Google Chrome Multiple Vulnerabilities - 01 July14 (Windows)
2014-08-01T00:00:00
ID OPENVAS:1361412562310804727 Type openvas Reporter Copyright (C) 2014 Greenbone Networks GmbH Modified 2020-04-20T00:00:00
Description
The host is installed with Google Chrome and is prone to multiple
vulnerabilities.
###############################################################################
# OpenVAS Vulnerability Test
#
# Google Chrome Multiple Vulnerabilities - 01 July14 (Windows)
#
# Authors:
# Thanga Prakash S <tprakash@secpod.com>
#
# Copyright:
# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
CPE = "cpe:/a:google:chrome";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.804727");
script_version("2020-04-20T13:31:49+0000");
script_cve_id("CVE-2014-3160", "CVE-2014-3162");
script_bugtraq_id(68677);
script_tag(name:"cvss_base", value:"6.8");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_tag(name:"last_modification", value:"2020-04-20 13:31:49 +0000 (Mon, 20 Apr 2020)");
script_tag(name:"creation_date", value:"2014-08-01 18:43:05 +0530 (Fri, 01 Aug 2014)");
script_name("Google Chrome Multiple Vulnerabilities - 01 July14 (Windows)");
script_tag(name:"summary", value:"The host is installed with Google Chrome and is prone to multiple
vulnerabilities.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"Multiple flaws are due to An error within SVG component and multiple
unspecified errors exist.");
script_tag(name:"impact", value:"Successful exploitation will allow remote attackers to bypass certain
security restrictions and possibly have other unspecified impact.");
script_tag(name:"affected", value:"Google Chrome version prior to 36.0.1985.125 on Windows.");
script_tag(name:"solution", value:"Upgrade to Google Chrome 36.0.1985.125 or later.");
script_tag(name:"qod_type", value:"registry");
script_tag(name:"solution_type", value:"VendorFix");
script_xref(name:"URL", value:"http://secunia.com/advisories/60077");
script_xref(name:"URL", value:"http://googlechromereleases.blogspot.com/2014/07/stable-channel-update.html");
script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
script_category(ACT_GATHER_INFO);
script_family("General");
script_dependencies("gb_google_chrome_detect_portable_win.nasl");
script_mandatory_keys("GoogleChrome/Win/Ver");
exit(0);
}
include("host_details.inc");
include("version_func.inc");
if(!chromeVer = get_app_version(cpe:CPE)){
exit(0);
}
if(version_is_less(version:chromeVer, test_version:"36.0.1985.125"))
{
report = report_fixed_ver(installed_version:chromeVer, fixed_version:"36.0.1985.125");
security_message(port:0, data:report);
exit(0);
}
{"id": "OPENVAS:1361412562310804727", "type": "openvas", "bulletinFamily": "scanner", "title": "Google Chrome Multiple Vulnerabilities - 01 July14 (Windows)", "description": "The host is installed with Google Chrome and is prone to multiple\nvulnerabilities.", "published": "2014-08-01T00:00:00", "modified": "2020-04-20T00:00:00", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310804727", "reporter": "Copyright (C) 2014 Greenbone Networks GmbH", "references": ["http://secunia.com/advisories/60077", "http://googlechromereleases.blogspot.com/2014/07/stable-channel-update.html"], "cvelist": ["CVE-2014-3162", "CVE-2014-3160"], "lastseen": "2020-04-22T17:03:20", "viewCount": 1, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2014-3160", "CVE-2014-3162"]}, {"type": "freebsd", "idList": ["3718833E-0D27-11E4-89DB-000C6E25E3E9"]}, {"type": "nessus", "idList": ["GOOGLE_CHROME_36_0_1985_125.NASL", "OPENSUSE-2014-483.NASL", "GENTOO_GLSA-201408-16.NASL", "UBUNTU_USN-2298-1.NASL", "FREEBSD_PKG_3718833E0D2711E489DB000C6E25E3E9.NASL", "MACOSX_GOOGLE_CHROME_36_0_1985_125.NASL", "DEBIAN_DSA-3039.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:703039", "OPENVAS:1361412562310850604", "OPENVAS:1361412562310121260", "OPENVAS:1361412562310804728", "OPENVAS:1361412562310804729", "OPENVAS:1361412562310703039", "OPENVAS:1361412562310841913"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2014:0982-1"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:31141", "SECURITYVULNS:VULN:13996"]}, {"type": "ubuntu", "idList": ["USN-2298-1"]}, {"type": "debian", "idList": ["DEBIAN:DSA-3039-1:478B5"]}, {"type": "gentoo", "idList": ["GLSA-201408-16"]}], "modified": "2020-04-22T17:03:20", "rev": 2}, "score": {"value": 7.8, "vector": "NONE", "modified": "2020-04-22T17:03:20", "rev": 2}, "vulnersScore": 7.8}, "pluginID": "1361412562310804727", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Multiple Vulnerabilities - 01 July14 (Windows)\n#\n# Authors:\n# Thanga Prakash S <tprakash@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.804727\");\n script_version(\"2020-04-20T13:31:49+0000\");\n script_cve_id(\"CVE-2014-3160\", \"CVE-2014-3162\");\n script_bugtraq_id(68677);\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-04-20 13:31:49 +0000 (Mon, 20 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2014-08-01 18:43:05 +0530 (Fri, 01 Aug 2014)\");\n script_name(\"Google Chrome Multiple Vulnerabilities - 01 July14 (Windows)\");\n\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome and is prone to multiple\nvulnerabilities.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Multiple flaws are due to An error within SVG component and multiple\nunspecified errors exist.\");\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote attackers to bypass certain\nsecurity restrictions and possibly have other unspecified impact.\");\n script_tag(name:\"affected\", value:\"Google Chrome version prior to 36.0.1985.125 on Windows.\");\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome 36.0.1985.125 or later.\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/60077\");\n script_xref(name:\"URL\", value:\"http://googlechromereleases.blogspot.com/2014/07/stable-channel-update.html\");\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_portable_win.nasl\");\n script_mandatory_keys(\"GoogleChrome/Win/Ver\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!chromeVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:chromeVer, test_version:\"36.0.1985.125\"))\n{\n report = report_fixed_ver(installed_version:chromeVer, fixed_version:\"36.0.1985.125\");\n security_message(port:0, data:report);\n exit(0);\n}\n", "naslFamily": "General"}
{"cve": [{"lastseen": "2020-10-03T12:01:16", "description": "The ResourceFetcher::canRequest function in core/fetch/ResourceFetcher.cpp in Blink, as used in Google Chrome before 36.0.1985.125, does not properly restrict subresource requests associated with SVG files, which allows remote attackers to bypass the Same Origin Policy via a crafted file.", "edition": 3, "cvss3": {}, "published": "2014-07-20T11:12:00", "title": "CVE-2014-3160", "type": "cve", "cwe": ["CWE-264"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-3160"], "modified": "2017-01-07T02:59:00", "cpe": ["cpe:/a:google:chrome:36.0.1985.36", "cpe:/a:google:chrome:36.0.1985.46", "cpe:/a:google:chrome:36.0.1985.63", "cpe:/a:google:chrome:36.0.1985.4", "cpe:/a:google:chrome:36.0.1985.24", "cpe:/a:google:chrome:36.0.1985.40", "cpe:/a:google:chrome:36.0.1985.78", "cpe:/a:google:chrome:36.0.1985.102", "cpe:/a:google:chrome:36.0.1985.30", "cpe:/a:google:chrome:36.0.1985.100", "cpe:/a:google:chrome:36.0.1985.31", "cpe:/a:google:chrome:36.0.1985.45", "cpe:/a:google:chrome:36.0.1985.37", "cpe:/a:google:chrome:36.0.1985.42", "cpe:/a:google:chrome:36.0.1985.85", "cpe:/a:google:chrome:36.0.1985.91", "cpe:/a:google:chrome:36.0.1985.79", "cpe:/a:google:chrome:36.0.1985.123", "cpe:/a:google:chrome:36.0.1985.33", "cpe:/a:google:chrome:36.0.1985.95", "cpe:/a:google:chrome:36.0.1985.66", "cpe:/a:google:chrome:36.0.1985.53", "cpe:/a:google:chrome:36.0.1985.52", "cpe:/a:google:chrome:36.0.1985.29", "cpe:/a:google:chrome:36.0.1985.103", "cpe:/o:debian:debian_linux:8.0", "cpe:/a:google:chrome:36.0.1985.87", "cpe:/a:google:chrome:36.0.1985.68", "cpe:/a:google:chrome:36.0.1985.69", "cpe:/a:google:chrome:36.0.1985.47", "cpe:/a:google:chrome:36.0.1985.35", "cpe:/a:google:chrome:36.0.1985.88", "cpe:/a:google:chrome:36.0.1985.70", "cpe:/a:google:chrome:36.0.1985.89", "cpe:/a:google:chrome:36.0.1985.32", "cpe:/a:google:chrome:36.0.1985.15", "cpe:/a:google:chrome:36.0.1985.55", "cpe:/a:google:chrome:36.0.1985.16", "cpe:/a:google:chrome:36.0.1985.43", "cpe:/a:google:chrome:36.0.1985.83", "cpe:/a:google:chrome:36.0.1985.54", "cpe:/a:google:chrome:36.0.1985.62", "cpe:/a:google:chrome:36.0.1985.76", "cpe:/a:google:chrome:36.0.1985.93", "cpe:/a:google:chrome:36.0.1985.64", "cpe:/a:google:chrome:36.0.1985.106", "cpe:/a:google:chrome:36.0.1985.94", "cpe:/a:google:chrome:36.0.1985.74", "cpe:/a:google:chrome:36.0.1985.96", "cpe:/a:google:chrome:36.0.1985.124", "cpe:/a:google:chrome:36.0.1985.72", "cpe:/a:google:chrome:36.0.1985.122", "cpe:/a:google:chrome:36.0.1985.44", "cpe:/a:google:chrome:36.0.1985.73", "cpe:/a:google:chrome:36.0.1985.5", "cpe:/a:google:chrome:36.0.1985.84", "cpe:/a:google:chrome:36.0.1985.61", "cpe:/a:google:chrome:36.0.1985.77", "cpe:/a:google:chrome:36.0.1985.48", "cpe:/a:google:chrome:36.0.1985.105", "cpe:/a:google:chrome:36.0.1985.101", "cpe:/a:google:chrome:36.0.1985.39", "cpe:/a:google:chrome:36.0.1985.50", "cpe:/a:google:chrome:36.0.1985.27", "cpe:/a:google:chrome:36.0.1985.22", "cpe:/a:google:chrome:36.0.1985.18", "cpe:/a:google:chrome:36.0.1985.34", "cpe:/a:google:chrome:36.0.1985.60", "cpe:/a:google:chrome:36.0.1985.75", "cpe:/a:google:chrome:36.0.1985.51", "cpe:/a:google:chrome:36.0.1985.86", "cpe:/a:google:chrome:36.0.1985.1", "cpe:/a:google:chrome:36.0.1985.17", "cpe:/a:google:chrome:36.0.1985.41", "cpe:/a:google:chrome:36.0.1985.57", "cpe:/a:google:chrome:36.0.1985.104", "cpe:/a:google:chrome:36.0.1985.65", "cpe:/a:google:chrome:36.0.1985.20", "cpe:/a:google:chrome:36.0.1985.13", "cpe:/a:google:chrome:36.0.1985.19", "cpe:/a:google:chrome:36.0.1985.14", "cpe:/a:google:chrome:36.0.1985.67", "cpe:/a:google:chrome:36.0.1985.49", "cpe:/a:google:chrome:36.0.1985.21", "cpe:/o:debian:debian_linux:7.0", "cpe:/a:google:chrome:36.0.1985.23", "cpe:/a:google:chrome:36.0.1985.59", "cpe:/a:google:chrome:36.0.1985.99", "cpe:/a:google:chrome:36.0.1985.38", "cpe:/a:google:chrome:36.0.1985.28", "cpe:/a:google:chrome:36.0.1985.8", "cpe:/a:google:chrome:36.0.1985.26", "cpe:/a:google:chrome:36.0.1985.92", "cpe:/a:google:chrome:36.0.1985.6", "cpe:/a:google:chrome:36.0.1985.2", "cpe:/a:google:chrome:36.0.1985.25", "cpe:/a:google:chrome:36.0.1985.12", "cpe:/a:google:chrome:36.0.1985.82", "cpe:/a:google:chrome:36.0.1985.98", "cpe:/a:google:chrome:36.0.1985.3", "cpe:/a:google:chrome:36.0.1985.81", "cpe:/a:google:chrome:36.0.1985.58", "cpe:/a:google:chrome:36.0.1985.56", "cpe:/a:google:chrome:36.0.1985.90", "cpe:/a:google:chrome:36.0.1985.97"], "id": "CVE-2014-3160", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3160", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:google:chrome:36.0.1985.