n\n - Multiple URL spoofing errors in Omnibox.\n\n - An integer overflow error in ICU.\n\n - An issue with SPAKE implementation in BoringSSL.\n\n - An insufficient blocking of JavaScript in Omnibox.\n\n - An unsafe navigation in Chromecast Plugin.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of these\n vulnerabilities will allow remote attackers to execute arbitrary script,\n conduct spoofing attacks, data corruption or denial of service an\n information leak.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version\n prior to 63.0.3239.84 on MAC OS X\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 63.0.3239.84 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_macosx.nasl\");\n script_mandatory_keys(\"GoogleChrome/MacOSX/Version\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE )) exit(0);\nvers = infos['version'];\npath = infos['location'];\n\nif(version_is_less(version:vers, test_version:\"63.0.3239.84\"))\n{\n report = report_fixed_ver( installed_version:vers, fixed_version:\"63.0.3239.84\", install_path:path );\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-19T22:09:58", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-15417", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15407", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15415", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15430", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-15420"], "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2017-12-07T00:00:00", "id": "OPENVAS:1361412562310812235", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310812235", "type": "openvas", "title": "Google Chrome Security Updates(stable-channel-update-for-desktop-2017-12)-Windows", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Security Updates(stable-channel-update-for-desktop-2017-12)-Windows\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.812235\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2017-15407\", \"CVE-2017-15408\", \"CVE-2017-15409\", \"CVE-2017-15410\",\n \"CVE-2017-15411\", \"CVE-2017-15412\", \"CVE-2017-15413\", \"CVE-2017-15415\",\n \"CVE-2017-15416\", \"CVE-2017-15417\", \"CVE-2017-15418\", \"CVE-2017-15419\",\n \"CVE-2017-15420\", \"CVE-2017-15422\", \"CVE-2017-15423\", \"CVE-2017-15424\",\n \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2017-15427\", \"CVE-2017-15430\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2017-12-07 10:28:49 +0530 (Thu, 07 Dec 2017)\");\n script_name(\"Google Chrome Security Updates(stable-channel-update-for-desktop-2017-12)-Windows\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The multiple flaws exists due to,\n\n - An out of bounds write error in in QUIC.\n\n - A heap buffer overflow error in PDFium.\n\n - An out of bounds write error in Skia.\n\n - An use after free error in PDFium.\n\n - An use after free error in libXML.\n\n - A type confusion error in WebAssembly.\n\n - Pointer information disclosure error in IPC call.\n\n - An out of bounds read error in Blink.\n\n - Cross origin information disclosure in Skia.\n\n - Use of uninitialized value in Skia.\n\n - Cross origin leak of redirect URL in Blink.\n\n - Multiple URL spoofing errors in Omnibox.\n\n - An integer overflow error in ICU.\n\n - An issue with SPAKE implementation in BoringSSL.\n\n - An insufficient blocking of JavaScript in Omnibox.\n\n - An unsafe navigation in Chromecast Plugin.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of these\n vulnerabilities will allow remote attackers to execute arbitrary script,\n conduct spoofing attacks, data corruption or denial of service and\n information leak.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version\n prior to 63.0.3239.84 on Windows\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 63.0.3239.84 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_xref(name:\"URL\", value:\"https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_portable_win.nasl\");\n script_mandatory_keys(\"GoogleChrome/Win/Ver\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE )) exit(0);\nvers = infos['version'];\npath = infos['location'];\n\nif(version_is_less(version:vers, test_version:\"63.0.3239.84\"))\n{\n report = report_fixed_ver( installed_version:vers, fixed_version:\"63.0.3239.84\", install_path:path );\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-19T22:09:53", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-15417", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15407", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15415", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15430", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-15420"], "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2017-12-07T00:00:00", "id": "OPENVAS:1361412562310812236", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310812236", "type": "openvas", "title": "Google Chrome Security Updates(stable-channel-update-for-desktop-2017-12)-Linux", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Security Updates(stable-channel-update-for-desktop-2017-12)-Linux\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.812236\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2017-15407\", \"CVE-2017-15408\", \"CVE-2017-15409\", \"CVE-2017-15410\",\n \"CVE-2017-15411\", \"CVE-2017-15412\", \"CVE-2017-15413\", \"CVE-2017-15415\",\n \"CVE-2017-15416\", \"CVE-2017-15417\", \"CVE-2017-15418\", \"CVE-2017-15419\",\n \"CVE-2017-15420\", \"CVE-2017-15422\", \"CVE-2017-15423\", \"CVE-2017-15424\",\n \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2017-15427\", \"CVE-2017-15430\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2017-12-07 10:28:49 +0530 (Thu, 07 Dec 2017)\");\n script_name(\"Google Chrome Security Updates(stable-channel-update-for-desktop-2017-12)-Linux\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The multiple flaws exists due to,\n\n - An out of bounds write error in in QUIC.\n\n - A heap buffer overflow error in PDFium.\n\n - An out of bounds write error in Skia.\n\n - An use after free error in PDFium.\n\n - An use after free error in libXML.\n\n - A type confusion error in WebAssembly.\n\n - Pointer information disclosure error in IPC call.\n\n - An out of bounds read error in Blink.\n\n - Cross origin information disclosure in Skia.\n\n - Use of uninitialized value in Skia.\n\n - Cross origin leak of redirect URL in Blink.\n\n - Multiple URL spoofing errors in Omnibox.\n\n - An integer overflow error in ICU.\n\n - An issue with SPAKE implementation in BoringSSL.\n\n - An insufficient blocking of JavaScript in Omnibox.\n\n - An unsafe navigation in Chromecast Plugin.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of these\n vulnerabilities will allow remote attackers to execute arbitrary script,\n conduct spoofing attacks, data corruption or denial of service and\n information leak.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version prior to 63.0.3239.84 on Linux\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 63.0.3239.84 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_lin.nasl\");\n script_mandatory_keys(\"Google-Chrome/Linux/Ver\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE )) exit(0);\nvers = infos['version'];\npath = infos['location'];\n\nif(version_is_less(version:vers, test_version:\"63.0.3239.84\"))\n{\n report = report_fixed_ver( installed_version:vers, fixed_version:\"63.0.3239.84\", install_path:path );\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:32:58", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5128", "CVE-2017-15417", "CVE-2017-5132", "CVE-2017-5131", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15395", "CVE-2017-15390", "CVE-2017-15429", "CVE-2017-15391", "CVE-2017-5133", "CVE-2017-15419", "CVE-2017-15399", "CVE-2017-15392", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-5125", "CVE-2017-15389", "CVE-2017-15387", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15407", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-5126", "CVE-2017-15412", "CVE-2017-15393", "CVE-2017-15415", "CVE-2017-5127", "CVE-2017-15398", "CVE-2017-15386", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15388", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-5129", "CVE-2017-15420", "CVE-2017-15394", "CVE-2017-5130", "CVE-2017-5124"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2018-01-06T00:00:00", "id": "OPENVAS:1361412562310873977", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310873977", "type": "openvas", "title": "Fedora Update for chromium FEDORA-2017-ea44f172e3", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2017_ea44f172e3_chromium_fc26.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for chromium FEDORA-2017-ea44f172e3\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.873977\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-01-06 00:00:45 +0100 (Sat, 06 Jan 2018)\");\n script_cve_id(\"CVE-2017-15412\", \"CVE-2017-15422\", \"CVE-2017-15407\", \"CVE-2017-15408\",\n \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\", \"CVE-2017-15413\",\n \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15417\", \"CVE-2017-15418\",\n \"CVE-2017-15419\", \"CVE-2017-15420\", \"CVE-2017-15423\", \"CVE-2017-15424\",\n \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2017-15427\", \"CVE-2017-15429\",\n \"CVE-2017-15398\", \"CVE-2017-15399\", \"CVE-2017-15386\", \"CVE-2017-15387\",\n \"CVE-2017-15388\", \"CVE-2017-15389\", \"CVE-2017-15390\", \"CVE-2017-15391\",\n \"CVE-2017-15392\", \"CVE-2017-15393\", \"CVE-2017-15394\", \"CVE-2017-15395\",\n \"CVE-2017-5124\", \"CVE-2017-5125\", \"CVE-2017-5126\", \"CVE-2017-5127\",\n \"CVE-2017-5133\", \"CVE-2017-5131\", \"CVE-2017-5130\", \"CVE-2017-5132\",\n \"CVE-2017-5129\", \"CVE-2017-5128\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for chromium FEDORA-2017-ea44f172e3\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'chromium'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"chromium on Fedora 26\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_xref(name:\"FEDORA\", value:\"2017-ea44f172e3\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TCX6RNONWP5H4F6S2D3GX2IVGKVND34L\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC26\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC26\")\n{\n\n if ((res = isrpmvuln(pkg:\"chromium\", rpm:\"chromium~63.0.3239.108~1.fc26\", rls:\"FC26\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:32:57", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-6034", "CVE-2017-15409", "CVE-2018-6033", "CVE-2017-15423", "CVE-2018-6031", "CVE-2018-6053", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15422", "CVE-2018-6038", "CVE-2017-15407", "CVE-2018-6054", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15415", "CVE-2018-6036", "CVE-2018-6037", "CVE-2018-6047", "CVE-2018-6041", "CVE-2018-6042", "CVE-2018-6040", "CVE-2017-15426", "CVE-2017-15416", "CVE-2017-15424", "CVE-2018-6050", "CVE-2018-6048", "CVE-2018-6052", "CVE-2018-6051"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2018-02-28T00:00:00", "id": "OPENVAS:1361412562310874155", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310874155", "type": "openvas", "title": "Fedora Update for qt5-qtwebengine FEDORA-2018-c0d3db441f", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2018_c0d3db441f_qt5-qtwebengine_fc26.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for qt5-qtwebengine FEDORA-2018-c0d3db441f\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.874155\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-02-28 08:38:39 +0100 (Wed, 28 Feb 2018)\");\n script_cve_id(\"CVE-2017-15407\", \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\",\n \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15418\", \"CVE-2017-15419\",\n \"CVE-2017-15422\", \"CVE-2017-15423\", \"CVE-2017-15424\", \"CVE-2017-15425\",\n \"CVE-2017-15426\", \"CVE-2018-6031\", \"CVE-2018-6033\", \"CVE-2018-6034\",\n \"CVE-2018-6036\", \"CVE-2018-6037\", \"CVE-2018-6038\", \"CVE-2018-6040\",\n \"CVE-2018-6041\", \"CVE-2018-6042\", \"CVE-2018-6047\", \"CVE-2018-6048\",\n \"CVE-2018-6050\", \"CVE-2018-6051\", \"CVE-2018-6052\", \"CVE-2018-6053\",\n \"CVE-2018-6054\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for qt5-qtwebengine FEDORA-2018-c0d3db441f\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'qt5-qtwebengine'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"qt5-qtwebengine on Fedora 26\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_xref(name:\"FEDORA\", value:\"2018-c0d3db441f\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMXSXUQWLJLP4VC53CAE7HL3ZUFJZY6I\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC26\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC26\")\n{\n\n if ((res = isrpmvuln(pkg:\"qt5-qtwebengine\", rpm:\"qt5-qtwebengine~5.10.1~1.fc26\", rls:\"FC26\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:33:08", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-6034", "CVE-2017-15409", "CVE-2018-6033", "CVE-2017-15423", "CVE-2018-6031", "CVE-2018-6053", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15422", "CVE-2018-6038", "CVE-2017-15407", "CVE-2018-6054", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15415", "CVE-2018-6036", "CVE-2018-6037", "CVE-2018-6047", "CVE-2018-6041", "CVE-2018-6042", "CVE-2018-6040", "CVE-2017-15426", "CVE-2017-15416", "CVE-2017-15424", "CVE-2018-6050", "CVE-2018-6048", "CVE-2018-6052", "CVE-2018-6051"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2018-02-26T00:00:00", "id": "OPENVAS:1361412562310874144", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310874144", "type": "openvas", "title": "Fedora Update for qt5-qtwebengine FEDORA-2018-e08d828ed9", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2018_e08d828ed9_qt5-qtwebengine_fc27.