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.66:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.87:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.104:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.69:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.122:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.72:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.44:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.70:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.86:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.77:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.88:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.81:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.74:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.73:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.102:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.98:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.101:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.62:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.46:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.45:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.67:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.42:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.84:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.40:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.65:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.83:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.53:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.60:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.100:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.76:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.95:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.79:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.75:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.103:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.64:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.59:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.94:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.41:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.91:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.92:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.82:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.78:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.93:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.56:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.106:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.58:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.57:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.61:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.96:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.123:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.50:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.55:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.97:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.99:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.54:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.51:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.85:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.90:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.68:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.52:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.89:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.105:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.47:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.124:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.63:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T12:01:16", "description": "Multiple unspecified vulnerabilities in Google Chrome before 36.0.1985.125 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "edition": 3, "cvss3": {}, "published": "2014-07-20T11:12:00", "title": "CVE-2014-3162", "type": "cve", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-3162"], "modified": "2017-01-07T02:59:00", "cpe": ["cpe:/a:google:chrome:36.0.1985.36", "cpe:/a:google:chrome:36.0.1985.46", "cpe:/a:google:chrome:36.0.1985.63", "cpe:/a:google:chrome:36.0.1985.4", "cpe:/a:google:chrome:36.0.1985.24", "cpe:/a:google:chrome:36.0.1985.40", "cpe:/a:google:chrome:36.0.1985.78", "cpe:/a:google:chrome:36.0.1985.102", "cpe:/a:google:chrome:36.0.1985.30", "cpe:/a:google:chrome:36.0.1985.100", "cpe:/a:google:chrome:36.0.1985.31", "cpe:/a:google:chrome:36.0.1985.45", "cpe:/a:google:chrome:36.0.1985.37", "cpe:/a:google:chrome:36.0.1985.42", "cpe:/a:google:chrome:36.0.1985.85", "cpe:/a:google:chrome:36.0.1985.91", "cpe:/a:google:chrome:36.0.1985.79", "cpe:/a:google:chrome:36.0.1985.123", "cpe:/a:google:chrome:36.0.1985.33", "cpe:/a:google:chrome:36.0.1985.95", "cpe:/a:google:chrome:36.0.1985.66", "cpe:/a:google:chrome:36.0.1985.53", "cpe:/a:google:chrome:36.0.1985.52", "cpe:/a:google:chrome:36.0.1985.29", "cpe:/a:google:chrome:36.0.1985.103", "cpe:/o:debian:debian_linux:8.0", "cpe:/a:google:chrome:36.0.1985.87", "cpe:/a:google:chrome:36.0.1985.68", "cpe:/a:google:chrome:36.0.1985.69", "cpe:/a:google:chrome:36.0.1985.47", "cpe:/a:google:chrome:36.0.1985.35", "cpe:/a:google:chrome:36.0.1985.88", "cpe:/a:google:chrome:36.0.1985.70", "cpe:/a:google:chrome:36.0.1985.89", "cpe:/a:google:chrome:36.0.1985.32", "cpe:/a:google:chrome:36.0.1985.15", "cpe:/a:google:chrome:36.0.1985.55", "cpe:/a:google:chrome:36.0.1985.16", "cpe:/a:google:chrome:36.0.1985.43", "cpe:/a:google:chrome:36.0.1985.83", "cpe:/a:google:chrome:36.0.1985.54", "cpe:/a:google:chrome:36.0.1985.62", "cpe:/a:google:chrome:36.0.1985.76", "cpe:/a:google:chrome:36.0.1985.93", "cpe:/a:google:chrome:36.0.1985.64", "cpe:/a:google:chrome:36.0.1985.106", "cpe:/a:google:chrome:36.0.1985.94", "cpe:/a:google:chrome:36.0.1985.74", "cpe:/a:google:chrome:36.0.1985.96", "cpe:/a:google:chrome:36.0.1985.124", "cpe:/a:google:chrome:36.0.1985.72", "cpe:/a:google:chrome:36.0.1985.122", "cpe:/a:google:chrome:36.0.1985.44", "cpe:/a:google:chrome:36.0.1985.73", "cpe:/a:google:chrome:36.0.1985.5", "cpe:/a:google:chrome:36.0.1985.84", "cpe:/a:google:chrome:36.0.1985.61", "cpe:/a:google:chrome:36.0.1985.77", "cpe:/a:google:chrome:36.0.1985.48", "cpe:/a:google:chrome:36.0.1985.105", "cpe:/a:google:chrome:36.0.1985.101", "cpe:/a:google:chrome:36.0.1985.39", "cpe:/a:google:chrome:36.0.1985.50", "cpe:/a:google:chrome:36.0.1985.27", "cpe:/a:google:chrome:36.0.1985.22", "cpe:/a:google:chrome:36.0.1985.18", "cpe:/a:google:chrome:36.0.1985.34", "cpe:/a:google:chrome:36.0.1985.60", "cpe:/a:google:chrome:36.0.1985.75", "cpe:/a:google:chrome:36.0.1985.51", "cpe:/a:google:chrome:36.0.1985.86", "cpe:/a:google:chrome:36.0.1985.1", "cpe:/a:google:chrome:36.0.1985.17", "cpe:/a:google:chrome:36.0.1985.41", "cpe:/a:google:chrome:36.0.1985.57", "cpe:/a:google:chrome:36.0.1985.104", "cpe:/a:google:chrome:36.0.1985.65", "cpe:/a:google:chrome:36.0.1985.20", "cpe:/a:google:chrome:36.0.1985.13", "cpe:/a:google:chrome:36.0.1985.19", "cpe:/a:google:chrome:36.0.1985.14", "cpe:/a:google:chrome:36.0.1985.67", "cpe:/a:google:chrome:36.0.1985.49", "cpe:/a:google:chrome:36.0.1985.21", "cpe:/o:debian:debian_linux:7.0", "cpe:/a:google:chrome:36.0.1985.23", "cpe:/a:google:chrome:36.0.1985.59", "cpe:/a:google:chrome:36.0.1985.99", "cpe:/a:google:chrome:36.0.1985.38", "cpe:/a:google:chrome:36.0.1985.28", "cpe:/a:google:chrome:36.0.1985.8", "cpe:/a:google:chrome:36.0.1985.26", "cpe:/a:google:chrome:36.0.1985.92", "cpe:/a:google:chrome:36.0.1985.6", "cpe:/a:google:chrome:36.0.1985.2", "cpe:/a:google:chrome:36.0.1985.25", "cpe:/a:google:chrome:36.0.1985.12", "cpe:/a:google:chrome:36.0.1985.82", "cpe:/a:google:chrome:36.0.1985.98", "cpe:/a:google:chrome:36.0.1985.3", "cpe:/a:google:chrome:36.0.1985.81", "cpe:/a:google:chrome:36.0.1985.58", "cpe:/a:google:chrome:36.0.1985.56", "cpe:/a:google:chrome:36.0.1985.90", "cpe:/a:google:chrome:36.0.1985.97"], "id": "CVE-2014-3162", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3162", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:google:chrome:36.0.1985.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.66:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.87:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.104:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.69:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.122:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.72:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.44:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.70:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.86:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.77:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.88:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.81:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.74:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.73:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.102:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.98:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.101:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.62:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.46:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.45:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.67:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.42:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.84:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.40:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.65:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.83:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.53:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.60:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.100:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.76:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.95:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.79:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.75:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.103:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.64:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.59:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.94:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.41:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.91:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.92:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.82:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.78:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.93:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.56:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.106:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.58:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.57:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.61:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.96:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.123:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.50:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.55:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.97:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.99:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.54:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.51:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.85:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.90:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.68:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.52:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.89:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.105:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.47:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.124:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:36.0.1985.63:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2020-04-22T17:03:06", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3162", "CVE-2014-3160"], "description": "The host is installed with Google Chrome and is prone to multiple\nvulnerabilities.", "modified": "2020-04-20T00:00:00", "published": "2014-08-01T00:00:00", "id": "OPENVAS:1361412562310804728", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310804728", "type": "openvas", "title": "Google Chrome Multiple Vulnerabilities - 01 July14 (Mac OS X)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Multiple Vulnerabilities - 01 July14 (Mac OS X)\n#\n# Authors:\n# Thanga Prakash S <tprakash@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.804728\");\n script_version(\"2020-04-20T13:31:49+0000\");\n script_cve_id(\"CVE-2014-3160\", \"CVE-2014-3162\");\n script_bugtraq_id(68677);\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-04-20 13:31:49 +0000 (Mon, 20 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2014-08-01 18:43:05 +0530 (Fri, 01 Aug 2014)\");\n script_name(\"Google Chrome Multiple Vulnerabilities - 01 July14 (Mac OS X)\");\n\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome and is prone to multiple\nvulnerabilities.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Multiple flaws are due to An error within SVG component and multiple\nunspecified errors exist.\");\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote attackers to bypass certain\nsecurity restrictions and possibly have other unspecified impact.\");\n script_tag(name:\"affected\", value:\"Google Chrome version prior to 36.0.1985.125 on Mac OS X.