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for qt5-qtwebengine FEDORA-2018-e08d828ed9\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.874144\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-02-26 08:17:34 +0100 (Mon, 26 Feb 2018)\");\n script_cve_id(\"CVE-2017-15407\", \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\",\n \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15418\", \"CVE-2017-15419\",\n \"CVE-2017-15422\", \"CVE-2017-15423\", \"CVE-2017-15424\", \"CVE-2017-15425\",\n \"CVE-2017-15426\", \"CVE-2018-6031\", \"CVE-2018-6033\", \"CVE-2018-6034\",\n \"CVE-2018-6036\", \"CVE-2018-6037\", \"CVE-2018-6038\", \"CVE-2018-6040\",\n \"CVE-2018-6041\", \"CVE-2018-6042\", \"CVE-2018-6047\", \"CVE-2018-6048\",\n \"CVE-2018-6050\", \"CVE-2018-6051\", \"CVE-2018-6052\", \"CVE-2018-6053\",\n \"CVE-2018-6054\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for qt5-qtwebengine FEDORA-2018-e08d828ed9\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'qt5-qtwebengine'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"qt5-qtwebengine on Fedora 27\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_xref(name:\"FEDORA\", value:\"2018-e08d828ed9\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LGDSXXPN73LMQRMWCOGQL5XQFGUWIC7D\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC27\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC27\")\n{\n\n if ((res = isrpmvuln(pkg:\"qt5-qtwebengine\", rpm:\"qt5-qtwebengine~5.10.1~1.fc27\", rls:\"FC27\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:32:54", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-6069", "CVE-2018-6078", "CVE-2017-15417", "CVE-2018-6081", "CVE-2017-15409", "CVE-2018-6080", "CVE-2018-6083", "CVE-2017-15423", "CVE-2018-6082", "CVE-2018-6057", "CVE-2018-6070", "CVE-2018-6074", "CVE-2018-6059", "CVE-2017-15419", "CVE-2017-15425", "CVE-2018-6056", "CVE-2017-15410", "CVE-2018-6073", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15407", "CVE-2018-6061", "CVE-2017-15418", "CVE-2017-15411", "CVE-2018-6072", "CVE-2017-15412", "CVE-2017-15415", "CVE-2018-6058", "CVE-2018-6068", "CVE-2018-6065", "CVE-2018-6062", "CVE-2018-6067", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2018-6071", "CVE-2017-15396", "CVE-2018-6406", "CVE-2018-6066", "CVE-2018-6075", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-15420", "CVE-2018-6064", "CVE-2018-6077", "CVE-2018-6076", "CVE-2018-6079", "CVE-2018-6060", "CVE-2018-6063"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2018-03-28T00:00:00", "id": "OPENVAS:1361412562310874300", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310874300", "type": "openvas", "title": "Fedora Update for chromium FEDORA-2018-faff5f661e", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2018_faff5f661e_chromium_fc27.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for chromium FEDORA-2018-faff5f661e\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.874300\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-03-28 09:00:16 +0200 (Wed, 28 Mar 2018)\");\n script_cve_id(\"CVE-2017-15396\", \"CVE-2017-15407\", \"CVE-2017-15408\", \"CVE-2017-15409\",\n \"CVE-2017-15410\", \"CVE-2017-15411\", \"CVE-2017-15412\", \"CVE-2017-15413\",\n \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15417\", \"CVE-2017-15418\",\n \"CVE-2017-15419\", \"CVE-2017-15420\", \"CVE-2017-15422\", \"CVE-2018-6056\",\n \"CVE-2018-6406\", \"CVE-2018-6057\", \"CVE-2018-6058\", \"CVE-2018-6059\",\n \"CVE-2018-6060\", \"CVE-2018-6061\", \"CVE-2018-6062\", \"CVE-2018-6063\",\n \"CVE-2018-6064\", \"CVE-2018-6065\", \"CVE-2018-6066\", \"CVE-2018-6067\",\n \"CVE-2018-6068\", \"CVE-2018-6069\", \"CVE-2018-6070\", \"CVE-2018-6071\",\n \"CVE-2018-6083\", \"CVE-2018-6082\", \"CVE-2018-6081\", \"CVE-2018-6080\",\n \"CVE-2018-6079\", \"CVE-2018-6078\", \"CVE-2018-6077\", \"CVE-2018-6076\",\n \"CVE-2018-6075\", \"CVE-2018-6074\", \"CVE-2018-6073\", \"CVE-2018-6072\",\n \"CVE-2017-15427\", \"CVE-2017-15426\", \"CVE-2017-15425\", \"CVE-2017-15424\",\n \"CVE-2017-15423\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for chromium FEDORA-2018-faff5f661e\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'chromium'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"chromium on Fedora 27\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_xref(name:\"FEDORA\", value:\"2018-faff5f661e\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XCBSSV5ZSWY3Q4NKEKL22B4MOSHCBKVN\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC27\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC27\")\n{\n\n if ((res = isrpmvuln(pkg:\"chromium\", rpm:\"chromium~65.0.3325.181~1.fc27\", rls:\"FC27\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "debian": [{"lastseen": "2019-05-30T02:21:33", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15417", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15427", "CVE-2017-15407", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15415", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-15420"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4064-1 security@debian.org\nhttps://www.debian.org/security/ Michael Gilbert\nDecember 12, 2017 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : chromium-browser\nCVE ID : CVE-2017-15407 CVE-2017-15408 CVE-2017-15409 CVE-2017-15410\n CVE-2017-15411 CVE-2017-15413 CVE-2017-15415 CVE-2017-15416\n CVE-2017-15417 CVE-2017-15418 CVE-2017-15419 CVE-2017-15420\n CVE-2017-15423 CVE-2017-15424 CVE-2017-15425 CVE-2017-15426\n CVE-2017-15427\n\nSeveral vulnerabilities have been discovered in the chromium web browser.\n\nCVE-2017-15407\n\n Ned Williamson discovered an out-of-bounds write issue.\n\nCVE-2017-15408\n\n Ke Liu discovered a heap overflow issue in the pdfium library.\n\nCVE-2017-15409\n\n An out-of-bounds write issue was discovered in the skia library.\n\nCVE-2017-15410\n\n Luat Nguyen discovered a use-after-free issue in the pdfium library.\n\nCVE-2017-15411\n\n Luat Nguyen discovered a use-after-free issue in the pdfium library.\n\nCVE-2017-15413\n\n Gaurav Dewan discovered a type confusion issue.\n\nCVE-2017-15415\n\n Viktor Brange discovered an information disclosure issue.\n\nCVE-2017-15416\n\n Ned Williamson discovered an out-of-bounds read issue.\n\nCVE-2017-15417\n\n Max May discovered an information disclosure issue in the skia\n library.\n\nCVE-2017-15418\n\n Kushal Arvind Shah discovered an uninitialized value in the skia\n library.\n\nCVE-2017-15419\n\n Jun Kokatsu discoved an information disclosure issue.\n\nCVE-2017-15420\n\n WenXu Wu discovered a URL spoofing issue.\n\nCVE-2017-15423\n\n Greg Hudson discovered an issue in the boringssl library.\n\nCVE-2017-15424\n\n Khalil Zhani discovered a URL spoofing issue.\n\nCVE-2017-15425\n\n xisigr discovered a URL spoofing issue.\n\nCVE-2017-15426\n\n WenXu Wu discovered a URL spoofing issue.\n\nCVE-2017-15427\n\n Junaid Farhan discovered an issue with the omnibox.\n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 63.0.3239.84-1~deb9u1.\n\nWe recommend that you upgrade your chromium-browser packages.\n\nFor the detailed security status of chromium-browser please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/chromium-browser\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 4, "modified": "2017-12-12T11:04:40", "published": "2017-12-12T11:04:40", "id": "DEBIAN:DSA-4064-1:25480", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2017/msg00327.html", "title": "[SECURITY] [DSA 4064-1] chromium-browser security update", "type": "debian", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-08-12T01:01:26", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15422"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4150-1 security@debian.org\nhttps://www.debian.org/security/ Moritz Muehlenhoff\nMarch 23, 2018 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : icu\nCVE ID : CVE-2017-15422\n\nIt was discovered that an integer overflow in the International\nComponents for Unicode (ICU) library could result in denial of service\nand potentially the execution of arbitrary code.\n\nFor the oldstable distribution (jessie), this problem has been fixed\nin version 52.1-8+deb8u7.\n\nFor the stable distribution (stretch), this problem has been fixed in\nversion 57.1-6+deb9u2.\n\nWe recommend that you upgrade your icu packages.\n\nFor the detailed security status of icu please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/icu\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 17, "modified": "2018-03-23T18:47:24", "published": "2018-03-23T18:47:24", "id": "DEBIAN:DSA-4150-1:2E864", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2018/msg00076.html", "title": "[SECURITY] [DSA 4150-1] icu security update", "type": "debian", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-30T02:21:17", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15412"], "description": "Package : libxml2\nVersion : 2.8.0+dfsg1-7+wheezy12\nCVE ID : CVE-2017-15412\n\n\nCVE-2017-15412\n It was detected that some function calls in the XPath extensions\n functions could result in memory corruption due to "use after free".\n\n\nFor Debian 7 "Wheezy", these problems have been fixed in version\n2.8.0+dfsg1-7+wheezy12.\n\nWe recommend that you upgrade your libxml2 packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n", "edition": 4, "modified": "2017-12-18T18:20:29", "published": "2017-12-18T18:20:29", "id": "DEBIAN:DLA-1211-1:EA9E0", "href": "https://lists.debian.org/debian-lts-announce/2017/debian-lts-announce-201712/msg00014.html", "title": "[SECURITY] [DLA 1211-1] libxml2 security update", "type": "debian", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-08-12T00:51:10", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15412"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4086-1 security@debian.org\nhttps://www.debian.org/security/ Salvatore Bonaccorso\nJanuary 13, 2018 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : libxml2\nCVE ID : CVE-2017-15412\nDebian Bug : 883790\n\nNick Wellnhofer discovered that certain function calls inside XPath\npredicates can lead to use-after-free and double-free errors when\nexecuted by libxml2's XPath engine via an XSLT transformation.\n\nFor the oldstable distribution (jessie), this problem has been fixed\nin version 2.9.1+dfsg1-5+deb8u6.\n\nFor the stable distribution (stretch), this problem has been fixed in\nversion 2.9.4+dfsg1-2.2+deb9u2.\n\nWe recommend that you upgrade your libxml2 packages.\n\nFor the detailed security status of libxml2 please refer to its security\ntracker page at:\nhttps://security-tracker.debian.org/tracker/libxml2\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 13, "modified": "2018-01-13T16:47:13", "published": "2018-01-13T16:47:13", "id": "DEBIAN:DSA-4086-1:58F72", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2018/msg00008.html", "title": "[SECURITY] [DSA 4086-1] libxml2 security update", "type": "debian", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2021-01-06T09:51:11", "description": "Several vulnerabilities have been discovered in the chromium web\nbrowser.\n\n - CVE-2017-15407\n Ned Williamson discovered an out-of-bounds write issue.\n\n - CVE-2017-15408\n Ke Liu discovered a heap overflow issue in the pdfium\n library.\n\n - CVE-2017-15409\n An out-of-bounds write issue was discovered in the skia\n library.\n\n - CVE-2017-15410\n Luat Nguyen discovered a use-after-free issue in the\n pdfium library.\n\n - CVE-2017-15411\n Luat Nguyen discovered a use-after-free issue in the\n pdfium library.\n\n - CVE-2017-15413\n Gaurav Dewan discovered a type confusion issue.\n\n - CVE-2017-15415\n Viktor Brange discovered an information disclosure\n issue.\n\n - CVE-2017-15416\n Ned Williamson discovered an out-of-bounds read issue.\n\n - CVE-2017-15417\n Max May discovered an information disclosure issue in\n the skia library.\n\n - CVE-2017-15418\n Kushal Arvind Shah discovered an uninitialized value in\n the skia library.\n\n - CVE-2017-15419\n Jun Kokatsu discoved an information disclosure issue.\n\n - CVE-2017-15420\n WenXu Wu discovered a URL spoofing issue.\n\n - CVE-2017-15423\n Greg Hudson discovered an issue in the boringssl\n library.\n\n - CVE-2017-15424\n Khalil Zhani discovered a URL spoofing issue.\n\n - CVE-2017-15425\n xisigr discovered a URL spoofing issue.\n\n - CVE-2017-15426\n WenXu Wu discovered a URL spoofing issue.\n\n - CVE-2017-15427\n Junaid Farhan discovered an issue with the omnibox.", "edition": 28, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2017-12-13T00:00:00", "title": "Debian DSA-4064-1 : chromium-browser - security update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-15417", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15427", "CVE-2017-15407", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15415", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-15420"], "modified": "2017-12-13T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:chromium-browser", "cpe:/o:debian:debian_linux:9.0"], "id": "DEBIAN_DSA-4064.NASL", "href": "https://www.tenable.com/plugins/nessus/105195", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-4064. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(105195);\n script_version(\"3.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2017-15407\", \"CVE-2017-15408\", \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\", \"CVE-2017-15413\", \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15417\", \"CVE-2017-15418\", \"CVE-2017-15419\", \"CVE-2017-15420\", \"CVE-2017-15423\", \"CVE-2017-15424\", \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2017-15427\");\n script_xref(name:\"DSA\", value:\"4064\");\n\n script_name(english:\"Debian DSA-4064-1 : chromium-browser - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities have been discovered in the chromium web\nbrowser.\n\n - CVE-2017-15407\n Ned Williamson discovered an out-of-bounds write issue.\n\n - CVE-2017-15408\n Ke Liu discovered a heap overflow issue in the pdfium\n library.\n\n - CVE-2017-15409\n An out-of-bounds write issue was discovered in the skia\n library.\n\n - CVE-2017-15410\n Luat Nguyen discovered a use-after-free issue in the\n pdfium library.\n\n - CVE-2017-15411\n Luat Nguyen discovered a use-after-free issue in the\n pdfium library.\n\n - CVE-2017-15413\n Gaurav Dewan discovered a type confusion issue.\n\n - CVE-2017-15415\n Viktor Brange discovered an information disclosure\n issue.\n\n - CVE-2017-15416\n Ned Williamson discovered an out-of-bounds read issue.\n\n - CVE-2017-15417\n Max May discovered an information disclosure issue in\n the skia library.\n\n - CVE-2017-15418\n Kushal Arvind Shah discovered an uninitialized value in\n the skia library.\n\n - CVE-2017-15419\n Jun Kokatsu discoved an information disclosure issue.\n\n - CVE-2017-15420\n WenXu Wu discovered a URL spoofing issue.\n\n - CVE-2017-15423\n Greg Hudson discovered an issue in the boringssl\n library.\n\n - CVE-2017-15424\n Khalil Zhani discovered a URL spoofing issue.\n\n - CVE-2017-15425\n xisigr discovered a URL spoofing issue.\n\n - CVE-2017-15426\n WenXu Wu discovered a URL spoofing issue.\n\n - CVE-2017-15427\n Junaid Farhan discovered an issue with the omnibox.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15407\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15408\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15409\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15410\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15411\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15413\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15415\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15416\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15417\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15418\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15419\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15420\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15423\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15424\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15425\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15426\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-15427\"\n );\n # https://security-tracker.debian.org/tracker/source-package/chromium-browser\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?e33901a2\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/stretch/chromium-browser\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2017/dsa-4064\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the chromium-browser packages.\n\nFor the stable distribution (stretch), these problems have been fixed\nin version 63.0.3239.84-1~deb9u1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:chromium-browser\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:9.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/08/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/12/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/12/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"9.0\", prefix:\"chromedriver\", reference:\"63.0.3239.84-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"chromium\", reference:\"63.0.3239.84-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"chromium-driver\", reference:\"63.0.3239.84-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"chromium-l10n\", reference:\"63.0.3239.84-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"chromium-shell\", reference:\"63.0.3239.84-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"chromium-widevine\", reference:\"63.0.3239.84-1~deb9u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-20T12:31:36", "description": "This update to Chromium 63.0.3239.84 fixes the following security\nissues :\n\n - CVE-2017-15408: Heap buffer overflow in PDFium\n\n - CVE-2017-15409: Out of bounds write in Skia\n\n - CVE-2017-15410: Use after free in PDFium\n\n - CVE-2017-15411: Use after free in PDFium\n\n - CVE-2017-15412: Use after free in libXML\n\n - CVE-2017-15413: Type confusion in WebAssembly\n\n - CVE-2017-15415: Pointer information disclosure in IPC\n call\n\n - CVE-2017-15416: Out of bounds read in Blink\n\n - CVE-2017-15417: Cross origin information disclosure in\n Skia\n\n - CVE-2017-15418: Use of uninitialized value in Skia\n\n - CVE-2017-15419: Cross origin leak of redirect URL in\n Blink\n\n - CVE-2017-15420: URL spoofing in Omnibox\n\n - CVE-2017-15422: Integer overflow in ICU\n\n - CVE-2017-15423: Issue with SPAKE implementation in\n BoringSSL\n\n - CVE-2017-15424: URL Spoof in Omnibox\n\n - CVE-2017-15425: URL Spoof in Omnibox\n\n - CVE-2017-15426: URL Spoof in Omnibox\n\n - CVE-2017-15427: Insufficient blocking of JavaScript in\n Omnibox", "edition": 18, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2017-12-14T00:00:00", "title": "openSUSE Security Update : chromium (openSUSE-2017-1349)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-15417", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15415", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-15420"], "modified": "2017-12-14T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:chromedriver-debuginfo", "p-cpe:/a:novell:opensuse:chromium", "p-cpe:/a:novell:opensuse:chromium-debugsource", "p-cpe:/a:novell:opensuse:chromedriver", "cpe:/o:novell:opensuse:42.3", "cpe:/o:novell:opensuse:42.2", "p-cpe:/a:novell:opensuse:chromium-debuginfo"], "id": "OPENSUSE-2017-1349.NASL", "href": "https://www.tenable.com/plugins/nessus/105235", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2017-1349.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(105235);\n script_version(\"3.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2017-15408\", \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\", \"CVE-2017-15412\", \"CVE-2017-15413\", \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15417\", \"CVE-2017-15418\", \"CVE-2017-15419\", \"CVE-2017-15420\", \"CVE-2017-15422\", \"CVE-2017-15423\", \"CVE-2017-15424\", \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2017-15427\");\n\n script_name(english:\"openSUSE Security Update : chromium (openSUSE-2017-1349)\");\n script_summary(english:\"Check for the openSUSE-2017-1349 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update to Chromium 63.0.3239.84 fixes the following security\nissues :\n\n - CVE-2017-15408: Heap buffer overflow in PDFium\n\n - CVE-2017-15409: Out of bounds write in Skia\n\n - CVE-2017-15410: Use after free in PDFium\n\n - CVE-2017-15411: Use after free in PDFium\n\n - CVE-2017-15412: Use after free in libXML\n\n - CVE-2017-15413: Type confusion in WebAssembly\n\n - CVE-2017-15415: Pointer information disclosure in IPC\n call\n\n - CVE-2017-15416: Out of bounds read in Blink\n\n - CVE-2017-15417: Cross origin information disclosure in\n Skia\n\n - CVE-2017-15418: Use of uninitialized value in Skia\n\n - CVE-2017-15419: Cross origin leak of redirect URL in\n Blink\n\n - CVE-2017-15420: URL spoofing in Omnibox\n\n - CVE-2017-15422: Integer overflow in ICU\n\n - CVE-2017-15423: Issue with SPAKE implementation in\n BoringSSL\n\n - CVE-2017-15424: URL Spoof in Omnibox\n\n - CVE-2017-15425: URL Spoof in Omnibox\n\n - CVE-2017-15426: URL Spoof in Omnibox\n\n - CVE-2017-15427: Insufficient blocking of JavaScript in\n Omnibox\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1071691\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected chromium packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/12/14\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE42\\.2|SUSE42\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"42.2 / 42.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE42.2\", reference:\"chromedriver-63.0.3239.84-104.41.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"chromedriver-debuginfo-63.0.3239.84-104.41.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"chromium-63.0.3239.84-104.41.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"chromium-debuginfo-63.0.3239.84-104.41.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"chromium-debugsource-63.0.3239.84-104.41.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"chromedriver-63.0.3239.84-127.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"chromedriver-debuginfo-63.0.3239.84-127.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"chromium-63.0.3239.84-127.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"chromium-debuginfo-63.0.3239.84-127.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"chromium-debugsource-63.0.3239.84-127.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromedriver / chromedriver-debuginfo / chromium / etc\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T10:13:21", "description": "Security fix for CVE-2017-15412 CVE-2017-15422 CVE-2017-15407\nCVE-2017-15408 CVE-2017-15409 CVE-2017-15410 CVE-2017-15411\nCVE-2017-15413 CVE-2017-15415 CVE-2017-15416 CVE-2017-15417\nCVE-2017-15418 CVE-2017-15419 CVE-2017-15420 CVE-2017-15423\nCVE-2017-15424 CVE-2017-15425 CVE-2017-15426 CVE-2017-15427\nCVE-2017-15429\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 20, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2018-01-15T00:00:00", "title": "Fedora 27 : chromium (2017-c2645aa935)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-15417", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15429", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15407", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15415", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-15420"], "modified": "2018-01-15T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:27", "p-cpe:/a:fedoraproject:fedora:chromium"], "id": "FEDORA_2017-C2645AA935.NASL", "href": "https://www.tenable.com/plugins/nessus/105968", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2017-c2645aa935.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(105968);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2017-15407\", \"CVE-2017-15408\", \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\", \"CVE-2017-15412\", \"CVE-2017-15413\", \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15417\", \"CVE-2017-15418\", \"CVE-2017-15419\", \"CVE-2017-15420\", \"CVE-2017-15422\", \"CVE-2017-15423\", \"CVE-2017-15424\", \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2017-15427\", \"CVE-2017-15429\");\n script_xref(name:\"FEDORA\", value:\"2017-c2645aa935\");\n\n script_name(english:\"Fedora 27 : chromium (2017-c2645aa935)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Security fix for CVE-2017-15412 CVE-2017-15422 CVE-2017-15407\nCVE-2017-15408 CVE-2017-15409 CVE-2017-15410 CVE-2017-15411\nCVE-2017-15413 CVE-2017-15415 CVE-2017-15416 CVE-2017-15417\nCVE-2017-15418 CVE-2017-15419 CVE-2017-15420 CVE-2017-15423\nCVE-2017-15424 CVE-2017-15425 CVE-2017-15426 CVE-2017-15427\nCVE-2017-15429\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2017-c2645aa935\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected chromium package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:27\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/08/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/01/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/01/15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^27([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 27\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC27\", reference:\"chromium-63.0.3239.108-1.fc27\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromium\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-02-01T03:05:46", "description": "The remote host is affected by the vulnerability described in GLSA-201801-03\n(Chromium, Google Chrome: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Chromium and Google\n Chrome. Please review the CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker could possibly execute arbitrary code with the\n privileges of the process, cause a Denial of Service condition, bypass\n content security controls, or conduct URL spoofing.\n \nWorkaround :\n\n There are no known workarounds at this time.", "edition": 26, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2018-01-08T00:00:00", "title": "GLSA-201801-03 : Chromium, Google Chrome: Multiple vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-15417", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15429", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15407", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15415", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-15420"], "modified": "2021-02-02T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:google-chrome", "p-cpe:/a:gentoo:linux:chromium"], "id": "GENTOO_GLSA-201801-03.NASL", "href": "https://www.tenable.com/plugins/nessus/105629", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201801-03.\n#\n# The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(105629);\n script_version(\"3.6\");\n script_cvs_date(\"Date: 2018/10/25 11:32:02\");\n\n script_cve_id(\"CVE-2017-15407\", \"CVE-2017-15408\", \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\", \"CVE-2017-15412\", \"CVE-2017-15413\", \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15417\", \"CVE-2017-15418\", \"CVE-2017-15419\", \"CVE-2017-15420\", \"CVE-2017-15422\", \"CVE-2017-15423\", \"CVE-2017-15424\", \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2017-15427\", \"CVE-2017-15429\");\n script_xref(name:\"GLSA\", value:\"201801-03\");\n\n script_name(english:\"GLSA-201801-03 : Chromium, Google Chrome: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201801-03\n(Chromium, Google Chrome: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Chromium and Google\n Chrome. Please review the CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker could possibly execute arbitrary code with the\n privileges of the process, cause a Denial of Service condition, bypass\n content security controls, or conduct URL spoofing.\n \nWorkaround :\n\n There are no known workarounds at this time.\"\n );\n # https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?98a7b4bd\"\n );\n # https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop_14.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?125c6f30\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201801-03\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Chromium users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose\n '>=www-client/chromium-63.0.3239.108'\n All Google Chrome users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose\n '>=www-client/google-chrome-63.0.3239.108'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:google-chrome\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/01/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/01/08\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"www-client/chromium\", unaffected:make_list(\"ge 63.0.3239.108\"), vulnerable:make_list(\"lt 63.0.3239.108\"))) flag++;\nif (qpkg_check(package:\"www-client/google-chrome\", unaffected:make_list(\"ge 63.0.3239.108\"), vulnerable:make_list(\"lt 63.0.3239.108\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Chromium / Google Chrome\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-02-01T03:47:44", "description": "The version of Google Chrome installed on the remote macOS or Mac OS X\nhost is prior to 63.0.3239.84. It is, therefore, affected by multiple\nvulnerabilities as noted in Chrome stable channel update release notes\nfor Wednesday, December 6, 2017. Please refer to the release notes for\nadditional information.\n\nNote that Nessus has not attempted to exploit these issues but has\ninstead relied only on the application's self-reported version number.", "edition": 29, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2017-12-11T00:00:00", "title": "Google Chrome < 63.0.3239.84 Multiple Vulnerabilities (macOS)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-15417", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15407", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15415", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-15420", "CVE-2017-15414"], "modified": "2021-02-02T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "MACOSX_GOOGLE_CHROME_63_0_3239_84.NASL", "href": "https://www.tenable.com/plugins/nessus/105153", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(105153);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/11/12\");\n\n script_cve_id(\n \"CVE-2017-15407\",\n \"CVE-2017-15408\",\n \"CVE-2017-15409\",\n \"CVE-2017-15410\",\n \"CVE-2017-15411\",\n \"CVE-2017-15412\",\n \"CVE-2017-15413\",\n \"CVE-2017-15414\",\n \"CVE-2017-15415\",\n \"CVE-2017-15416\",\n \"CVE-2017-15417\",\n \"CVE-2017-15418\",\n \"CVE-2017-15419\",\n \"CVE-2017-15420\",\n \"CVE-2017-15422\",\n \"CVE-2017-15423\",\n \"CVE-2017-15424\",\n \"CVE-2017-15425\",\n \"CVE-2017-15426\",\n \"CVE-2017-15427\"\n );\n\n script_name(english:\"Google Chrome < 63.0.3239.84 Multiple Vulnerabilities (macOS)\");\n script_summary(english:\"Checks the version of Google Chrome.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A web browser installed on the remote macOS or Mac OS X host is\naffected by multiple unspecified vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote macOS or Mac OS X\nhost is prior to 63.0.3239.84. It is, therefore, affected by multiple\nvulnerabilities as noted in Chrome stable channel update release notes\nfor Wednesday, December 6, 2017. Please refer to the release notes for\nadditional information.\n\nNote that Nessus has not attempted to exploit these issues but has\ninstead relied only on the application's self-reported version number.\");\n # https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?98a7b4bd\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome version 63.0.3239.84 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2017-15413\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/12/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/12/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/12/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_google_chrome_installed.nbin\");\n script_require_keys(\"MacOSX/Google Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"MacOSX/Google Chrome/Installed\");\n\ngoogle_chrome_check_version(fix:'63.0.3239.84', severity:SECURITY_WARNING);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-02-01T02:46:11", "description": "Google Chrome Releases reports :\n\n37 security fixes in this release, including :\n\n- [778505] Critical CVE-2017-15407: Out of bounds write in QUIC.\nReported by Ned Williamson on 2017-10-26\n\n- [762374] High CVE-2017-15408: Heap buffer overflow in PDFium.\nReported by Ke Liu of Tencent's Xuanwu LAB on 2017-09-06\n\n- [763972] High CVE-2017-15409: Out of bounds write in Skia. Reported\nby Anonymous on 2017-09-11\n\n- [765921] High CVE-2017-15410: Use after free in PDFium. Reported by\nLuat Nguyen of KeenLab, Tencent on 2017-09-16\n\n- [770148] High CVE-2017-15411: Use after free in PDFium. Reported by\nLuat Nguyen of KeenLab, Tencent on 2017-09-29\n\n- [727039] High CVE-2017-15412: Use after free in libXML. Reported by\nNick Wellnhofer on 2017-05-27\n\n- [766666] High CVE-2017-15413: Type confusion in WebAssembly.\nReported by Gaurav Dewan of Adobe Systems India Pvt. Ltd. on\n2017-09-19\n\n- [765512] Medium CVE-2017-15415: Pointer information disclosure in\nIPC call. Reported by Viktor Brange of Microsoft Offensive Security\nResearch Team on 2017-09-15\n\n- [779314] Medium CVE-2017-15416: Out of bounds read in Blink.\nReported by Ned Williamson on 2017-10-28\n\n- [699028] Medium CVE-2017-15417: Cross origin information disclosure\nin Skia. Reported by Max May on 2017-03-07\n\n- [765858] Medium CVE-2017-15418: Use of uninitialized value in Skia.\nReported by Kushal Arvind Shah of Fortinet's FortiGuard Labs on\n2017-09-15\n\n- [780312] Medium CVE-2017-15419: Cross origin leak of redirect URL in\nBlink. Reported by Jun Kokatsu on 2017-10-31\n\n- [777419] Medium CVE-2017-15420: URL spoofing in Omnibox. Reported by\nWenXu Wu of Tencent's Xuanwu Lab on 2017-10-23\n\n- [774382] Medium CVE-2017-15422: Integer overflow in ICU. Reported by\nYuan Deng of Ant-financial Light-Year Security Lab on 2017-10-13\n\n- [780484] Medium CVE-2017-15430: Unsafe navigation in Chromecast\nPlugin. Reported by jinmo123 on 2017-01-11\n\n- [778101] Low CVE-2017-15423: Issue with SPAKE implementation in\nBoringSSL. Reported by Greg Hudson on 2017-10-25\n\n- [756226] Low CVE-2017-15424: URL Spoof in Omnibox. Reported by\nKhalil Zhani on 2017-08-16\n\n- [756456] Low CVE-2017-15425: URL Spoof in Omnibox. Reported by\nxisigr of Tencent's Xuanwu Lab on 2017-08-17\n\n- [757735] Low CVE-2017-15426: URL Spoof in Omnibox. Reported by WenXu\nWu of Tencent's Xuanwu Lab on 2017-08-18\n\n- [768910] Low CVE-2017-15427: Insufficient blocking of JavaScript in\nOmnibox. Reported by Junaid Farhan on 2017-09-26\n\n- [792099] Various fixes from internal audits, fuzzing and other\ninitiatives", "edition": 26, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2018-01-23T00:00:00", "title": "FreeBSD : chromium -- multiple vulnerabilities (1d951e85-ffdb-11e7-8b91-e8e0b747a45a)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-15417", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15407", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15415", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15430", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-15420"], "modified": "2021-02-02T00:00:00", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:chromium"], "id": "FREEBSD_PKG_1D951E85FFDB11E78B91E8E0B747A45A.NASL", "href": "https://www.tenable.com/plugins/nessus/106236", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2019 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(106236);\n script_version(\"3.6\");\n script_cvs_date(\"Date: 2019/07/10 16:04:13\");\n\n script_cve_id(\"CVE-2017-15407\", \"CVE-2017-15408\", \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\", \"CVE-2017-15412\", \"CVE-2017-15413\", \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15417\", \"CVE-2017-15418\", \"CVE-2017-15419\", \"CVE-2017-15420\", \"CVE-2017-15422\", \"CVE-2017-15423\", \"CVE-2017-15424\", \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2017-15427\", \"CVE-2017-15430\");\n\n script_name(english:\"FreeBSD : chromium -- multiple vulnerabilities (1d951e85-ffdb-11e7-8b91-e8e0b747a45a)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Google Chrome Releases reports :\n\n37 security fixes in this release, including :\n\n- [778505] Critical CVE-2017-15407: Out of bounds write in QUIC.\nReported by Ned Williamson on 2017-10-26\n\n- [762374] High CVE-2017-15408: Heap buffer overflow in PDFium.\nReported by Ke Liu of Tencent's Xuanwu LAB on 2017-09-06\n\n- [763972] High CVE-2017-15409: Out of bounds write in Skia. Reported\nby Anonymous on 2017-09-11\n\n- [765921] High CVE-2017-15410: Use after free in PDFium. Reported by\nLuat Nguyen of KeenLab, Tencent on 2017-09-16\n\n- [770148] High CVE-2017-15411: Use after free in PDFium. Reported by\nLuat Nguyen of KeenLab, Tencent on 2017-09-29\n\n- [727039] High CVE-2017-15412: Use after free in libXML. Reported by\nNick Wellnhofer on 2017-05-27\n\n- [766666] High CVE-2017-15413: Type confusion in WebAssembly.\nReported by Gaurav Dewan of Adobe Systems India Pvt. Ltd. on\n2017-09-19\n\n- [765512] Medium CVE-2017-15415: Pointer information disclosure in\nIPC call. Reported by Viktor Brange of Microsoft Offensive Security\nResearch Team on 2017-09-15\n\n- [779314] Medium CVE-2017-15416: Out of bounds read in Blink.\nReported by Ned Williamson on 2017-10-28\n\n- [699028] Medium CVE-2017-15417: Cross origin information disclosure\nin Skia. Reported by Max May on 2017-03-07\n\n- [765858] Medium CVE-2017-15418: Use of uninitialized value in Skia.\nReported by Kushal Arvind Shah of Fortinet's FortiGuard Labs on\n2017-09-15\n\n- [780312] Medium CVE-2017-15419: Cross origin leak of redirect URL in\nBlink. Reported by Jun Kokatsu on 2017-10-31\n\n- [777419] Medium CVE-2017-15420: URL spoofing in Omnibox. Reported by\nWenXu Wu of Tencent's Xuanwu Lab on 2017-10-23\n\n- [774382] Medium CVE-2017-15422: Integer overflow in ICU. Reported by\nYuan Deng of Ant-financial Light-Year Security Lab on 2017-10-13\n\n- [780484] Medium CVE-2017-15430: Unsafe navigation in Chromecast\nPlugin. Reported by jinmo123 on 2017-01-11\n\n- [778101] Low CVE-2017-15423: Issue with SPAKE implementation in\nBoringSSL. Reported by Greg Hudson on 2017-10-25\n\n- [756226] Low CVE-2017-15424: URL Spoof in Omnibox. Reported by\nKhalil Zhani on 2017-08-16\n\n- [756456] Low CVE-2017-15425: URL Spoof in Omnibox. Reported by\nxisigr of Tencent's Xuanwu Lab on 2017-08-17\n\n- [757735] Low CVE-2017-15426: URL Spoof in Omnibox. Reported by WenXu\nWu of Tencent's Xuanwu Lab on 2017-08-18\n\n- [768910] Low CVE-2017-15427: Insufficient blocking of JavaScript in\nOmnibox. Reported by Junaid Farhan on 2017-09-26\n\n- [792099] Various fixes from internal audits, fuzzing and other\ninitiatives\"\n );\n # https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?98a7b4bd\"\n );\n # https://vuxml.freebsd.org/freebsd/1d951e85-ffdb-11e7-8b91-e8e0b747a45a.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5706b5c2\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/12/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/01/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/01/23\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"chromium<63.0.3239.84\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-02-01T03:20:14", "description": "The version of Google Chrome installed on the remote Windows host is\nprior to 63.0.3239.84. It is, therefore, affected by multiple\nvulnerabilities as noted in Chrome stable channel update release\nnotes for Wednesday, December 6, 2017. Please refer to the release\nnotes for additional information.