\");\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome 36.0.1985.125 or later.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/60077\");\n script_xref(name:\"URL\", value:\"http://googlechromereleases.blogspot.com/2014/07/stable-channel-update.html\");\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_macosx.nasl\");\n script_mandatory_keys(\"GoogleChrome/MacOSX/Version\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!chromeVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:chromeVer, test_version:\"36.0.1985.125\"))\n{\n report = report_fixed_ver(installed_version:chromeVer, fixed_version:\"36.0.1985.125\");\n security_message(port:0, data:report);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-04-22T17:03:23", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3162", "CVE-2014-3160"], "description": "The host is installed with Google Chrome and is prone to multiple\nvulnerabilities.", "modified": "2020-04-20T00:00:00", "published": "2014-08-01T00:00:00", "id": "OPENVAS:1361412562310804729", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310804729", "type": "openvas", "title": "Google Chrome Multiple Vulnerabilities - 01 July14 (Linux)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Multiple Vulnerabilities - 01 July14 (Linux)\n#\n# Authors:\n# Thanga Prakash S <tprakash@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.804729\");\n script_version(\"2020-04-20T13:31:49+0000\");\n script_cve_id(\"CVE-2014-3160\", \"CVE-2014-3162\");\n script_bugtraq_id(68677);\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-04-20 13:31:49 +0000 (Mon, 20 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2014-08-01 18:43:05 +0530 (Fri, 01 Aug 2014)\");\n script_name(\"Google Chrome Multiple Vulnerabilities - 01 July14 (Linux)\");\n\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome and is prone to multiple\nvulnerabilities.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Multiple flaws are due to An error within SVG component and multiple\nunspecified errors exist.\");\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote attackers to bypass certain\nsecurity restrictions and possibly have other unspecified impact.\");\n script_tag(name:\"affected\", value:\"Google Chrome version prior to 36.0.1985.125 on Linux.\");\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome 36.0.1985.125 or later.\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/60077\");\n script_xref(name:\"URL\", value:\"http://googlechromereleases.blogspot.com/2014/07/stable-channel-update.html\");\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_lin.nasl\");\n script_mandatory_keys(\"Google-Chrome/Linux/Ver\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!chromeVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:chromeVer, test_version:\"36.0.1985.125\"))\n{\n report = report_fixed_ver(installed_version:chromeVer, fixed_version:\"36.0.1985.125\");\n security_message(port:0, data:report);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-31T18:38:55", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3155", "CVE-2014-3154", "CVE-2014-3157", "CVE-2014-3162", "CVE-2014-3160", "CVE-2014-3156"], "description": "The remote host is missing an update for the ", "modified": "2020-01-31T00:00:00", "published": "2014-08-11T00:00:00", "id": "OPENVAS:1361412562310850604", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310850604", "type": "openvas", "title": "openSUSE: Security Advisory for chromium (openSUSE-SU-2014:0982-1)", "sourceData": "# Copyright (C) 2014 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.850604\");\n script_version(\"2020-01-31T08:23:39+0000\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:23:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2014-08-11 12:26:07 +0200 (Mon, 11 Aug 2014)\");\n script_cve_id(\"CVE-2014-3154\", \"CVE-2014-3155\", \"CVE-2014-3156\", \"CVE-2014-3157\",\n \"CVE-2014-3160\", \"CVE-2014-3162\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"openSUSE: Security Advisory for chromium (openSUSE-SU-2014:0982-1)\");\n\n script_tag(name:\"affected\", value:\"chromium on openSUSE 13.1, openSUSE 12.3\");\n\n script_tag(name:\"insight\", value:\"Chromium was updated to version 36.0.1985.125. New Functionality:\n\n * Rich Notifications Improvements\n\n * An Updated Incognito / Guest NTP design\n\n * The addition of a Browser crash recovery bubble\n\n * Chrome App Launcher for Linux\n\n * Lots of under the hood changes for stability and performance\n\n Security Fixes (bnc#887952, bnc#887955):\n\n * CVE-2014-3160: Same-Origin-Policy bypass in SVG\n\n * CVE-2014-3162: Various fixes from internal audits, fuzzing and other\n initiatives and 24 more fixes for which no description was given.\n\n Packaging changes:\n\n * Switch to newer method to retrieve toolchain packages. Dropping the\n three naclsdk_*tgz files. Everything is now included in the\n toolchain_linux_x86.tar.bz2 tarball\n\n * Add Courgette.tar.xz as that the build process now requires some files\n from Courgette in order to build successfully. This does not mean that\n Courgette is build/delivered.\n\n Includes also an update to Chromium 35.0.1916.153 Security fixes\n (bnc#882264, bnc#882264, bnc#882265, bnc#882263):\n\n * CVE-2014-3154: Use-after-free in filesystem api\n\n * CVE-2014-3155: Out-of-bounds read in SPDY\n\n * CVE-2014-3156: Buffer overflow in clipboard\n\n * CVE-2014-3157: Heap overflow in media\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"openSUSE-SU\", value:\"2014:0982-1\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'chromium'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=(openSUSE12\\.3|openSUSE13\\.1)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSE12.3\") {\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver\", rpm:\"chromedriver~36.0.1985.125~1.50.1\", rls:\"openSUSE12.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver-debuginfo\", rpm:\"chromedriver-debuginfo~36.0.1985.125~1.50.1\", rls:\"openSUSE12.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium\", rpm:\"chromium~36.0.1985.125~1.50.1\", rls:\"openSUSE12.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debuginfo\", rpm:\"chromium-debuginfo~36.0.1985.125~1.50.1\", rls:\"openSUSE12.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debugsource\", rpm:\"chromium-debugsource~36.0.1985.125~1.50.1\", rls:\"openSUSE12.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-desktop-gnome\", rpm:\"chromium-desktop-gnome~36.0.1985.125~1.50.1\", rls:\"openSUSE12.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-desktop-kde\", rpm:\"chromium-desktop-kde~36.0.1985.125~1.50.1\", rls:\"openSUSE12.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-ffmpegsumo\", rpm:\"chromium-ffmpegsumo~36.0.1985.125~1.50.1\", rls:\"openSUSE12.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-ffmpegsumo-debuginfo\", rpm:\"chromium-ffmpegsumo-debuginfo~36.0.1985.125~1.50.1\", rls:\"openSUSE12.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-suid-helper\", rpm:\"chromium-suid-helper~36.0.1985.125~1.50.1\", rls:\"openSUSE12.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-suid-helper-debuginfo\", rpm:\"chromium-suid-helper-debuginfo~36.0.1985.125~1.50.1\", rls:\"openSUSE12.3\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"openSUSE13.1\") {\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver\", rpm:\"chromedriver~36.0.1985.125~41.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver-debuginfo\", rpm:\"chromedriver-debuginfo~36.0.1985.125~41.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium\", rpm:\"chromium~36.0.1985.125~41.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debuginfo\", rpm:\"chromium-debuginfo~36.0.1985.125~41.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debugsource\", rpm:\"chromium-debugsource~36.0.1985.125~41.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-desktop-gnome\", rpm:\"chromium-desktop-gnome~36.0.1985.125~41.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-desktop-kde\", rpm:\"chromium-desktop-kde~36.0.1985.125~41.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-ffmpegsumo\", rpm:\"chromium-ffmpegsumo~36.0.1985.125~41.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-ffmpegsumo-debuginfo\", rpm:\"chromium-ffmpegsumo-debuginfo~36.0.1985.125~41.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-suid-helper\", rpm:\"chromium-suid-helper~36.0.1985.125~41.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-suid-helper-debuginfo\", rpm:\"chromium-suid-helper-debuginfo~36.0.1985.125~41.1\", rls:\"openSUSE13.1\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2017-08-01T10:49:02", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3171", "CVE-2014-3168", "CVE-2014-3176", "CVE-2014-3166", "CVE-2014-3165", "CVE-2014-3178", "CVE-2014-3179", "CVE-2014-3174", "CVE-2014-3175", "CVE-2014-3173", "CVE-2014-3167", "CVE-2014-3169", "CVE-2014-3172", "CVE-2014-3162", "CVE-2014-3170", "CVE-2014-3160", "CVE-2014-3177"], "description": "Several vulnerabilities were discovered in the chromium web browser.\n\nCVE-2014-3160 \nChristian Schneider discovered a same origin bypass issue in SVG\nfile resource fetching.\n\nCVE-2014-3162 \nThe Google Chrome development team addressed multiple issues with\npotential security impact for chromium 36.0.1985.125.\n\nCVE-2014-3165 \nColin Payne discovered a use-after-free issue in the Web Sockets\nimplementation.\n\nCVE-2014-3166 \nAntoine Delignat-Lavaud discovered an information leak in the SPDY\nprotocol implementation.\n\nCVE-2014-3167 \nThe Google Chrome development team addressed multiple issues with\npotential security impact for chromium 36.0.1985.143.\n\nCVE-2014-3168 \ncloudfuzzer discovered a use-after-free issue in SVG image file\nhandling.\n\nCVE-2014-3169 \nAndrzej Dyjak discovered a use-after-free issue in the Webkit/Blink\nDocument Object Model implementation.\n\nCVE-2014-3170 \nRob Wu discovered a way to spoof the url of chromium extensions.\n\nCVE-2014-3171 \ncloudfuzzer discovered a use-after-free issue in chromium", "modified": "2017-07-17T00:00:00", "published": "2014-10-01T00:00:00", "id": "OPENVAS:703039", "href": "http://plugins.openvas.org/nasl.php?oid=703039", "type": "openvas", "title": "Debian Security Advisory DSA 3039-1 (chromium-browser - security update)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3039.nasl 6735 2017-07-17 09:56:49Z teissa $\n# Auto-generated from advisory DSA 3039-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\n\nif(description)\n{\n script_id(703039);\n script_version(\"$Revision: 6735 $\");\n script_cve_id(\"CVE-2014-3160\", \"CVE-2014-3162\", \"CVE-2014-3165\", \"CVE-2014-3166\", \"CVE-2014-3167\", \"CVE-2014-3168\", \"CVE-2014-3169\", \"CVE-2014-3170\", \"CVE-2014-3171\", \"CVE-2014-3172\", \"CVE-2014-3173\", \"CVE-2014-3174\", \"CVE-2014-3175\", \"CVE-2014-3176\", \"CVE-2014-3177\", \"CVE-2014-3178\", \"CVE-2014-3179\");\n script_name(\"Debian Security Advisory DSA 3039-1 (chromium-browser - security update)\");\n script_tag(name: \"last_modification\", value:\"$Date: 2017-07-17 11:56:49 +0200 (Mon, 17 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2014-10-01 16:58:59 +0530 (Wed, 01 Oct 2014)\");\n script_tag(name: \"cvss_base\", value:\"10.0\");\n script_tag(name: \"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2014/dsa-3039.html\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: \"chromium-browser on Debian Linux\");\n script_tag(name: \"insight\", value: \"Chromium is an open-source browser project that aims to build a safer, faster,\nand more stable way for all Internet users to experience the web.\");\n script_tag(name: \"solution\", value: \"For the stable distribution (wheezy), these problems have been fixed in\nversion 37.0.2062.120-1~deb7u1.\n\nFor the testing (jessie) and unstable (sid) distributions, these\nproblems have been fixed in version 37.0.2062.120-1.\n\nWe recommend that you upgrade your chromium-browser packages.\");\n script_tag(name: \"summary\", value: \"Several vulnerabilities were discovered in the chromium web browser.\n\nCVE-2014-3160 \nChristian Schneider discovered a same origin bypass issue in SVG\nfile resource fetching.\n\nCVE-2014-3162 \nThe Google Chrome development team addressed multiple issues with\npotential security impact for chromium 36.0.1985.125.\n\nCVE-2014-3165 \nColin Payne discovered a use-after-free issue in the Web Sockets\nimplementation.\n\nCVE-2014-3166 \nAntoine Delignat-Lavaud discovered an information leak in the SPDY\nprotocol implementation.\n\nCVE-2014-3167 \nThe Google Chrome development team addressed multiple issues with\npotential security impact for chromium 36.0.1985.143.\n\nCVE-2014-3168 \ncloudfuzzer discovered a use-after-free issue in SVG image file\nhandling.\n\nCVE-2014-3169 \nAndrzej Dyjak discovered a use-after-free issue in the Webkit/Blink\nDocument Object Model implementation.\n\nCVE-2014-3170 \nRob Wu discovered a way to spoof the url of chromium extensions.\n\nCVE-2014-3171 \ncloudfuzzer discovered a use-after-free issue in chromium's v8\nbindings.\n\nCVE-2014-3172 \nEli Grey discovered a way to bypass access restrictions using\nchromium's Debugger extension API.\n\nCVE-2014-3173 \njmuizelaar discovered an uninitialized read issue in WebGL.\n\nCVE-2014-3174 \nAtte Kettunen discovered an uninitialized read issue in Web Audio.\n\nCVE-2014-3175 \nThe Google Chrome development team addressed multiple issues with\npotential security impact for chromium 37.0.2062.94.\n\nCVE-2014-3176 \nlokihardt@asrt discovered a combination of flaws that can lead to\nremote code execution outside of chromium's sandbox.\n\nCVE-2014-3177 \nlokihardt@asrt discovered a combination of flaws that can lead to\nremote code execution outside of chromium's sandbox.\n\nCVE-2014-3178 \nmiaubiz discovered a use-after-free issue in the Document Object\nModel implementation in Blink/Webkit.\n\nCVE-2014-3179 \nThe Google Chrome development team addressed multiple issues with\npotential security impact for chromium 37.0.2062.120.\");\n script_tag(name: \"vuldetect\", value: \"This check tests the installed software version using the apt package manager.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"chromium\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-browser\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-browser-dbg\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-browser-inspector\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-browser-l10n\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-dbg\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-inspector\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-l10n\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-browser\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-browser-dbg\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-browser-inspector\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-browser-l10n\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-dbg\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-inspector\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-l10n\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-browser\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-browser-dbg\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-browser-inspector\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-browser-l10n\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-dbg\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-inspector\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-l10n\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-browser\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-browser-dbg\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-browser-inspector\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-browser-l10n\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-dbg\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-inspector\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-l10n\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:37:27", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3171", "CVE-2014-3168", "CVE-2014-3176", "CVE-2014-3166", "CVE-2014-3165", "CVE-2014-3178", "CVE-2014-3179", "CVE-2014-3174", "CVE-2014-3175", "CVE-2014-3173", "CVE-2014-3167", "CVE-2014-3169", "CVE-2014-3172", "CVE-2014-3162", "CVE-2014-3170", "CVE-2014-3160", "CVE-2014-3177"], "description": "Several vulnerabilities were discovered in the chromium web browser.\n\nCVE-2014-3160\nChristian Schneider discovered a same origin bypass issue in SVG\nfile resource fetching.\n\nCVE-2014-3162\nThe Google Chrome development team addressed multiple issues with\npotential security impact for chromium 36.0.1985.125.\n\nCVE-2014-3165\nColin Payne discovered a use-after-free issue in the Web Sockets\nimplementation.\n\nCVE-2014-3166\nAntoine Delignat-Lavaud discovered an information leak in the SPDY\nprotocol implementation.\n\nCVE-2014-3167\nThe Google Chrome development team addressed multiple issues with\npotential security impact for chromium 36.0.1985.143.\n\nCVE-2014-3168\ncloudfuzzer discovered a use-after-free issue in SVG image file\nhandling.\n\nCVE-2014-3169\nAndrzej Dyjak discovered a use-after-free issue in the Webkit/Blink\nDocument Object Model implementation.\n\nCVE-2014-3170\nRob Wu discovered a way to spoof the url of chromium extensions.\n\nCVE-2014-3171\ncloudfuzzer discovered a use-after-free issue in chromium", "modified": "2019-03-19T00:00:00", "published": "2014-10-01T00:00:00", "id": "OPENVAS:1361412562310703039", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703039", "type": "openvas", "title": "Debian Security Advisory DSA 3039-1 (chromium-browser - security update)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3039.nasl 14302 2019-03-19 08:28:48Z cfischer $\n# Auto-generated from advisory DSA 3039-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.703039\");\n script_version(\"$Revision: 14302 $\");\n script_cve_id(\"CVE-2014-3160\", \"CVE-2014-3162\", \"CVE-2014-3165\", \"CVE-2014-3166\", \"CVE-2014-3167\", \"CVE-2014-3168\", \"CVE-2014-3169\", \"CVE-2014-3170\", \"CVE-2014-3171\", \"CVE-2014-3172\", \"CVE-2014-3173\", \"CVE-2014-3174\", \"CVE-2014-3175\", \"CVE-2014-3176\", \"CVE-2014-3177\", \"CVE-2014-3178\", \"CVE-2014-3179\");\n script_name(\"Debian Security Advisory DSA 3039-1 (chromium-browser - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-19 09:28:48 +0100 (Tue, 19 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-10-01 16:58:59 +0530 (Wed, 01 Oct 2014)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2014/dsa-3039.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB7\");\n script_tag(name:\"affected\", value:\"chromium-browser on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the stable distribution (wheezy), these problems have been fixed in\nversion 37.0.2062.120-1~deb7u1.\n\nFor the testing (jessie) and unstable (sid) distributions, these\nproblems have been fixed in version 37.0.2062.120-1.\n\nWe recommend that you upgrade your chromium-browser packages.\");\n script_tag(name:\"summary\", value:\"Several vulnerabilities were discovered in the chromium web browser.\n\nCVE-2014-3160\nChristian Schneider discovered a same origin bypass issue in SVG\nfile resource fetching.\n\nCVE-2014-3162\nThe Google Chrome development team addressed multiple issues with\npotential security impact for chromium 36.0.1985.125.\n\nCVE-2014-3165\nColin Payne discovered a use-after-free issue in the Web Sockets\nimplementation.\n\nCVE-2014-3166\nAntoine Delignat-Lavaud discovered an information leak in the SPDY\nprotocol implementation.\n\nCVE-2014-3167\nThe Google Chrome development team addressed multiple issues with\npotential security impact for chromium 36.0.1985.143.\n\nCVE-2014-3168\ncloudfuzzer discovered a use-after-free issue in SVG image file\nhandling.\n\nCVE-2014-3169\nAndrzej Dyjak discovered a use-after-free issue in the Webkit/Blink\nDocument Object Model implementation.\n\nCVE-2014-3170\nRob Wu discovered a way to spoof the url of chromium extensions.\n\nCVE-2014-3171\ncloudfuzzer discovered a use-after-free issue in chromium's v8\nbindings.\n\nCVE-2014-3172\nEli Grey discovered a way to bypass access restrictions using\nchromium's Debugger extension API.\n\nCVE-2014-3173\njmuizelaar discovered an uninitialized read issue in WebGL.\n\nCVE-2014-3174\nAtte Kettunen discovered an uninitialized read issue in Web Audio.\n\nCVE-2014-3175\nThe Google Chrome development team addressed multiple issues with\npotential security impact for chromium 37.0.2062.94.\n\nCVE-2014-3176\nlokihardt@asrt discovered a combination of flaws that can lead to\nremote code execution outside of chromium's sandbox.\n\nCVE-2014-3177\nlokihardt@asrt discovered a combination of flaws that can lead to\nremote code execution outside of chromium's sandbox.\n\nCVE-2014-3178\nmiaubiz discovered a use-after-free issue in the Document Object\nModel implementation in Blink/Webkit.\n\nCVE-2014-3179\nThe Google Chrome development team addressed multiple issues with\npotential security impact for chromium 37.0.2062.120.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"chromium\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-browser\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-browser-dbg\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-browser-inspector\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-browser-l10n\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-dbg\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-inspector\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-l10n\", ver:\"37.0.2062.120-1~deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:37:29", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3155", "CVE-2014-1735", "CVE-2014-3154", "CVE-2014-1742", "CVE-2014-3152", "CVE-2014-3157", "CVE-2014-1744", "CVE-2014-1743", "CVE-2014-1731", "CVE-2014-1740", "CVE-2014-1746", "CVE-2014-3162", "CVE-2014-1730", "CVE-2014-3160", "CVE-2014-1748", "CVE-2014-1741", "CVE-2014-3803"], "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2014-07-28T00:00:00", "id": "OPENVAS:1361412562310841913", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310841913", "type": "openvas", "title": "Ubuntu Update for oxide-qt USN-2298-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_2298_1.nasl 14140 2019-03-13 12:26:09Z cfischer $\n#\n# Ubuntu Update for oxide-qt USN-2298-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.841913\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-07-28 16:39:33 +0530 (Mon, 28 Jul 2014)\");\n script_cve_id(\"CVE-2014-1730\", \"CVE-2014-1731\", \"CVE-2014-1735\", \"CVE-2014-3162\",\n \"CVE-2014-1740\", \"CVE-2014-1741\", \"CVE-2014-1742\", \"CVE-2014-1743\",\n \"CVE-2014-1744\", \"CVE-2014-1746\", \"CVE-2014-1748\", \"CVE-2014-3152\",\n \"CVE-2014-3154\", \"CVE-2014-3155\", \"CVE-2014-3157\", \"CVE-2014-3160\",\n \"CVE-2014-3803\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:N/A:N\");\n script_name(\"Ubuntu Update for oxide-qt USN-2298-1\");\n\n script_tag(name:\"affected\", value:\"oxide-qt on Ubuntu 14.04 LTS\");\n script_tag(name:\"insight\", value:\"A type confusion bug was discovered in V8. If a user were\ntricked in to opening a specially crafted website, an attacker could potentially\nexploit this to cause a denial of service via renderer crash, or execute\narbitrary code with the privileges of the sandboxed render process.\n(CVE-2014-1730)\n\nA type confusion bug was discovered in Blink. If a user were tricked in to\nopening a specially crafted website, an attacker could potentially exploit\nthis to cause a denial of service via renderer crash, or execute arbitrary\ncode with the privileges of the sandboxed render process. (CVE-2014-1731)\n\nMultiple security issues including memory safety bugs were discovered in\nChromium. If a user were tricked in to opening a specially crafted website,\nan attacker could potentially exploit these to cause a denial of service via\napplication crash or execute arbitrary code with the privileges of the\nuser invoking the program. (CVE-2014-1735, CVE-2014-3162)\n\nMultiple use-after-free issues were discovered in the WebSockets\nimplementation. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit these to cause a denial of\nservice via application crash or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2014-1740)\n\nMultiple integer overflows were discovered in CharacterData\nimplementation. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit these to cause a denial of\nservice via renderer crash or execute arbitrary code with the privileges\nof the sandboxed render process. (CVE-2014-1741)\n\nMultiple use-after-free issues were discovered in Blink. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to cause a denial of service via renderer crash\nor execute arbitrary code with the privileges of the sandboxed render\nprocess. (CVE-2014-1742, CVE-2014-1743)\n\nAn integer overflow bug was discovered in Chromium. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit this to cause a denial of service via application\ncrash or execute arbitrary code with the privileges of the user invoking\nthe program. (CVE-2014-1744)\n\nAn out-of-bounds read was discovered in Chromium. If a user were tricked\nin to opening a specially crafter website, an attacker could potentially\nexploit this to cause a denial of service via application crash.\n(CVE-2014-1746)\n\nIt was discovered that Blink allowed scrollbar painting to extend in to\nthe parent frame in some circumstances. An attacker could potentially\nexploit ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"USN\", value:\"2298-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2298-1/\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'oxide-qt'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU14\\.04 LTS\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:i386\", ver:\"1.0.4-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"oxideqt-codecs:i386\", ver:\"1.0.4-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"oxideqt-codecs-extra:i386\", ver:\"1.0.4-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-05-29T18:36:31", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3171", "CVE-2014-3155", "CVE-2014-1747", "CVE-2014-3168", "CVE-2014-3176", "CVE-2014-1724", "CVE-2014-3166", "CVE-2014-1735", "CVE-2014-1729", "CVE-2014-3165", "CVE-2014-1720", "CVE-2014-3154", "CVE-2014-1742", "CVE-2014-1728", "CVE-2014-1703", "CVE-2014-1719", "CVE-2014-3157", "CVE-2014-1726", "CVE-2014-1705", "CVE-2014-1734", "CVE-2014-1733", "CVE-2014-1732", "CVE-2014-1718", "CVE-2014-1744", "CVE-2014-0538", "CVE-2014-1716", "CVE-2014-1722", "CVE-2014-1743", "CVE-2014-1731", "CVE-2014-1740", "CVE-2014-3174", "CVE-2014-3175", "CVE-2014-3173", "CVE-2014-3167", "CVE-2014-1746", "CVE-2014-1714", "CVE-2014-1749", "CVE-2014-1713", "CVE-2014-3169", "CVE-2014-1745", "CVE-2014-3172", "CVE-2014-1701", "CVE-2014-1704", "CVE-2014-3162", "CVE-2014-3170", "CVE-2014-1730", "CVE-2014-1721", "CVE-2014-3160", "CVE-2014-1725", "CVE-2014-1715", "CVE-2014-1727", "CVE-2014-1702", "CVE-2014-1723", "CVE-2014-1748", "CVE-2014-1717", "CVE-2014-3177", "CVE-2014-1741", "CVE-2014-1700", "CVE-2014-3156"], "description": "Gentoo Linux Local Security Checks GLSA 201408-16", "modified": "2018-10-26T00:00:00", "published": "2015-09-29T00:00:00", "id": "OPENVAS:1361412562310121260", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310121260", "type": "openvas", "title": "Gentoo Security Advisory GLSA 201408-16", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: glsa-201408-16.nasl 12128 2018-10-26 13:35:25Z cfischer $\n#\n# Gentoo Linux security check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.121260\");\n script_version(\"$Revision: 12128 $\");\n script_tag(name:\"creation_date\", value:\"2015-09-29 11:27:47 +0300 (Tue, 29 Sep 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-26 15:35:25 +0200 (Fri, 26 Oct 2018) $\");\n script_name(\"Gentoo Security Advisory GLSA 201408-16\");\n script_tag(name:\"insight\", value:\"Multiple vulnerabilities have been discovered in Chromium. Please review the CVE identifiers referenced below for details.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://security.gentoo.org/glsa/201408-16\");\n script_cve_id(\"CVE-2014-1741\", \"CVE-2014-0538\", \"CVE-2014-1700\", \"CVE-2014-1701\", \"CVE-2014-1702\", \"CVE-2014-1703\", \"CVE-2014-1704\", \"CVE-2014-1705\", \"CVE-2014-1713\", \"CVE-2014-1714\", \"CVE-2014-1715\", \"CVE-2014-1716\", \"CVE-2014-1717\", \"CVE-2014-1718\", \"CVE-2014-1719\", \"CVE-2014-1720\", \"CVE-2014-1721\", \"CVE-2014-1722\", \"CVE-2014-1723\", \"CVE-2014-1724\", \"CVE-2014-1725\", \"CVE-2014-1726\", \"CVE-2014-1727\", \"CVE-2014-1728\", \"CVE-2014-1729\", \"CVE-2014-1730\", \"CVE-2014-1731\", \"CVE-2014-1732\", \"CVE-2014-1733\", \"CVE-2014-1734\", \"CVE-2014-1735\", \"CVE-2014-1740\", \"CVE-2014-1742\", \"CVE-2014-1743\", \"CVE-2014-1744\", \"CVE-2014-1745\", \"CVE-2014-1746\", \"CVE-2014-1747\", \"CVE-2014-1748\", \"CVE-2014-1749\", \"CVE-2014-3154\", \"CVE-2014-3155\", \"CVE-2014-3156\", \"CVE-2014-3157\", \"CVE-2014-3160\", \"CVE-2014-3162\", \"CVE-2014-3165\", \"CVE-2014-3166\", \"CVE-2014-3167\", \"CVE-2014-3168\", \"CVE-2014-3169\", \"CVE-2014-3170\", \"CVE-2014-3171\", \"CVE-2014-3172\", \"CVE-2014-3173\", \"CVE-2014-3174\", \"CVE-2014-3175\", \"CVE-2014-3176\", \"CVE-2014-3177\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"Gentoo Linux Local Security Checks GLSA 201408-16\");\n script_copyright(\"Eero Volotinen\");\n script_family(\"Gentoo Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\n\nif((res=ispkgvuln(pkg:\"www-client/chromium\", unaffected: make_list(\"ge 37.0.2062.94\"), vulnerable: make_list(\"lt 37.0.2062.94\"))) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "freebsd": [{"lastseen": "2016-09-26T17:24:24", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3162", "CVE-2014-3160"], "edition": 1, "description": "\nGoogle Chrome Releases reports:\n\n26 security fixes in this release, including\n\n[380885] Medium CVE-2014-3160: Same-Origin-Policy bypass in SVG. Credit\n\t to Christian Schneider.\n[393765] CVE-2014-3162: Various fixes from internal audits, fuzzing and\n\t other initiatives.\n\n\n", "modified": "2014-07-16T00:00:00", "published": "2014-07-16T00:00:00", "href": "https://vuxml.freebsd.org/freebsd/3718833e-0d27-11e4-89db-000c6e25e3e9.html", "id": "3718833E-0D27-11E4-89DB-000C6E25E3E9", "title": "chromium -- multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "nessus": [{"lastseen": "2021-01-01T03:05:35", "description": "The version of Google Chrome installed on the remote host is a version\nprior to 36.0.1985.125. It is, therefore, affected by multiple\nvulnerabilities allowing an attacker to compromise the integrity of\nthe system via unspecified vectors.", "edition": 23, "published": "2014-07-17T00:00:00", "title": "Google Chrome < 36.0.1985.125 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3162", "CVE-2014-3160"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "GOOGLE_CHROME_36_0_1985_125.NASL", "href": "https://www.tenable.com/plugins/nessus/76581", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(76581);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2018/07/12 19:01:16\");\n\n script_cve_id(\"CVE-2014-3160\", \"CVE-2014-3162\");\n script_bugtraq_id(68677);\n\n script_name(english:\"Google Chrome < 36.0.1985.125 Multiple Vulnerabilities\");\n script_summary(english:\"Checks the version number of Google Chrome.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host contains a web browser that is affected by multiple\nvulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote host is a version\nprior to 36.0.1985.125. It is, therefore, affected by multiple\nvulnerabilities allowing an attacker to compromise the integrity of\nthe system via unspecified vectors.\");\n # http://googlechromereleases.blogspot.com/2014/07/stable-channel-update.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?03fe45fe\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to Google Chrome 36.0.1985.125 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/07/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/07/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/07/17\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"google_chrome_installed.nasl\");\n script_require_keys(\"SMB/Google_Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"SMB/Google_Chrome/Installed\");\ninstalls = get_kb_list(\"SMB/Google_Chrome/*\");\n\ngoogle_chrome_check_version(installs:installs, fix:'36.0.1985.125', severity:SECURITY_WARNING, xss:FALSE);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T10:41:18", "description": "Google Chrome Releases reports :\n\n26 security fixes in this release, including\n\n- [380885] Medium CVE-2014-3160: Same-Origin-Policy bypass in SVG.\nCredit to Christian Schneider.\n\n- [393765] CVE-2014-3162: Various fixes from internal audits, fuzzing\nand other initiatives.", "edition": 20, "published": "2014-07-18T00:00:00", "title": "FreeBSD : chromium -- multiple vulnerabilities (3718833e-0d27-11e4-89db-000c6e25e3e9)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3162", "CVE-2014-3160"], "modified": "2014-07-18T00:00:00", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:chromium"], "id": "FREEBSD_PKG_3718833E0D2711E489DB000C6E25E3E9.NASL", "href": "https://www.tenable.com/plugins/nessus/76584", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2014 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(76584);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2014-3160\", \"CVE-2014-3162\");\n\n script_name(english:\"FreeBSD : chromium -- multiple vulnerabilities (3718833e-0d27-11e4-89db-000c6e25e3e9)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Google Chrome Releases reports :\n\n26 security fixes in this release, including\n\n- [380885] Medium CVE-2014-3160: Same-Origin-Policy bypass in SVG.\nCredit to Christian Schneider.\n\n- [393765] CVE-2014-3162: Various fixes from internal audits, fuzzing\nand other initiatives.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://googlechromereleases.blogspot.nl\"\n );\n # http://www.freebsd.org/ports/portaudit/3718833e-0d27-11e4-89db-000c6e25e3e9.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?97959d34\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/07/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/07/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/07/18\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 Tenable Network Security, Inc.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"chromium<36.0.1985.125\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-01T03:30:13", "description": "The version of Google Chrome installed on the remote Mac OS X host is\na version prior to 36.0.1985.125. It is, therefore, affected by\nmultiple vulnerabilities allowing an attacker to compromise the\nintegrity of the system via unspecified vectors.", "edition": 23, "published": "2014-07-17T00:00:00", "title": "Google Chrome < 36.0.1985.125 Multiple Vulnerabilities (Mac OS X)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3162", "CVE-2014-3160"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "MACOSX_GOOGLE_CHROME_36_0_1985_125.NASL", "href": "https://www.tenable.com/plugins/nessus/76582", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(76582);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2018/07/14 1:59:36\");\n\n script_cve_id(\"CVE-2014-3160\", \"CVE-2014-3162\");\n script_bugtraq_id(68677);\n\n script_name(english:\"Google Chrome < 36.0.1985.125 Multiple Vulnerabilities (Mac OS X)\");\n script_summary(english:\"Checks the version number of Google Chrome.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Mac OS X host contains a web browser that is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote Mac OS X host is\na version prior to 36.0.1985.125. It is, therefore, affected by\nmultiple vulnerabilities allowing an attacker to compromise the\nintegrity of the system via unspecified vectors.\");\n # http://googlechromereleases.blogspot.com/2014/07/stable-channel-update.