\n\nNote that Nessus has not attempted to exploit these issues but has\ninstead relied only on the application's self-reported version number.", "edition": 29, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2017-12-11T00:00:00", "title": "Google Chrome < 63.0.3239.84 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-15417", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15407", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15415", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-15420", "CVE-2017-15414"], "modified": "2021-02-02T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "GOOGLE_CHROME_63_0_3239_84.NASL", "href": "https://www.tenable.com/plugins/nessus/105152", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(105152);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/11/12\");\n\n script_cve_id(\n \"CVE-2017-15407\",\n \"CVE-2017-15408\",\n \"CVE-2017-15409\",\n \"CVE-2017-15410\",\n \"CVE-2017-15411\",\n \"CVE-2017-15412\",\n \"CVE-2017-15413\",\n \"CVE-2017-15414\",\n \"CVE-2017-15415\",\n \"CVE-2017-15416\",\n \"CVE-2017-15417\",\n \"CVE-2017-15418\",\n \"CVE-2017-15419\",\n \"CVE-2017-15420\",\n \"CVE-2017-15422\",\n \"CVE-2017-15423\",\n \"CVE-2017-15424\",\n \"CVE-2017-15425\",\n \"CVE-2017-15426\",\n \"CVE-2017-15427\"\n );\n\n script_name(english:\"Google Chrome < 63.0.3239.84 Multiple Vulnerabilities\");\n script_summary(english:\"Checks the version of Google Chrome.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A web browser installed on the remote Windows host is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote Windows host is\nprior to 63.0.3239.84. It is, therefore, affected by multiple\nvulnerabilities as noted in Chrome stable channel update release\nnotes for Wednesday, December 6, 2017. Please refer to the release\nnotes for additional information.\n\nNote that Nessus has not attempted to exploit these issues but has\ninstead relied only on the application's self-reported version number.\");\n # https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?98a7b4bd\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome version 63.0.3239.84 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2017-15413\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/12/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/12/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/12/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"google_chrome_installed.nasl\");\n script_require_keys(\"SMB/Google_Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"SMB/Google_Chrome/Installed\");\ninstalls = get_kb_list(\"SMB/Google_Chrome/*\");\n\ngoogle_chrome_check_version(installs:installs, fix:'63.0.3239.84', severity:SECURITY_WARNING);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T10:14:20", "description": "Security fix for CVE-2017-15412 CVE-2017-15422 CVE-2017-15407\nCVE-2017-15408 CVE-2017-15409 CVE-2017-15410 CVE-2017-15411\nCVE-2017-15413 CVE-2017-15415 CVE-2017-15416 CVE-2017-15417\nCVE-2017-15418 CVE-2017-15419 CVE-2017-15420 CVE-2017-15423\nCVE-2017-15424 CVE-2017-15425 CVE-2017-15426 CVE-2017-15427\nCVE-2017-15429\n\n----\n\nSecurity fix for CVE-2017-15398, CVE-2017-15399\n\n----\n\nSecurity fix for CVE-2017-15386 CVE-2017-15387 CVE-2017-15388\nCVE-2017-15389 CVE-2017-15390 CVE-2017-15391 CVE-2017-15392\nCVE-2017-15393 CVE-2017-15394 CVE-2017-15395 CVE-2017-5124\nCVE-2017-5125 CVE-2017-5126 CVE-2017-5127.\n\nBuild switched to use gtk3.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 25, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-01-02T00:00:00", "title": "Fedora 26 : chromium (2017-ea44f172e3)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5128", "CVE-2017-15417", "CVE-2017-5132", "CVE-2017-5131", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15395", "CVE-2017-15390", "CVE-2017-15429", "CVE-2017-15391", "CVE-2017-5133", "CVE-2017-15419", "CVE-2017-15399", "CVE-2017-15392", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-5125", "CVE-2017-15389", "CVE-2017-15387", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15407", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-5126", "CVE-2017-15412", "CVE-2017-15393", "CVE-2017-15415", "CVE-2017-5127", "CVE-2017-15398", "CVE-2017-15386", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15388", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-5129", "CVE-2017-15420", "CVE-2017-15394", "CVE-2017-5130", "CVE-2017-5124"], "modified": "2018-01-02T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:chromium", "cpe:/o:fedoraproject:fedora:26"], "id": "FEDORA_2017-EA44F172E3.NASL", "href": "https://www.tenable.com/plugins/nessus/105501", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2017-ea44f172e3.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(105501);\n script_version(\"3.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2017-15386\", \"CVE-2017-15387\", \"CVE-2017-15388\", \"CVE-2017-15389\", \"CVE-2017-15390\", \"CVE-2017-15391\", \"CVE-2017-15392\", \"CVE-2017-15393\", \"CVE-2017-15394\", \"CVE-2017-15395\", \"CVE-2017-15398\", \"CVE-2017-15399\", \"CVE-2017-15407\", \"CVE-2017-15408\", \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\", \"CVE-2017-15412\", \"CVE-2017-15413\", \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15417\", \"CVE-2017-15418\", \"CVE-2017-15419\", \"CVE-2017-15420\", \"CVE-2017-15422\", \"CVE-2017-15423\", \"CVE-2017-15424\", \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2017-15427\", \"CVE-2017-15429\", \"CVE-2017-5124\", \"CVE-2017-5125\", \"CVE-2017-5126\", \"CVE-2017-5127\", \"CVE-2017-5128\", \"CVE-2017-5129\", \"CVE-2017-5130\", \"CVE-2017-5131\", \"CVE-2017-5132\", \"CVE-2017-5133\");\n script_xref(name:\"FEDORA\", value:\"2017-ea44f172e3\");\n\n script_name(english:\"Fedora 26 : chromium (2017-ea44f172e3)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Security fix for CVE-2017-15412 CVE-2017-15422 CVE-2017-15407\nCVE-2017-15408 CVE-2017-15409 CVE-2017-15410 CVE-2017-15411\nCVE-2017-15413 CVE-2017-15415 CVE-2017-15416 CVE-2017-15417\nCVE-2017-15418 CVE-2017-15419 CVE-2017-15420 CVE-2017-15423\nCVE-2017-15424 CVE-2017-15425 CVE-2017-15426 CVE-2017-15427\nCVE-2017-15429\n\n----\n\nSecurity fix for CVE-2017-15398, CVE-2017-15399\n\n----\n\nSecurity fix for CVE-2017-15386 CVE-2017-15387 CVE-2017-15388\nCVE-2017-15389 CVE-2017-15390 CVE-2017-15391 CVE-2017-15392\nCVE-2017-15393 CVE-2017-15394 CVE-2017-15395 CVE-2017-5124\nCVE-2017-5125 CVE-2017-5126 CVE-2017-5127.\n\nBuild switched to use gtk3.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2017-ea44f172e3\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected chromium package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:26\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/02/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/01/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/01/02\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^26([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 26\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC26\", reference:\"chromium-63.0.3239.108-1.fc26\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromium\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-07T10:21:59", "description": "This update updates QtWebEngine to the 5.10.1 bugfix and security\nrelease. QtWebEngine 5.10.1 is part of the Qt 5.10.1 release, but only\nthe QtWebEngine component is included in this update.\n\nThis update includes :\n\n - Security fixes from Chromium up to version\n 64.0.3282.140. Including: CVE-2017-15407,\n CVE-2017-15409, CVE-2017-15410, CVE-2017-15411,\n CVE-2017-15415, CVE-2017-15416, CVE-2017-15418,\n CVE-2017-15419, CVE-2017-15422, CVE-2017-15423,\n CVE-2017-15424, CVE-2017-15425, CVE-2017-15426,\n CVE-2018-6031, CVE-2018-6033, CVE-2018-6034,\n CVE-2018-6036, CVE-2018-6037, CVE-2018-6038,\n CVE-2018-6040, CVE-2018-6041, CVE-2018-6042,\n CVE-2018-6047, CVE-2018-6048, CVE-2018-6050,\n CVE-2018-6051, CVE-2018-6052, CVE-2018-6053 and\n CVE-2018-6054.\n\n - Mitigations for SPECTRE: disabled shared-buffers, added\n cryptographic noise to precision timers\n\n - [QTBUG-47206] Fixed incorrect layouting due to bug in\n HTML5 viewport support.\n\n - [QTBUG-47945, QTBUG-65647] Fixed random crashes on exit\n\n - [QTBUG-57206] Fixed regression in viewport handling in\n embedded mode\n\n - [QTBUG-58400] Improved memory usage when printing\n\n - [QTBUG-63867] Fixed <canvas> elements when compiled\n without OpenGL\n\n - [QTBUG-63266, QTBUG-64436] Fixed that pointerType of\n Pointer Events was empty\n\n - [QTBUG-63606] Improved runtime disabling and clearing of\n HTTP cache\n\n - [QTBUG-64436] QtWebEngineWidgets: Fixed crash when\n exiting fullscreen mode using the context menu.\n\n - [QTBUG-64560] Fixed rendering glitches after\n renderProcessTerminated signal was emitted.\n\n - [QTBUG-64812] Fixed message bubble position in Hi-DPI\n mode\n\n - [QTBUG-64869, QTBUG-65004] Added testing for 32-bit host\n compiler when crossbuilding to 32-bit platforms\n\n - [QTBUG-64933] QtWebEngineWidgets: Fixed tooltips that\n did still show after mouse was moved away.\n\n - [QTBUG-65239] Fixed hanging of process if application is\n closed too fast after startup.\n\n - [QTBUG-65715] Fixed double margins when printing\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 18, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2018-02-26T00:00:00", "title": "Fedora 27 : qt5-qtwebengine (2018-e08d828ed9)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-6034", "CVE-2017-15409", "CVE-2018-6033", "CVE-2017-15423", "CVE-2018-6031", "CVE-2018-6053", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15422", "CVE-2018-6038", "CVE-2017-15407", "CVE-2018-6054", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15415", "CVE-2018-6036", "CVE-2018-6037", "CVE-2018-6047", "CVE-2018-6041", "CVE-2018-6042", "CVE-2018-6040", "CVE-2017-15426", "CVE-2017-15416", "CVE-2017-15424", "CVE-2018-6050", "CVE-2018-6048", "CVE-2018-6052", "CVE-2018-6051"], "modified": "2018-02-26T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:27", "p-cpe:/a:fedoraproject:fedora:qt5-qtwebengine"], "id": "FEDORA_2018-E08D828ED9.NASL", "href": "https://www.tenable.com/plugins/nessus/106991", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2018-e08d828ed9.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(106991);\n script_version(\"3.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2017-15407\", \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\", \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15418\", \"CVE-2017-15419\", \"CVE-2017-15422\", \"CVE-2017-15423\", \"CVE-2017-15424\", \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2018-6031\", \"CVE-2018-6033\", \"CVE-2018-6034\", \"CVE-2018-6036\", \"CVE-2018-6037\", \"CVE-2018-6038\", \"CVE-2018-6040\", \"CVE-2018-6041\", \"CVE-2018-6042\", \"CVE-2018-6047\", \"CVE-2018-6048\", \"CVE-2018-6050\", \"CVE-2018-6051\", \"CVE-2018-6052\", \"CVE-2018-6053\", \"CVE-2018-6054\");\n script_xref(name:\"FEDORA\", value:\"2018-e08d828ed9\");\n\n script_name(english:\"Fedora 27 : qt5-qtwebengine (2018-e08d828ed9)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update updates QtWebEngine to the 5.10.1 bugfix and security\nrelease. QtWebEngine 5.10.1 is part of the Qt 5.10.1 release, but only\nthe QtWebEngine component is included in this update.\n\nThis update includes :\n\n - Security fixes from Chromium up to version\n 64.0.3282.140. Including: CVE-2017-15407,\n CVE-2017-15409, CVE-2017-15410, CVE-2017-15411,\n CVE-2017-15415, CVE-2017-15416, CVE-2017-15418,\n CVE-2017-15419, CVE-2017-15422, CVE-2017-15423,\n CVE-2017-15424, CVE-2017-15425, CVE-2017-15426,\n CVE-2018-6031, CVE-2018-6033, CVE-2018-6034,\n CVE-2018-6036, CVE-2018-6037, CVE-2018-6038,\n CVE-2018-6040, CVE-2018-6041, CVE-2018-6042,\n CVE-2018-6047, CVE-2018-6048, CVE-2018-6050,\n CVE-2018-6051, CVE-2018-6052, CVE-2018-6053 and\n CVE-2018-6054.\n\n - Mitigations for SPECTRE: disabled shared-buffers, added\n cryptographic noise to precision timers\n\n - [QTBUG-47206] Fixed incorrect layouting due to bug in\n HTML5 viewport support.\n\n - [QTBUG-47945, QTBUG-65647] Fixed random crashes on exit\n\n - [QTBUG-57206] Fixed regression in viewport handling in\n embedded mode\n\n - [QTBUG-58400] Improved memory usage when printing\n\n - [QTBUG-63867] Fixed <canvas> elements when compiled\n without OpenGL\n\n - [QTBUG-63266, QTBUG-64436] Fixed that pointerType of\n Pointer Events was empty\n\n - [QTBUG-63606] Improved runtime disabling and clearing of\n HTTP cache\n\n - [QTBUG-64436] QtWebEngineWidgets: Fixed crash when\n exiting fullscreen mode using the context menu.\n\n - [QTBUG-64560] Fixed rendering glitches after\n renderProcessTerminated signal was emitted.\n\n - [QTBUG-64812] Fixed message bubble position in Hi-DPI\n mode\n\n - [QTBUG-64869, QTBUG-65004] Added testing for 32-bit host\n compiler when crossbuilding to 32-bit platforms\n\n - [QTBUG-64933] QtWebEngineWidgets: Fixed tooltips that\n did still show after mouse was moved away.\n\n - [QTBUG-65239] Fixed hanging of process if application is\n closed too fast after startup.\n\n - [QTBUG-65715] Fixed double margins when printing\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2018-e08d828ed9\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected qt5-qtwebengine package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt5-qtwebengine\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:27\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/08/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/02/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/02/26\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^27([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 27\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC27\", reference:\"qt5-qtwebengine-5.10.1-1.fc27\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"qt5-qtwebengine\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T10:21:10", "description": "This update updates QtWebEngine to the 5.10.1 bugfix and security\nrelease. QtWebEngine 5.10.1 is part of the Qt 5.10.1 release, but only\nthe QtWebEngine component is included in this update.\n\nThis update includes :\n\n - Security fixes from Chromium up to version\n 64.0.3282.140. Including: CVE-2017-15407,\n CVE-2017-15409, CVE-2017-15410, CVE-2017-15411,\n CVE-2017-15415, CVE-2017-15416, CVE-2017-15418,\n CVE-2017-15419, CVE-2017-15422, CVE-2017-15423,\n CVE-2017-15424, CVE-2017-15425, CVE-2017-15426,\n CVE-2018-6031, CVE-2018-6033, CVE-2018-6034,\n CVE-2018-6036, CVE-2018-6037, CVE-2018-6038,\n CVE-2018-6040, CVE-2018-6041, CVE-2018-6042,\n CVE-2018-6047, CVE-2018-6048, CVE-2018-6050,\n CVE-2018-6051, CVE-2018-6052, CVE-2018-6053 and\n CVE-2018-6054.\n\n - Mitigations for SPECTRE: disabled shared-buffers, added\n cryptographic noise to precision timers\n\n - [QTBUG-47206] Fixed incorrect layouting due to bug in\n HTML5 viewport support.\n\n - [QTBUG-47945, QTBUG-65647] Fixed random crashes on exit\n\n - [QTBUG-57206] Fixed regression in viewport handling in\n embedded mode\n\n - [QTBUG-58400] Improved memory usage when printing\n\n - [QTBUG-63867] Fixed <canvas> elements when compiled\n without OpenGL\n\n - [QTBUG-63266, QTBUG-64436] Fixed that pointerType of\n Pointer Events was empty\n\n - [QTBUG-63606] Improved runtime disabling and clearing of\n HTTP cache\n\n - [QTBUG-64436] QtWebEngineWidgets: Fixed crash when\n exiting fullscreen mode using the context menu.\n\n - [QTBUG-64560] Fixed rendering glitches after\n renderProcessTerminated signal was emitted.\n\n - [QTBUG-64812] Fixed message bubble position in Hi-DPI\n mode\n\n - [QTBUG-64869, QTBUG-65004] Added testing for 32-bit host\n compiler when crossbuilding to 32-bit platforms\n\n - [QTBUG-64933] QtWebEngineWidgets: Fixed tooltips that\n did still show after mouse was moved away.\n\n - [QTBUG-65239] Fixed hanging of process if application is\n closed too fast after startup.\n\n - [QTBUG-65715] Fixed double margins when printing\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 18, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2018-02-28T00:00:00", "title": "Fedora 26 : qt5-qtwebengine (2018-c0d3db441f)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-6034", "CVE-2017-15409", "CVE-2018-6033", "CVE-2017-15423", "CVE-2018-6031", "CVE-2018-6053", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15422", "CVE-2018-6038", "CVE-2017-15407", "CVE-2018-6054", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15415", "CVE-2018-6036", "CVE-2018-6037", "CVE-2018-6047", "CVE-2018-6041", "CVE-2018-6042", "CVE-2018-6040", "CVE-2017-15426", "CVE-2017-15416", "CVE-2017-15424", "CVE-2018-6050", "CVE-2018-6048", "CVE-2018-6052", "CVE-2018-6051"], "modified": "2018-02-28T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:qt5-qtwebengine", "cpe:/o:fedoraproject:fedora:26"], "id": "FEDORA_2018-C0D3DB441F.NASL", "href": "https://www.tenable.com/plugins/nessus/107035", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2018-c0d3db441f.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(107035);\n script_version(\"3.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2017-15407\", \"CVE-2017-15409\", \"CVE-2017-15410\", \"CVE-2017-15411\", \"CVE-2017-15415\", \"CVE-2017-15416\", \"CVE-2017-15418\", \"CVE-2017-15419\", \"CVE-2017-15422\", \"CVE-2017-15423\", \"CVE-2017-15424\", \"CVE-2017-15425\", \"CVE-2017-15426\", \"CVE-2018-6031\", \"CVE-2018-6033\", \"CVE-2018-6034\", \"CVE-2018-6036\", \"CVE-2018-6037\", \"CVE-2018-6038\", \"CVE-2018-6040\", \"CVE-2018-6041\", \"CVE-2018-6042\", \"CVE-2018-6047\", \"CVE-2018-6048\", \"CVE-2018-6050\", \"CVE-2018-6051\", \"CVE-2018-6052\", \"CVE-2018-6053\", \"CVE-2018-6054\");\n script_xref(name:\"FEDORA\", value:\"2018-c0d3db441f\");\n\n script_name(english:\"Fedora 26 : qt5-qtwebengine (2018-c0d3db441f)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update updates QtWebEngine to the 5.10.1 bugfix and security\nrelease. QtWebEngine 5.10.1 is part of the Qt 5.10.1 release, but only\nthe QtWebEngine component is included in this update.\n\nThis update includes :\n\n - Security fixes from Chromium up to version\n 64.0.3282.140. Including: CVE-2017-15407,\n CVE-2017-15409, CVE-2017-15410, CVE-2017-15411,\n CVE-2017-15415, CVE-2017-15416, CVE-2017-15418,\n CVE-2017-15419, CVE-2017-15422, CVE-2017-15423,\n CVE-2017-15424, CVE-2017-15425, CVE-2017-15426,\n CVE-2018-6031, CVE-2018-6033, CVE-2018-6034,\n CVE-2018-6036, CVE-2018-6037, CVE-2018-6038,\n CVE-2018-6040, CVE-2018-6041, CVE-2018-6042,\n CVE-2018-6047, CVE-2018-6048, CVE-2018-6050,\n CVE-2018-6051, CVE-2018-6052, CVE-2018-6053 and\n CVE-2018-6054.\n\n - Mitigations for SPECTRE: disabled shared-buffers, added\n cryptographic noise to precision timers\n\n - [QTBUG-47206] Fixed incorrect layouting due to bug in\n HTML5 viewport support.\n\n - [QTBUG-47945, QTBUG-65647] Fixed random crashes on exit\n\n - [QTBUG-57206] Fixed regression in viewport handling in\n embedded mode\n\n - [QTBUG-58400] Improved memory usage when printing\n\n - [QTBUG-63867] Fixed <canvas> elements when compiled\n without OpenGL\n\n - [QTBUG-63266, QTBUG-64436] Fixed that pointerType of\n Pointer Events was empty\n\n - [QTBUG-63606] Improved runtime disabling and clearing of\n HTTP cache\n\n - [QTBUG-64436] QtWebEngineWidgets: Fixed crash when\n exiting fullscreen mode using the context menu.\n\n - [QTBUG-64560] Fixed rendering glitches after\n renderProcessTerminated signal was emitted.\n\n - [QTBUG-64812] Fixed message bubble position in Hi-DPI\n mode\n\n - [QTBUG-64869, QTBUG-65004] Added testing for 32-bit host\n compiler when crossbuilding to 32-bit platforms\n\n - [QTBUG-64933] QtWebEngineWidgets: Fixed tooltips that\n did still show after mouse was moved away.\n\n - [QTBUG-65239] Fixed hanging of process if application is\n closed too fast after startup.\n\n - [QTBUG-65715] Fixed double margins when printing\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2018-c0d3db441f\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected qt5-qtwebengine package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt5-qtwebengine\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:26\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/08/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/02/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/02/28\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^26([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 26\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC26\", reference:\"qt5-qtwebengine-5.10.1-1.fc26\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"qt5-qtwebengine\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "suse": [{"lastseen": "2017-12-08T15:45:31", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15417", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15415", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-15420"], "description": "This update to Chromium 63.0.3239.84 fixes the following security issues:\n\n - CVE-2017-15408: Heap buffer overflow in PDFium\n - CVE-2017-15409: Out of bounds write in Skia\n - CVE-2017-15410: Use after free in PDFium\n - CVE-2017-15411: Use after free in PDFium\n - CVE-2017-15412: Use after free in libXML\n - CVE-2017-15413: Type confusion in WebAssembly\n - CVE-2017-15415: Pointer information disclosure in IPC call\n - CVE-2017-15416: Out of bounds read in Blink\n - CVE-2017-15417: Cross origin information disclosure in Skia\n - CVE-2017-15418: Use of uninitialized value in Skia\n - CVE-2017-15419: Cross origin leak of redirect URL in Blink\n - CVE-2017-15420: URL spoofing in Omnibox\n - CVE-2017-15422: Integer overflow in ICU\n - CVE-2017-15423: Issue with SPAKE implementation in BoringSSL\n - CVE-2017-15424: URL Spoof in Omnibox\n - CVE-2017-15425: URL Spoof in Omnibox\n - CVE-2017-15426: URL Spoof in Omnibox\n - CVE-2017-15427: Insufficient blocking of JavaScript in Omnibox\n\n", "edition": 1, "modified": "2017-12-08T12:15:33", "published": "2017-12-08T12:15:33", "href": "http://lists.opensuse.org/opensuse-security-announce/2017-12/msg00021.html", "id": "OPENSUSE-SU-2017:3244-1", "title": "Security update for chromium (important)", "type": "suse", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2017-12-08T15:45:32", "bulletinFamily": "unix", "cvelist": ["CVE-2017-5128", "CVE-2017-15417", "CVE-2017-5132", "CVE-2017-5131", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15395", "CVE-2017-15390", "CVE-2017-15391", "CVE-2017-5133", "CVE-2017-15419", "CVE-2017-15399", "CVE-2017-15392", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-5125", "CVE-2017-15389", "CVE-2017-15387", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-5126", "CVE-2017-15412", "CVE-2017-15393", "CVE-2017-15415", "CVE-2017-5127", "CVE-2017-15398", "CVE-2017-15386", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15396", "CVE-2017-15388", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-5129", "CVE-2017-15420", "CVE-2017-15394", "CVE-2017-5130", "CVE-2017-5124"], "description": "This update to Chromium 63.0.3239.84 fixes the following security issues:\n\n - CVE-2017-5124: UXSS with MHTML\n - CVE-2017-5125: Heap overflow in Skia\n - CVE-2017-5126: Use after free in PDFium\n - CVE-2017-5127: Use after free in PDFium\n - CVE-2017-5128: Heap overflow in WebGL\n - CVE-2017-5129: Use after free in WebAudio\n - CVE-2017-5132: Incorrect stack manipulation in WebAssembly.\n - CVE-2017-5130: Heap overflow in libxml2\n - CVE-2017-5131: Out of bounds write in Skia\n - CVE-2017-5133: Out of bounds write in Skia\n - CVE-2017-15386: UI spoofing in Blink\n - CVE-2017-15387: Content security bypass\n - CVE-2017-15388: Out of bounds read in Skia\n - CVE-2017-15389: URL spoofing in OmniBox\n - CVE-2017-15390: URL spoofing in OmniBox\n - CVE-2017-15391: Extension limitation bypass in Extensions.\n - CVE-2017-15392: Incorrect registry key handling in PlatformIntegration\n - CVE-2017-15393: Referrer leak in Devtools\n - CVE-2017-15394: URL spoofing in extensions UI\n - CVE-2017-15395: Null pointer dereference in ImageCapture\n - CVE-2017-15396: Stack overflow in V8\n - CVE-2017-15398: Stack buffer overflow in QUIC\n - CVE-2017-15399: Use after free in V8\n - CVE-2017-15408: Heap buffer overflow in PDFium\n - CVE-2017-15409: Out of bounds write in Skia\n - CVE-2017-15410: Use after free in PDFium\n - CVE-2017-15411: Use after free in PDFium\n - CVE-2017-15412: Use after free in libXML\n - CVE-2017-15413: Type confusion in WebAssembly\n - CVE-2017-15415: Pointer information disclosure in IPC call\n - CVE-2017-15416: Out of bounds read in Blink\n - CVE-2017-15417: Cross origin information disclosure in Skia\n - CVE-2017-15418: Use of uninitialized value in Skia\n - CVE-2017-15419: Cross origin leak of redirect URL in Blink\n - CVE-2017-15420: URL spoofing in Omnibox\n - CVE-2017-15422: Integer overflow in ICU\n - CVE-2017-15423: Issue with SPAKE implementation in BoringSSL\n - CVE-2017-15424: URL Spoof in Omnibox\n - CVE-2017-15425: URL Spoof in Omnibox\n - CVE-2017-15426: URL Spoof in Omnibox\n - CVE-2017-15427: Insufficient blocking of JavaScript in Omnibox\n\n The following tracked bug fixes are included:\n\n - sandbox crash fixes (bsc#1064298)\n\n", "edition": 1, "modified": "2017-12-08T12:15:59", "published": "2017-12-08T12:15:59", "href": "http://lists.opensuse.org/opensuse-security-announce/2017-12/msg00022.html", "id": "OPENSUSE-SU-2017:3245-1", "title": "Security update for chromium (important)", "type": "suse", "cvss": {"score": 0.0, "vector": "NONE"}}], "fedora": [{"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427", "CVE-2017-15429"], "description": "Chromium is an open-source web browser, powered by WebKit (Blink). ", "modified": "2018-01-01T22:20:38", "published": "2018-01-01T22:20:38", "id": "FEDORA:2E8D96005552", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 27 Update: chromium-63.0.3239.108-1.fc27", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15386", "CVE-2017-15387", "CVE-2017-15388", "CVE-2017-15389", "CVE-2017-15390", "CVE-2017-15391", "CVE-2017-15392", "CVE-2017-15393", "CVE-2017-15394", "CVE-2017-15395", "CVE-2017-15398", "CVE-2017-15399", "CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427", "CVE-2017-15429", "CVE-2017-5124", "CVE-2017-5125", "CVE-2017-5126", "CVE-2017-5127", "CVE-2017-5128", "CVE-2017-5129", "CVE-2017-5130", "CVE-2017-5131", "CVE-2017-5132", "CVE-2017-5133"], "description": "Chromium is an open-source web browser, powered by WebKit (Blink). ", "modified": "2018-01-01T22:22:45", "published": "2018-01-01T22:22:45", "id": "FEDORA:EC7F86046254", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 26 Update: chromium-63.0.3239.108-1.fc26", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15396", "CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427", "CVE-2018-6056", "CVE-2018-6057", "CVE-2018-6058", "CVE-2018-6059", "CVE-2018-6060", "CVE-2018-6061", "CVE-2018-6062", "CVE-2018-6063", "CVE-2018-6064", "CVE-2018-6065", "CVE-2018-6066", "CVE-2018-6067", "CVE-2018-6068", "CVE-2018-6069", "CVE-2018-6070", "CVE-2018-6071", "CVE-2018-6072", "CVE-2018-6073", "CVE-2018-6074", "CVE-2018-6075", "CVE-2018-6076", "CVE-2018-6077", "CVE-2018-6078", "CVE-2018-6079", "CVE-2018-6080", "CVE-2018-6081", "CVE-2018-6082", "CVE-2018-6083", "CVE-2018-6406"], "description": "Chromium is an open-source web browser, powered by WebKit (Blink). ", "modified": "2018-03-30T13:40:00", "published": "2018-03-30T13:40:00", "id": "FEDORA:855A9625F2AD", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 28 Update: chromium-65.0.3325.181-1.fc28", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15396", "CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427", "CVE-2018-6056", "CVE-2018-6057", "CVE-2018-6058", "CVE-2018-6059", "CVE-2018-6060", "CVE-2018-6061", "CVE-2018-6062", "CVE-2018-6063", "CVE-2018-6064", "CVE-2018-6065", "CVE-2018-6066", "CVE-2018-6067", "CVE-2018-6068", "CVE-2018-6069", "CVE-2018-6070", "CVE-2018-6071", "CVE-2018-6072", "CVE-2018-6073", "CVE-2018-6074", "CVE-2018-6075", "CVE-2018-6076", "CVE-2018-6077", "CVE-2018-6078", "CVE-2018-6079", "CVE-2018-6080", "CVE-2018-6081", "CVE-2018-6082", "CVE-2018-6083", "CVE-2018-6406"], "description": "Chromium is an open-source web browser, powered by WebKit (Blink). ", "modified": "2018-03-27T20:18:19", "published": "2018-03-27T20:18:19", "id": "FEDORA:0F54C60BE23D", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 27 Update: chromium-65.0.3325.181-1.fc27", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15407", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15415", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15425", "CVE-2017-15426", "CVE-2018-6031", "CVE-2018-6033", "CVE-2018-6034", "CVE-2018-6036", "CVE-2018-6037", "CVE-2018-6038", "CVE-2018-6040", "CVE-2018-6041", "CVE-2018-6042", "CVE-2018-6047", "CVE-2018-6048", "CVE-2018-6050", "CVE-2018-6051", "CVE-2018-6052", "CVE-2018-6053", "CVE-2018-6054"], "description": "Qt5 - QtWebEngine components. ", "modified": "2018-02-25T21:14:12", "published": "2018-02-25T21:14:12", "id": "FEDORA:CAFF160478EB", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 27 Update: qt5-qtwebengine-5.10.1-1.fc27", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15407", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15415", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15425", "CVE-2017-15426", "CVE-2018-6031", "CVE-2018-6033", "CVE-2018-6034", "CVE-2018-6036", "CVE-2018-6037", "CVE-2018-6038", "CVE-2018-6040", "CVE-2018-6041", "CVE-2018-6042", "CVE-2018-6047", "CVE-2018-6048", "CVE-2018-6050", "CVE-2018-6051", "CVE-2018-6052", "CVE-2018-6053", "CVE-2018-6054"], "description": "Qt5 - QtWebEngine components. ", "modified": "2018-02-27T16:58:43", "published": "2018-02-27T16:58:43", "id": "FEDORA:5CFCF60A5875", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 26 Update: qt5-qtwebengine-5.10.1-1.fc26", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2017-14952", "CVE-2017-15422"], "description": "Tools and utilities for developing with icu. ", "modified": "2018-09-17T18:53:01", "published": "2018-09-17T18:53:01", "id": "FEDORA:93899601DD82", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 27 Update: icu-57.1-10.fc27", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "freebsd": [{"lastseen": "2019-05-29T18:32:02", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15417", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15407", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15415", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15430", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-15420"], "description": "\nGoogle Chrome Releases reports:\n\n37 security fixes in this release, including:\n\n[778505] Critical CVE-2017-15407: Out of bounds write in QUIC. Reported by\n\t Ned Williamson on 2017-10-26\n[762374] High CVE-2017-15408: Heap buffer overflow in PDFium. Reported by\n\t Ke Liu of Tencent's Xuanwu LAB on 2017-09-06\n[763972] High CVE-2017-15409: Out of bounds write in Skia. Reported by\n\t Anonymous on 2017-09-11\n[765921] High CVE-2017-15410: Use after free in PDFium. Reported by\n\t Luat Nguyen of KeenLab, Tencent on 2017-09-16\n[770148] High CVE-2017-15411: Use after free in PDFium. Reported by\n\t Luat Nguyen of KeenLab, Tencent on 2017-09-29\n[727039] High CVE-2017-15412: Use after free in libXML. Reported by\n\t Nick Wellnhofer on 2017-05-27\n[766666] High CVE-2017-15413: Type confusion in WebAssembly. Reported by\n\t Gaurav Dewan of Adobe Systems India Pvt. Ltd. on 2017-09-19\n[765512] Medium CVE-2017-15415: Pointer information disclosure in IPC call.\n\t Reported by Viktor Brange of Microsoft Offensive Security Research Team on 2017-09-15\n[779314] Medium CVE-2017-15416: Out of bounds read in Blink. Reported by\n\t Ned Williamson on 2017-10-28\n[699028] Medium CVE-2017-15417: Cross origin information disclosure in Skia.\n\t Reported by Max May on 2017-03-07\n[765858] Medium CVE-2017-15418: Use of uninitialized value in Skia. Reported by\n\t Kushal Arvind Shah of Fortinet's FortiGuard Labs on 2017-09-15\n[780312] Medium CVE-2017-15419: Cross origin leak of redirect URL in Blink.\n\t Reported by Jun Kokatsu on 2017-10-31\n[777419] Medium CVE-2017-15420: URL spoofing in Omnibox. Reported by\n\t WenXu Wu of Tencent's Xuanwu Lab on 2017-10-23\n[774382] Medium CVE-2017-15422: Integer overflow in ICU. Reported by\n\t Yuan Deng of Ant-financial Light-Year Security Lab on 2017-10-13\n[780484] Medium CVE-2017-15430: Unsafe navigation in Chromecast Plugin.\n\t Reported by jinmo123 on 2017-01-11\n[778101] Low CVE-2017-15423: Issue with SPAKE implementation in BoringSSL.\n\t Reported by Greg Hudson on 2017-10-25\n[756226] Low CVE-2017-15424: URL Spoof in Omnibox. Reported by\n\t Khalil Zhani on 2017-08-16\n[756456] Low CVE-2017-15425: URL Spoof in Omnibox. Reported by\n\t xisigr of Tencent's Xuanwu Lab on 2017-08-17\n[757735] Low CVE-2017-15426: URL Spoof in Omnibox. Reported by\n\t WenXu Wu of Tencent's Xuanwu Lab on 2017-08-18\n[768910] Low CVE-2017-15427: Insufficient blocking of Javascript in Omnibox.\n\t Reported by Junaid Farhan on 2017-09-26\n[792099] Various fixes from internal audits, fuzzing and other initiatives\n\n\n", "edition": 3, "modified": "2017-12-06T00:00:00", "published": "2017-12-06T00:00:00", "id": "1D951E85-FFDB-11E7-8B91-E8E0B747A45A", "href": "https://vuxml.freebsd.org/freebsd/1d951e85-ffdb-11e7-8b91-e8e0b747a45a.html", "title": "chromium -- multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "gentoo": [{"lastseen": "2018-01-08T02:51:30", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15417", "CVE-2017-15409", "CVE-2017-15423", "CVE-2017-15429", "CVE-2017-15419", "CVE-2017-15425", "CVE-2017-15410", "CVE-2017-15422", "CVE-2017-15427", "CVE-2017-15407", "CVE-2017-15418", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15415", "CVE-2017-15426", "CVE-2017-15413", "CVE-2017-15408", "CVE-2017-15416", "CVE-2017-15424", "CVE-2017-15420"], "description": "### Background\n\nChromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. \n\nGoogle Chrome is one fast, simple, and secure browser for all your devices \n\n### Description\n\nMultiple vulnerabilities have been discovered in Chromium and Google Chrome. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA remote attacker could possibly execute arbitrary code with the privileges of the process, cause a Denial of Service condition, bypass content security controls, or conduct URL spoofing. \n\n### Workaround\n\nThere are no known workarounds at this time.\n\n### Resolution\n\nAll Chromium users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose\n \">=www-client/chromium-63.0.3239.108\"\n \n\nAll Google Chrome users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose\n \">=www-client/google-chrome-63.0.3239.108\"", "edition": 1, "modified": "2018-01-07T00:00:00", "published": "2018-01-07T00:00:00", "href": "https://security.gentoo.org/glsa/201801-03", "id": "GLSA-201801-03", "title": "Chromium, Google Chrome: Multiple vulnerabilities", "type": "gentoo", "cvss": {"score": 0.0, "vector": "NONE"}}], "cve": [{"lastseen": "2021-02-02T06:36:37", "description": "Heap buffer overflow in Skia in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "edition": 14, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-08-28T19:29:00", "title": "CVE-2017-15409", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15409"], "modified": "2018-10-31T15:59:00", "cpe": ["cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2017-15409", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15409", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:36:37", "description": "Out-of-bounds Write in the QUIC networking stack in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to gain code execution via a malicious server.", "edition": 14, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-08-28T19:29:00", "title": "CVE-2017-15407", "type": "cve", "cwe": ["CWE-787"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15407"], "modified": "2018-11-20T18:13:00", "cpe": ["cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2017-15407", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15407", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:36:37", "description": "Use after free in PDFium in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.", "edition": 14, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-08-28T19:29:00", "title": "CVE-2017-15410", "type": "cve", "cwe": ["CWE-416"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15410"], "modified": "2018-10-30T16:48:00", "cpe": ["cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2017-15410", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15410", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:36:37", "description": "Type confusion in WebAssembly in V8 in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "edition": 14, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-08-28T19:29:00", "title": "CVE-2017-15413", "type": "cve", "cwe": ["CWE-704"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15413"], "modified": "2018-10-25T01:59:00", "cpe": ["cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2017-15413", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15413", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:36:37", "description": "Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.", "edition": 14, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "baseScore": 6.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-08-28T19:29:00", "title": "CVE-2017-15424", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15424"], "modified": "2018-10-30T16:47:00", "cpe": ["cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2017-15424", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15424", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:36:37", "description": "Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a socially engineered user to XSS themselves by dragging and dropping a javascript: URL into the URL bar.", "edition": 14, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2018-08-28T19:29:00", "title": "CVE-2017-15427", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15427"], "modified": "2018-11-02T17:34:00", "cpe": ["cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2017-15427", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15427", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:36:37", "description": "Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.", "edition": 14, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "baseScore": 6.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-08-28T19:29:00", "title": "CVE-2017-15425", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15425"], "modified": "2018-10-30T16:47:00", "cpe": ["cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2017-15425", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15425", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:36:37", "description": "Inappropriate implementation in Skia canvas composite operations in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to leak cross-origin data via a crafted HTML page.", "edition": 14, "cvss3": {"exploitabilityScore": 1.6, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.3, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-08-28T19:29:00", "title": "CVE-2017-15417", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.6, "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15417"], "modified": "2018-11-07T18:01:00", "cpe": ["cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2017-15417", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15417", "cvss": {"score": 2.6, "vector": "AV:N/AC:H/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:36:37", "description": "Inappropriate implementation in BoringSSL SPAKE2 in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to leak the low-order bits of SHA512(password) by inspecting protocol traffic.", "edition": 14, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.3, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 1.4}, "published": "2018-08-28T19:29:00", "title": "CVE-2017-15423", "type": "cve", "cwe": ["CWE-310"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15423"], "modified": "2018-11-02T17:37:00", "cpe": ["cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2017-15423", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15423", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:36:37", "description": "Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.", "edition": 14, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "baseScore": 6.