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?03fe45fe\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to Google Chrome 36.0.1985.125 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/07/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/07/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/07/17\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"macosx_google_chrome_installed.nbin\");\n script_require_keys(\"MacOSX/Google Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"MacOSX/Google Chrome/Installed\");\n\ngoogle_chrome_check_version(fix:'36.0.1985.125', severity:SECURITY_WARNING, xss:FALSE);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-06-05T11:12:18", "description": "Chromium was updated to version 36.0.1985.125. New Functionality :\n\n - Rich Notifications Improvements\n\n - An Updated Incognito / Guest NTP design\n\n - The addition of a Browser crash recovery bubble\n\n - Chrome App Launcher for Linux\n\n - Lots of under the hood changes for stability and\n performance Security Fixes (bnc#887952,bnc#887955) :\n\n - CVE-2014-3160: Same-Origin-Policy bypass in SVG\n\n - CVE-2014-3162: Various fixes from internal audits,\n fuzzing and other initiatives and 24 more fixes for\n which no description was given. Packaging changes :\n\n - Switch to newer method to retrieve toolchain packages.\n Dropping the three naclsdk_*tgz files. Everything is now\n included in the toolchain_linux_x86.tar.bz2 tarball\n\n - Add Courgette.tar.xz as that the build process now\n requires some files from Courgette in order to build\n succesfully. This does not mean that Courgette is\n build/delivered.\n\nIncludes also an update to Chromium 35.0.1916.153 Security fixes\n(bnc#882264,bnc#882264,bnc#882265,bnc#882263) :\n\n - CVE-2014-3154: Use-after-free in filesystem api\n\n - CVE-2014-3155: Out-of-bounds read in SPDY\n\n - CVE-2014-3156: Buffer overflow in clipboard\n\n - CVE-2014-3157: Heap overflow in media", "edition": 17, "published": "2014-08-12T00:00:00", "title": "openSUSE Security Update : chromium (openSUSE-SU-2014:0982-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3155", "CVE-2014-3154", "CVE-2014-3157", "CVE-2014-3162", "CVE-2014-3160", "CVE-2014-3156"], "modified": "2014-08-12T00:00:00", "cpe": ["cpe:/o:novell:opensuse:12.3", "p-cpe:/a:novell:opensuse:chromedriver-debuginfo", "p-cpe:/a:novell:opensuse:chromium-desktop-gnome", "p-cpe:/a:novell:opensuse:chromium", "p-cpe:/a:novell:opensuse:chromium-debugsource", "p-cpe:/a:novell:opensuse:chromium-suid-helper-debuginfo", "p-cpe:/a:novell:opensuse:chromium-suid-helper", "p-cpe:/a:novell:opensuse:chromedriver", "p-cpe:/a:novell:opensuse:chromium-ffmpegsumo", "p-cpe:/a:novell:opensuse:chromium-debuginfo", "cpe:/o:novell:opensuse:13.1", "p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo", "p-cpe:/a:novell:opensuse:chromium-desktop-kde"], "id": "OPENSUSE-2014-483.NASL", "href": "https://www.tenable.com/plugins/nessus/77127", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2014-483.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(77127);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/06/04\");\n\n script_cve_id(\"CVE-2014-3154\", \"CVE-2014-3155\", \"CVE-2014-3156\", \"CVE-2014-3157\", \"CVE-2014-3160\", \"CVE-2014-3162\");\n script_bugtraq_id(67972, 67977, 67980, 67981, 68677);\n\n script_name(english:\"openSUSE Security Update : chromium (openSUSE-SU-2014:0982-1)\");\n script_summary(english:\"Check for the openSUSE-2014-483 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Chromium was updated to version 36.0.1985.125. New Functionality :\n\n - Rich Notifications Improvements\n\n - An Updated Incognito / Guest NTP design\n\n - The addition of a Browser crash recovery bubble\n\n - Chrome App Launcher for Linux\n\n - Lots of under the hood changes for stability and\n performance Security Fixes (bnc#887952,bnc#887955) :\n\n - CVE-2014-3160: Same-Origin-Policy bypass in SVG\n\n - CVE-2014-3162: Various fixes from internal audits,\n fuzzing and other initiatives and 24 more fixes for\n which no description was given. Packaging changes :\n\n - Switch to newer method to retrieve toolchain packages.\n Dropping the three naclsdk_*tgz files. Everything is now\n included in the toolchain_linux_x86.tar.bz2 tarball\n\n - Add Courgette.tar.xz as that the build process now\n requires some files from Courgette in order to build\n succesfully. This does not mean that Courgette is\n build/delivered.\n\nIncludes also an update to Chromium 35.0.1916.153 Security fixes\n(bnc#882264,bnc#882264,bnc#882265,bnc#882263) :\n\n - CVE-2014-3154: Use-after-free in filesystem api\n\n - CVE-2014-3155: Out-of-bounds read in SPDY\n\n - CVE-2014-3156: Buffer overflow in clipboard\n\n - CVE-2014-3157: Heap overflow in media\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=882263\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=882264\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=882265\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=887952\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=887955\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2014-08/msg00013.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected chromium packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-desktop-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-desktop-kde\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-ffmpegsumo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-suid-helper\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-suid-helper-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:12.3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/07/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/08/12\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE12\\.3|SUSE13\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"12.3 / 13.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE12.3\", reference:\"chromedriver-36.0.1985.125-1.50.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"chromedriver-debuginfo-36.0.1985.125-1.50.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"chromium-36.0.1985.125-1.50.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"chromium-debuginfo-36.0.1985.125-1.50.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"chromium-debugsource-36.0.1985.125-1.50.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"chromium-desktop-gnome-36.0.1985.125-1.50.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"chromium-desktop-kde-36.0.1985.125-1.50.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"chromium-ffmpegsumo-36.0.1985.125-1.50.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"chromium-ffmpegsumo-debuginfo-36.0.1985.125-1.50.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"chromium-suid-helper-36.0.1985.125-1.50.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"chromium-suid-helper-debuginfo-36.0.1985.125-1.50.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromedriver-36.0.1985.125-41.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromedriver-debuginfo-36.0.1985.125-41.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-36.0.1985.125-41.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-debuginfo-36.0.1985.125-41.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-debugsource-36.0.1985.125-41.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-desktop-gnome-36.0.1985.125-41.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-desktop-kde-36.0.1985.125-41.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-ffmpegsumo-36.0.1985.125-41.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-ffmpegsumo-debuginfo-36.0.1985.125-41.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-suid-helper-36.0.1985.125-41.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-suid-helper-debuginfo-36.0.1985.125-41.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromium\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-12T09:48:46", "description": "Several vulnerabilities were discovered in the chromium web browser.\n\n - CVE-2014-3160\n Christian Schneider discovered a same origin bypass\n issue in SVG file resource fetching.\n\n - CVE-2014-3162\n The Google Chrome development team addressed multiple\n issues with potential security impact for chromium\n 36.0.1985.125.\n\n - CVE-2014-3165\n Colin Payne discovered a use-after-free issue in the Web\n Sockets implementation.\n\n - CVE-2014-3166\n Antoine Delignat-Lavaud discovered an information leak\n in the SPDY protocol implementation.\n\n - CVE-2014-3167\n The Google Chrome development team addressed multiple\n issues with potential security impact for chromium\n 36.0.1985.143.\n\n - CVE-2014-3168\n cloudfuzzer discovered a use-after-free issue in SVG\n image file handling.\n\n - CVE-2014-3169\n Andrzej Dyjak discovered a use-after-free issue in the\n Webkit/Blink Document Object Model implementation.\n\n - CVE-2014-3170\n Rob Wu discovered a way to spoof the url of chromium\n extensions.\n\n - CVE-2014-3171\n cloudfuzzer discovered a use-after-free issue in\n chromium's v8 bindings.\n\n - CVE-2014-3172\n Eli Grey discovered a way to bypass access restrictions\n using chromium's Debugger extension API.\n\n - CVE-2014-3173\n jmuizelaar discovered an uninitialized read issue in\n WebGL.\n\n - CVE-2014-3174\n Atte Kettunen discovered an uninitialized read issue in\n Web Audio.\n\n - CVE-2014-3175\n The Google Chrome development team addressed multiple\n issues with potential security impact for chromium\n 37.0.2062.94.\n\n - CVE-2014-3176\n lokihardt@asrt discovered a combination of flaws that\n can lead to remote code execution outside of chromium's\n sandbox.\n\n - CVE-2014-3177\n lokihardt@asrt discovered a combination of flaws that\n can lead to remote code execution outside of chromium's\n sandbox.\n\n - CVE-2014-3178\n miaubiz discovered a use-after-free issue in the\n Document Object Model implementation in Blink/Webkit.\n\n - CVE-2014-3179\n The Google Chrome development team addressed multiple\n issues with potential security impact for chromium\n 37.0.2062.120.", "edition": 17, "published": "2014-09-30T00:00:00", "title": "Debian DSA-3039-1 : chromium-browser - security update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3171", "CVE-2014-3168", "CVE-2014-3176", "CVE-2014-3166", "CVE-2014-3165", "CVE-2014-3178", "CVE-2014-3179", "CVE-2014-3174", "CVE-2014-3175", "CVE-2014-3173", "CVE-2014-3167", "CVE-2014-3169", "CVE-2014-3172", "CVE-2014-3162", "CVE-2014-3170", "CVE-2014-3160", "CVE-2014-3177"], "modified": "2014-09-30T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:chromium-browser", "cpe:/o:debian:debian_linux:7.0"], "id": "DEBIAN_DSA-3039.NASL", "href": "https://www.tenable.com/plugins/nessus/77973", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-3039. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(77973);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2014-3160\", \"CVE-2014-3162\", \"CVE-2014-3165\", \"CVE-2014-3166\", \"CVE-2014-3167\", \"CVE-2014-3168\", \"CVE-2014-3169\", \"CVE-2014-3170\", \"CVE-2014-3171\", \"CVE-2014-3172\", \"CVE-2014-3173\", \"CVE-2014-3174\", \"CVE-2014-3175\", \"CVE-2014-3176\", \"CVE-2014-3177\", \"CVE-2014-3178\", \"CVE-2014-3179\");\n script_bugtraq_id(68677, 69201, 69202, 69203, 69398, 69400, 69401, 69402, 69403, 69404, 69405, 69406, 69407, 69709, 69710);\n script_xref(name:\"DSA\", value:\"3039\");\n\n script_name(english:\"Debian DSA-3039-1 : chromium-browser - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities were discovered in the chromium web browser.\n\n - CVE-2014-3160\n Christian Schneider discovered a same origin bypass\n issue in SVG file resource fetching.\n\n - CVE-2014-3162\n The Google Chrome development team addressed multiple\n issues with potential security impact for chromium\n 36.0.1985.125.\n\n - CVE-2014-3165\n Colin Payne discovered a use-after-free issue in the Web\n Sockets implementation.\n\n - CVE-2014-3166\n Antoine Delignat-Lavaud discovered an information leak\n in the SPDY protocol implementation.\n\n - CVE-2014-3167\n The Google Chrome development team addressed multiple\n issues with potential security impact for chromium\n 36.0.1985.143.\n\n - CVE-2014-3168\n cloudfuzzer discovered a use-after-free issue in SVG\n image file handling.\n\n - CVE-2014-3169\n Andrzej Dyjak discovered a use-after-free issue in the\n Webkit/Blink Document Object Model implementation.\n\n - CVE-2014-3170\n Rob Wu discovered a way to spoof the url of chromium\n extensions.