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-08-28T19:29:00", "title": "CVE-2017-15426", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-15426"], "modified": "2018-10-30T16:47:00", "cpe": ["cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2017-15426", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15426", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"]}], "ubuntu": [{"lastseen": "2020-07-02T11:42:07", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15422"], "description": "It was discovered that ICU incorrectly handled certain calendars. If an \napplication using ICU processed crafted data, a remote attacker could \npossibly cause it to crash, leading to a denial of service.", "edition": 4, "modified": "2018-03-28T00:00:00", "published": "2018-03-28T00:00:00", "id": "USN-3610-1", "href": "https://ubuntu.com/security/notices/USN-3610-1", "title": "ICU vulnerability", "type": "ubuntu", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-07-02T11:38:45", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15412"], "description": "It was discovered that libxml2 incorrecty handled certain files. An attacker \ncould use this issue with specially constructed XML data to cause libxml2 to \nconsume resources, leading to a denial of service.", "edition": 4, "modified": "2017-12-13T00:00:00", "published": "2017-12-13T00:00:00", "id": "USN-3513-1", "href": "https://ubuntu.com/security/notices/USN-3513-1", "title": "libxml2 vulnerability", "type": "ubuntu", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-02T11:40:05", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15412"], "description": "USN-3513-1 fixed a vulnerability in libxml2. This update provides \nthe corresponding update for Ubuntu 12.04 ESM.\n\nOriginal advisory details:\n\nIt was discovered that libxml2 incorrecty handled certain files. An attacker \ncould use this issue with specially constructed XML data to cause libxml2 to \nconsume resources, leading to a denial of service.", "edition": 5, "modified": "2017-12-13T00:00:00", "published": "2017-12-13T00:00:00", "id": "USN-3513-2", "href": "https://ubuntu.com/security/notices/USN-3513-2", "title": "libxml2 vulnerability", "type": "ubuntu", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "cloudfoundry": [{"lastseen": "2019-05-29T18:33:06", "bulletinFamily": "software", "cvelist": ["CVE-2017-15422"], "description": "# \n\n# Severity\n\nMedium\n\n# Vendor\n\nCanonical Ubuntu\n\n# Versions Affected\n\n * Canonical Ubuntu 14.04\n\n# Description\n\n# Affected Cloud Foundry Products and Versions\n\n_Severity is medium unless otherwise noted._\n\n * Cloud Foundry BOSH stemcells are vulnerable, including: \n * 3363.x versions prior to 3363.53\n * 3421.x versions prior to 3421.46\n * 3445.x versions prior to 3445.32\n * 3468.x versions prior to 3468.30\n * 3541.x versions prior to 3541.12\n * All other stemcells not listed.\n * All versions of Cloud Foundry cflinuxfs2 prior to 1.196.0\n\n# Mitigation\n\nOSS users are strongly encouraged to follow one of the mitigations below:\n\n * The Cloud Foundry project recommends upgrading the following BOSH stemcells: \n * Upgrade 3363.x versions to 3363.53\n * Upgrade 3421.x versions to 3421.46\n * Upgrade 3445.x versions to 3445.32\n * Upgrade 3468.x versions to 3468.30\n * Upgrade 3541.x versions to 3541.12\n * All other stemcells should be upgraded to the latest version available on [bosh.io](<https://bosh.io>).\n * The Cloud Foundry project recommends that Cloud Foundry deployments run with cflinuxfs2 version 1.196.0 or later.\n\n# References\n\n * [USN-3610-1](<https://usn.ubuntu.com/3610-1/>)\n * [CVE-2017-15422](<https://people.canonical.com/~ubuntu-security/cve/CVE-2017-15422>)\n", "edition": 4, "modified": "2018-05-02T00:00:00", "published": "2018-05-02T00:00:00", "id": "CFOUNDRY:21A806FB62D8EE8039931A5D1193F96D", "href": "https://www.cloudfoundry.org/blog/usn-3610-1/", "title": "USN-3610-1: ICU vulnerability | Cloud Foundry", "type": "cloudfoundry", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:32:48", "bulletinFamily": "software", "cvelist": ["CVE-2017-15412"], "description": "# \n\n# Severity\n\nMedium\n\n# Vendor\n\nCanonical Ubuntu\n\n# Versions Affected\n\n * Canonical Ubuntu 14.04\n\n# Description\n\nIt was discovered that libxml2 incorrecty handled certain files. An attacker could use this issue with specially constructed XML data to cause libxml2 to consume resources, leading to a denial of service.\n\n# Affected Cloud Foundry Products and Versions\n\n_Severity is medium unless otherwise noted._\n\n * Cloud Foundry BOSH stemcells are vulnerable, including: \n * 3312.x versions prior to 3312.50\n * 3363.x versions prior to 3363.45\n * 3421.x versions prior to 3421.35\n * 3445.x versions prior to 3445.21\n * 3468.x versions prior to 3468.15\n * All other stemcells not listed.\n * All versions of Cloud Foundry cflinuxfs2 prior to 1.176.0\n\n# Mitigation\n\nOSS users are strongly encouraged to follow one of the mitigations below:\n\n * The Cloud Foundry project recommends upgrading the following BOSH stemcells: \n * Upgrade 3312.x versions to 3312.50\n * Upgrade 3363.x versions to 3363.45\n * Upgrade 3421.x versions to 3421.35\n * Upgrade 3445.x versions to 3445.21\n * Upgrade 3468.x versions to 3468.15\n * All other stemcells should be upgraded to the latest version available on [bosh.io](<https://bosh.io>).\n * The Cloud Foundry project recommends that Cloud Foundry deployments run with cflinuxfs2 version 1.176.0 or later.\n\n# References\n\n * [USN-3513-1](<http://www.ubuntu.com/usn/usn-3513-1/>)\n * [CVE-2017-15412](<http://people.ubuntu.com/~ubuntu-security/cve/CVE-2017-15412>)\n", "edition": 4, "modified": "2018-01-24T00:00:00", "published": "2018-01-24T00:00:00", "id": "CFOUNDRY:81EBD6DFAEE8502A1AEE7ACA1D96C999", "href": "https://www.cloudfoundry.org/blog/usn-3513-1/", "title": "USN-3513-1: libxml2 vulnerability | Cloud Foundry", "type": "cloudfoundry", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "threatpost": [{"lastseen": "2019-06-09T05:50:10", "bulletinFamily": "info", "cvelist": ["CVE-2017-15417", "CVE-2019-0841"], "description": "A side-channel vulnerability in Google Chrome and Mozilla Firefox allows drive-by de-anonymization of Facebook users.\n\nAn exploit would allow an attacker to pick up the profile picture, username and the \u201clikes\u201d of unsuspecting visitors who find themselves landing on a malicious website \u2013 with no additional user interaction.\n\nThe vulnerability ([CVE-2017-15417](<https://bugs.chromium.org/p/chromium/issues/detail?id=699028>)) lies in certain browser implementations of the \u201cmix-blend-mode\u201d [feature](<https://css-tricks.com/almanac/properties/m/mix-blend-mode/>) of Cascading Style Sheets 3 (CSS3), one of the core technologies for building web pages. Mix-blend-mode allows web designers to select how website content blends with background elements; the flaw within it allows visual content to leak from cross-origin IFrames.\n\nIn an [analysis](<https://www.evonide.com/side-channel-attacking-browsers-through-css3-features/>), Google security engineer Ruslan Habalov and white-hat [Dario Wei\u00dfer](<http://www.twitter.com/haxonaut>) said that for an exploit to work, the victim must be logged into Facebook. The visual data leak/attack could then be carried out when the user visits websites using IFrames containing social plugins and \u201clog in with Facebook\u201d buttons, which the researchers refer to as \u201cendpoints.\u201d\n\nA weaponized website can\u2019t access the content of IFrames directly, but attackers can determine a cross-origin IFrame\u2019s content embedded in a page by simply overlaying the target with a stack of <div> elements that have mix-blend-mode enabled.\n\nWeb designers use <div> elements <div> to group together HTML elements on a page, applying CSS styles to many elements at once. The overlay interacts with the underlying pixels, allowing an exploit to infer what the content is visually by measuring the time it takes to render an individual pixel: That time varies by color. By analyzing the different rendering times for each pixel, it\u2019s possible to determine the color of that pixel to reconstruct a visual representation of the targeted content.\n\n\u201cThe rendering of this stack can\u2026take a variable amount of time depending on the underlying pixel color inside the IFrame,\u201d Habalov explained in the post. \u201cBy moving this <div> \u2018scan\u2019 stack across the IFrame, forcing re-renderings and measuring the individual rendering times, it is possible to [lift the content out of the targeted IFrame].\u201d\n\nIn the case of Facebook, the researchers constructed a proof-of-concept HTML file containing a payload for the discovered bug.\n\n\u201cOpening this file is enough to load different Facebook endpoints inside IFrames and to start exploitation, which can be fully camouflaged,\u201d Habalov said. To the latter point, the PoC attack toggles an animated cat overlay which obscures the leakage.\n\nThe PoC attack, which Habalov said is \u201cinefficient,\u201d took about 20 seconds to reveal a user name, five minutes to leak a fuzzy version of a profile picture, and 500 milliseconds to check the like status for any given site.\n\n[](<https://media.threatpost.com/wp-content/uploads/sites/103/2018/06/01162328/facebook-de-anonymization.jpg>)\n\nThe attack also works to display the profile pictures of the victim\u2019s friends who have liked the same page as the victim did; and for leaking the user\u2019s [like status](<https://www.evonide.com/other/like_leak.gif>) of arbitrary pages.\n\nThe two only demonstrated the attack potential against Facebook, but Habalov said that \u201cthroughout the web there are tons of other sensitive resources which could be affected by attacks like this in a similar fashion.\u201d\n\nHe added, \u201cSide-channel vulnerabilities are very sneaky and sometimes hard to patch as was seen with the quite recent and ongoing [Meltdown/Spectre](<https://threatpost.com/new-microsoft-bug-bounty-program-looks-to-squash-the-next-spectre-meltdown/130523/>) discoveries. Similarly, it is no surprise that an ever-growing browser feature landscape and more demanding performance for all these features contributes even more to this core problematic in its own way. Particularly, mix-blend-mode is only the tip of the iceberg when it comes to the gigantic rendering feature amount CSS3 and webkit have already introduced.\u201d\n\nGoogle and Mozilla have both issued [patches](<https://bugs.chromium.org/p/chromium/issues/detail?id=699028>) for the flaw.\n", "modified": "2018-06-01T20:47:50", "published": "2018-06-01T20:47:50", "id": "THREATPOST:BC7785C1AA5CE337FD6268A2941438EE", "href": "https://threatpost.com/browser-side-channel-flaw-de-anonymizes-facebook-data/132465/", "type": "threatpost", "title": "Browser Side-Channel Flaw De-Anonymizes Facebook Data", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "centos": [{"lastseen": "2020-04-08T22:43:58", "bulletinFamily": "unix", "cvelist": ["CVE-2018-14404", "CVE-2018-14567", "CVE-2017-15412", "CVE-2016-5131", "CVE-2017-18258", "CVE-2015-8035"], "description": "**CentOS Errata and Security Advisory** CESA-2020:1190\n\n\nThe libxml2 library is a development toolbox providing the implementation of various XML standards.\n\nSecurity Fix(es):\n\n* libxml2: Use after free triggered by XPointer paths beginning with range-to (CVE-2016-5131)\n\n* libxml2: Use after free in xmlXPathCompOpEvalPositionalPredicate() function in xpath.c (CVE-2017-15412)\n\n* libxml2: DoS caused by incorrect error detection during XZ decompression (CVE-2015-8035)\n\n* libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c (CVE-2018-14404)\n\n* libxml2: Unrestricted memory usage in xz_head() function in xzlib.c (CVE-2017-18258)\n\n* libxml2: Infinite loop caused by incorrect error detection during LZMA decompression (CVE-2018-14567)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.8 Release Notes linked from the References section.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-cr-announce/2020-April/012518.html\n\n**Affected packages:**\nlibxml2\nlibxml2-devel\nlibxml2-python\nlibxml2-static\n\n**Upstream details at:**\n", "edition": 1, "modified": "2020-04-08T18:42:56", "published": "2020-04-08T18:42:56", "id": "CESA-2020:1190", "href": "http://lists.centos.org/pipermail/centos-cr-announce/2020-April/012518.html", "title": "libxml2 security update", "type": "centos", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}]}