\n\n - CVE-2014-3171\n cloudfuzzer discovered a use-after-free issue in\n chromium's v8 bindings.\n\n - CVE-2014-3172\n Eli Grey discovered a way to bypass access restrictions\n using chromium's Debugger extension API.\n\n - CVE-2014-3173\n jmuizelaar discovered an uninitialized read issue in\n WebGL.\n\n - CVE-2014-3174\n Atte Kettunen discovered an uninitialized read issue in\n Web Audio.\n\n - CVE-2014-3175\n The Google Chrome development team addressed multiple\n issues with potential security impact for chromium\n 37.0.2062.94.\n\n - CVE-2014-3176\n lokihardt@asrt discovered a combination of flaws that\n can lead to remote code execution outside of chromium's\n sandbox.\n\n - CVE-2014-3177\n lokihardt@asrt discovered a combination of flaws that\n can lead to remote code execution outside of chromium's\n sandbox.\n\n - CVE-2014-3178\n miaubiz discovered a use-after-free issue in the\n Document Object Model implementation in Blink/Webkit.\n\n - CVE-2014-3179\n The Google Chrome development team addressed multiple\n issues with potential security impact for chromium\n 37.0.2062.120.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2014-3160\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2014-3162\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2014-3165\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2014-3166\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2014-3167\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2014-3168\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2014-3169\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2014-3170\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2014-3171\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2014-3172\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2014-3173\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2014-3174\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2014-3175\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2014-3176\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2014-3177\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2014-3178\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2014-3179\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/wheezy/chromium-browser\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2014/dsa-3039\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the chromium-browser packages.\n\nFor the stable distribution (wheezy), these problems have been fixed\nin version 37.0.2062.120-1~deb7u1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:chromium-browser\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:7.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/07/20\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/09/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/09/30\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"7.0\", prefix:\"chromium\", reference:\"37.0.2062.120-1~deb7u1\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"chromium-browser\", reference:\"37.0.2062.120-1~deb7u1\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"chromium-browser-dbg\", reference:\"37.0.2062.120-1~deb7u1\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"chromium-browser-inspector\", reference:\"37.0.2062.120-1~deb7u1\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"chromium-browser-l10n\", reference:\"37.0.2062.120-1~deb7u1\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"chromium-dbg\", reference:\"37.0.2062.120-1~deb7u1\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"chromium-inspector\", reference:\"37.0.2062.120-1~deb7u1\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"chromium-l10n\", reference:\"37.0.2062.120-1~deb7u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-09-23T18:54:25", "description": "A type confusion bug was discovered in V8. If a user were tricked in\nto opening a specially crafted website, an attacker could potentially\nexploit this to cause a denial of service via renderer crash, or\nexecute arbitrary code with the privileges of the sandboxed render\nprocess. (CVE-2014-1730)\n\nA type confusion bug was discovered in Blink. If a user were tricked\nin to opening a specially crafted website, an attacker could\npotentially exploit this to cause a denial of service via renderer\ncrash, or execute arbitrary code with the privileges of the sandboxed\nrender process. (CVE-2014-1731)\n\nMultiple security issues including memory safety bugs were discovered\nin Chromium. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit these to cause a denial\nof service via application crash or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2014-1735,\nCVE-2014-3162)\n\nMultiple use-after-free issues were discovered in the WebSockets\nimplementation. If a user were tricked in to opening a specially\ncrafted website, an attacker could potentially exploit these to cause\na denial of service via application crash or execute arbitrary code\nwith the privileges of the user invoking the program. (CVE-2014-1740)\n\nMultiple integer overflows were discovered in CharacterData\nimplementation. If a user were tricked in to opening a specially\ncrafted website, an attacker could potentially exploit these to cause\na denial of service via renderer crash or execute arbitrary code with\nthe privileges of the sandboxed render process. (CVE-2014-1741)\n\nMultiple use-after-free issues were discovered in Blink. If a user\nwere tricked in to opening a specially crafted website, an attacker\ncould potentially exploit these to cause a denial of service via\nrenderer crash or execute arbitrary code with the privileges of the\nsandboxed render process. (CVE-2014-1742, CVE-2014-1743)\n\nAn integer overflow bug was discovered in Chromium. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit this to cause a denial of service via application\ncrash or execute arbitrary code with the privileges of the user\ninvoking the program. (CVE-2014-1744)\n\nAn out-of-bounds read was discovered in Chromium. If a user were\ntricked in to opening a specially crafter website, an attacker could\npotentially exploit this to cause a denial of service via application\ncrash. (CVE-2014-1746)\n\nIt was discovered that Blink allowed scrollbar painting to extend in\nto the parent frame in some circumstances. An attacker could\npotentially exploit this to conduct clickjacking attacks via UI\nredress. (CVE-2014-1748)\n\nAn integer underflow was discovered in Blink. If a user were tricked\nin to opening a specially crafter website, an attacker could\npotentially exploit this to cause a denial of service via renderer\ncrash or execute arbitrary code with the privileges of the sandboxed\nrender process. (CVE-2014-3152)\n\nA use-after-free was discovered in Chromium. If a use were tricked in\nto opening a specially crafted website, an attacker could potentially\nexploit this to cause a denial of service via renderer crash or\nexecute arbitrary code with the privileges of the sandboxed render\nprocess. (CVE-2014-3154)\n\nA security issue was discovered in the SPDY implementation. An\nattacker could potentially exploit this to cause a denial of service\nvia application crash or execute arbitrary code with the privileges of\nthe user invoking the program. (CVE-2014-3155)\n\nA heap overflow was discovered in Chromium. If a use were tricked in\nto opening a specially crafted website, an attacker could potentially\nexploit this to cause a denial of service via renderer crash or\nexecute arbitrary code with the privileges of the sandboxed render\nprocess. (CVE-2014-3157)\n\nIt was discovered that Blink did not enforce security rules for\nsubresource loading in SVG images. If a user opened a site that\nembedded a specially crafted image, an attacker could exploit this to\nlog page views. (CVE-2014-3160)\n\nIt was discovered that the SpeechInput feature in Blink could be\nactivated without consent or any visible indication. If a user were\ntricked in to opening a specially crafted website, an attacker could\nexploit this to eavesdrop on the user. (CVE-2014-3803).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 23, "published": "2014-07-24T00:00:00", "title": "Ubuntu 14.04 LTS : oxide-qt vulnerabilities (USN-2298-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3155", "CVE-2014-1735", "CVE-2014-3154", "CVE-2014-1742", "CVE-2014-3152", "CVE-2014-3157", "CVE-2014-1744", "CVE-2014-1743", "CVE-2014-1731", "CVE-2014-1740", "CVE-2014-1746", "CVE-2014-3162", "CVE-2014-1730", "CVE-2014-3160", "CVE-2014-1748", "CVE-2014-1741", "CVE-2014-3803"], "modified": "2014-07-24T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:oxideqt-codecs", "p-cpe:/a:canonical:ubuntu_linux:oxideqt-codecs-extra", "p-cpe:/a:canonical:ubuntu_linux:liboxideqtcore0", "cpe:/o:canonical:ubuntu_linux:14.04"], "id": "UBUNTU_USN-2298-1.NASL", "href": "https://www.tenable.com/plugins/nessus/76756", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2298-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(76756);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/09/22\");\n\n script_cve_id(\"CVE-2014-1730\", \"CVE-2014-1731\", \"CVE-2014-1735\", \"CVE-2014-1740\", \"CVE-2014-1741\", \"CVE-2014-1742\", \"CVE-2014-1743\", \"CVE-2014-1744\", \"CVE-2014-1746\", \"CVE-2014-1748\", \"CVE-2014-3152\", \"CVE-2014-3154\", \"CVE-2014-3155\", \"CVE-2014-3157\", \"CVE-2014-3160\", \"CVE-2014-3162\", \"CVE-2014-3803\");\n script_bugtraq_id(67082, 67374, 67375, 67376, 67517, 67572, 67582, 67972, 67977, 67980, 68677);\n script_xref(name:\"USN\", value:\"2298-1\");\n\n script_name(english:\"Ubuntu 14.04 LTS : oxide-qt vulnerabilities (USN-2298-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A type confusion bug was discovered in V8. If a user were tricked in\nto opening a specially crafted website, an attacker could potentially\nexploit this to cause a denial of service via renderer crash, or\nexecute arbitrary code with the privileges of the sandboxed render\nprocess. (CVE-2014-1730)\n\nA type confusion bug was discovered in Blink. If a user were tricked\nin to opening a specially crafted website, an attacker could\npotentially exploit this to cause a denial of service via renderer\ncrash, or execute arbitrary code with the privileges of the sandboxed\nrender process. (CVE-2014-1731)\n\nMultiple security issues including memory safety bugs were discovered\nin Chromium. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit these to cause a denial\nof service via application crash or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2014-1735,\nCVE-2014-3162)\n\nMultiple use-after-free issues were discovered in the WebSockets\nimplementation. If a user were tricked in to opening a specially\ncrafted website, an attacker could potentially exploit these to cause\na denial of service via application crash or execute arbitrary code\nwith the privileges of the user invoking the program. (CVE-2014-1740)\n\nMultiple integer overflows were discovered in CharacterData\nimplementation. If a user were tricked in to opening a specially\ncrafted website, an attacker could potentially exploit these to cause\na denial of service via renderer crash or execute arbitrary code with\nthe privileges of the sandboxed render process. (CVE-2014-1741)\n\nMultiple use-after-free issues were discovered in Blink. If a user\nwere tricked in to opening a specially crafted website, an attacker\ncould potentially exploit these to cause a denial of service via\nrenderer crash or execute arbitrary code with the privileges of the\nsandboxed render process. (CVE-2014-1742, CVE-2014-1743)\n\nAn integer overflow bug was discovered in Chromium. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit this to cause a denial of service via application\ncrash or execute arbitrary code with the privileges of the user\ninvoking the program. (CVE-2014-1744)\n\nAn out-of-bounds read was discovered in Chromium. If a user were\ntricked in to opening a specially crafter website, an attacker could\npotentially exploit this to cause a denial of service via application\ncrash. (CVE-2014-1746)\n\nIt was discovered that Blink allowed scrollbar painting to extend in\nto the parent frame in some circumstances. An attacker could\npotentially exploit this to conduct clickjacking attacks via UI\nredress. (CVE-2014-1748)\n\nAn integer underflow was discovered in Blink. If a user were tricked\nin to opening a specially crafter website, an attacker could\npotentially exploit this to cause a denial of service via renderer\ncrash or execute arbitrary code with the privileges of the sandboxed\nrender process. (CVE-2014-3152)\n\nA use-after-free was discovered in Chromium. If a use were tricked in\nto opening a specially crafted website, an attacker could potentially\nexploit this to cause a denial of service via renderer crash or\nexecute arbitrary code with the privileges of the sandboxed render\nprocess. (CVE-2014-3154)\n\nA security issue was discovered in the SPDY implementation. An\nattacker could potentially exploit this to cause a denial of service\nvia application crash or execute arbitrary code with the privileges of\nthe user invoking the program. (CVE-2014-3155)\n\nA heap overflow was discovered in Chromium. If a use were tricked in\nto opening a specially crafted website, an attacker could potentially\nexploit this to cause a denial of service via renderer crash or\nexecute arbitrary code with the privileges of the sandboxed render\nprocess. (CVE-2014-3157)\n\nIt was discovered that Blink did not enforce security rules for\nsubresource loading in SVG images. If a user opened a site that\nembedded a specially crafted image, an attacker could exploit this to\nlog page views. (CVE-2014-3160)\n\nIt was discovered that the SpeechInput feature in Blink could be\nactivated without consent or any visible indication. If a user were\ntricked in to opening a specially crafted website, an attacker could\nexploit this to eavesdrop on the user. (CVE-2014-3803).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/2298-1/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Update the affected liboxideqtcore0, oxideqt-codecs and / or\noxideqt-codecs-extra packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:liboxideqtcore0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:oxideqt-codecs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:oxideqt-codecs-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/04/26\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/07/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/07/24\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2014-2020 Canonical, Inc. / NASL script (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(14\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 14.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"14.04\", pkgname:\"liboxideqtcore0\", pkgver:\"1.0.4-0ubuntu0.14.04.1\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"oxideqt-codecs\", pkgver:\"1.0.4-0ubuntu0.14.04.1\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"oxideqt-codecs-extra\", pkgver:\"1.0.4-0ubuntu0.14.04.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"liboxideqtcore0 / oxideqt-codecs / oxideqt-codecs-extra\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2021-01-07T10:56:08", "description": "The remote host is affected by the vulnerability described in GLSA-201408-16\n(Chromium: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Chromium. Please review\n the CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker could conduct a number of attacks which include: cross\n site scripting attacks, bypassing of sandbox protection, potential\n execution of arbitrary code with the privileges of the process, or cause\n a Denial of Service condition.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 23, "published": "2014-08-30T00:00:00", "title": "GLSA-201408-16 : Chromium: Multiple vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3171", "CVE-2014-3155", "CVE-2014-1747", "CVE-2014-3168", "CVE-2014-3176", "CVE-2014-1724", "CVE-2014-3166", "CVE-2014-1735", "CVE-2014-1729", "CVE-2014-3165", "CVE-2014-1720", "CVE-2014-3154", "CVE-2014-1742", "CVE-2014-1728", "CVE-2014-1703", "CVE-2014-1719", "CVE-2014-3157", "CVE-2014-1726", "CVE-2014-1705", "CVE-2014-1734", "CVE-2014-1733", "CVE-2014-1732", "CVE-2014-1718", "CVE-2014-1744", "CVE-2014-0538", "CVE-2014-1716", "CVE-2014-1722", "CVE-2014-1743", "CVE-2014-1731", "CVE-2014-1740", "CVE-2014-3174", "CVE-2014-3175", "CVE-2014-3173", "CVE-2014-3167", "CVE-2014-1746", "CVE-2014-1714", "CVE-2014-1749", "CVE-2014-1713", "CVE-2014-3169", "CVE-2014-1745", "CVE-2014-3172", "CVE-2014-1701", "CVE-2014-1704", "CVE-2014-3162", "CVE-2014-3170", "CVE-2014-1730", "CVE-2014-1721", "CVE-2014-3160", "CVE-2014-1725", "CVE-2014-1715", "CVE-2014-1727", "CVE-2014-1702", "CVE-2014-1723", "CVE-2014-1748", "CVE-2014-1717", "CVE-2014-3177", "CVE-2014-1741", "CVE-2014-1700", "CVE-2014-3156"], "modified": "2014-08-30T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:chromium"], "id": "GENTOO_GLSA-201408-16.NASL", "href": "https://www.tenable.com/plugins/nessus/77460", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201408-16.\n#\n# The advisory text is Copyright (C) 2001-2017 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(77460);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2014-0538\", \"CVE-2014-1700\", \"CVE-2014-1701\", \"CVE-2014-1702\", \"CVE-2014-1703\", \"CVE-2014-1704\", \"CVE-2014-1705\", \"CVE-2014-1713\", \"CVE-2014-1714\", \"CVE-2014-1715\", \"CVE-2014-1716\", \"CVE-2014-1717\", \"CVE-2014-1718\", \"CVE-2014-1719\", \"CVE-2014-1720\", \"CVE-2014-1721\", \"CVE-2014-1722\", \"CVE-2014-1723\", \"CVE-2014-1724\", \"CVE-2014-1725\", \"CVE-2014-1726\", \"CVE-2014-1727\", \"CVE-2014-1728\", \"CVE-2014-1729\", \"CVE-2014-1730\", \"CVE-2014-1731\", \"CVE-2014-1732\", \"CVE-2014-1733\", \"CVE-2014-1734\", \"CVE-2014-1735\", \"CVE-2014-1740\", \"CVE-2014-1741\", \"CVE-2014-1742\", \"CVE-2014-1743\", \"CVE-2014-1744\", \"CVE-2014-1745\", \"CVE-2014-1746\", \"CVE-2014-1747\", \"CVE-2014-1748\", \"CVE-2014-1749\", \"CVE-2014-3154\", \"CVE-2014-3155\", \"CVE-2014-3156\", \"CVE-2014-3157\", \"CVE-2014-3160\", \"CVE-2014-3162\", \"CVE-2014-3165\", \"CVE-2014-3166\", \"CVE-2014-3167\", \"CVE-2014-3168\", \"CVE-2014-3169\", \"CVE-2014-3170\", \"CVE-2014-3171\", \"CVE-2014-3172\", \"CVE-2014-3173\", \"CVE-2014-3174\", \"CVE-2014-3175\", \"CVE-2014-3176\", \"CVE-2014-3177\");\n script_bugtraq_id(66120, 66239, 66243, 66249, 66252, 66704, 67082, 67374, 67375, 67376, 67517, 67572, 67972, 67977, 67980, 67981, 68677, 69192, 69201, 69202, 69203, 69398, 69400, 69401, 69402, 69403, 69405, 69406, 69407);\n script_xref(name:\"GLSA\", value:\"201408-16\");\n\n script_name(english:\"GLSA-201408-16 : Chromium: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201408-16\n(Chromium: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Chromium. Please review\n the CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker could conduct a number of attacks which include: cross\n site scripting attacks, bypassing of sandbox protection, potential\n execution of arbitrary code with the privileges of the process, or cause\n a Denial of Service condition.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201408-16\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All chromium users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose\n '>=www-client/chromium-37.0.2062.94'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/08/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/08/30\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"www-client/chromium\", unaffected:make_list(\"ge 37.0.2062.94\"), vulnerable:make_list(\"lt 37.0.2062.94\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Chromium\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "suse": [{"lastseen": "2016-09-04T12:01:48", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3155", "CVE-2014-3154", "CVE-2014-3157", "CVE-2014-3162", "CVE-2014-3160", "CVE-2014-3156"], "description": "Chromium was updated to version 36.0.1985.125. New Functionality:\n * Rich Notifications Improvements\n * An Updated Incognito / Guest NTP design\n * The addition of a Browser crash recovery bubble\n * Chrome App Launcher for Linux\n * Lots of under the hood changes for stability and performance\n\n Security Fixes (bnc#887952,bnc#887955):\n * CVE-2014-3160: Same-Origin-Policy bypass in SVG\n * CVE-2014-3162: Various fixes from internal audits, fuzzing and other\n initiatives and 24 more fixes for which no description was given.\n\n Packaging changes:\n * Switch to newer method to retrieve toolchain packages. Dropping the\n three naclsdk_*tgz files. Everything is now included in the\n toolchain_linux_x86.tar.bz2 tarball\n * Add Courgette.tar.xz as that the build process now requires some files\n from Courgette in order to build succesfully. This does not mean that\n Courgette is build/delivered.\n\n Includes also an update to Chromium 35.0.1916.153 Security fixes\n (bnc#882264,bnc#882264,bnc#882265,bnc#882263):\n * CVE-2014-3154: Use-after-free in filesystem api\n * CVE-2014-3155: Out-of-bounds read in SPDY\n * CVE-2014-3156: Buffer overflow in clipboard\n * CVE-2014-3157: Heap overflow in media\n\n", "edition": 1, "modified": "2014-08-11T10:09:58", "published": "2014-08-11T10:09:58", "id": "OPENSUSE-SU-2014:0982-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00006.html", "title": "chromium: update to 36.0.1985.125 (important)", "type": "suse", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "debian": [{"lastseen": "2020-08-12T00:59:51", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3171", "CVE-2014-3168", "CVE-2014-3176", "CVE-2014-3166", "CVE-2014-3165", "CVE-2014-3178", "CVE-2014-3179", "CVE-2014-3174", "CVE-2014-3175", "CVE-2014-3173", "CVE-2014-3167", "CVE-2014-3169", "CVE-2014-3172", "CVE-2014-3162", "CVE-2014-3170", "CVE-2014-3160", "CVE-2014-3177"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3039-1 security@debian.org\nhttp://www.debian.org/security/ Michael Gilbert\nSeptember 28, 2014 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : chromium-browser\nCVE ID : CVE-2014-3160 CVE-2014-3162 CVE-2014-3165 CVE-2014-3166\n CVE-2014-3167 CVE-2014-3168 CVE-2014-3169 CVE-2014-3170\n CVE-2014-3171 CVE-2014-3172 CVE-2014-3173 CVE-2014-3174\n CVE-2014-3175 CVE-2014-3176 CVE-2014-3177 CVE-2014-3178\n CVE-2014-3179\n\nSeveral vulnerabilities were discovered in the chromium web browser.\n\nCVE-2014-3160\n\n Christian Schneider discovered a same origin bypass issue in SVG\n file resource fetching.\n\nCVE-2014-3162\n\n The Google Chrome development team addressed multiple issues with\n potential security impact for chromium 36.0.1985.125.\n\nCVE-2014-3165\n\n Colin Payne discovered a use-after-free issue in the Web Sockets\n implementation.\n\nCVE-2014-3166\n\n Antoine Delignat-Lavaud discovered an information leak in the SPDY\n protocol implementation.\n\nCVE-2014-3167\n\n The Google Chrome development team addressed multiple issues with\n potential security impact for chromium 36.0.1985.143.\n\nCVE-2014-3168\n\n cloudfuzzer discovered a use-after-free issue in SVG image file\n handling.\n\nCVE-2014-3169\n\n Andrzej Dyjak discovered a use-after-free issue in the Webkit/Blink\n Document Object Model implementation.\n\nCVE-2014-3170\n\n Rob Wu discovered a way to spoof the url of chromium extensions.\n\nCVE-2014-3171\n\n cloudfuzzer discovered a use-after-free issue in chromium's v8\n bindings.\n\nCVE-2014-3172\n\n Eli Grey discovered a way to bypass access restrictions using\n chromium's Debugger extension API.\n\nCVE-2014-3173\n\n jmuizelaar discovered an uninitialized read issue in WebGL.\n\nCVE-2014-3174\n\n Atte Kettunen discovered an uninitialized read issue in Web Audio.\n\nCVE-2014-3175\n\n The Google Chrome development team addressed multiple issues with\n potential security impact for chromium 37.0.2062.94.\n\nCVE-2014-3176\n\n lokihardt@asrt discovered a combination of flaws that can lead to\n remote code execution outside of chromium's sandbox.\n\nCVE-2014-3177\n\n lokihardt@asrt discovered a combination of flaws that can lead to\n remote code execution outside of chromium's sandbox.\n\nCVE-2014-3178\n\n miaubiz discovered a use-after-free issue in the Document Object\n Model implementation in Blink/Webkit.\n\nCVE-2014-3179\n\n The Google Chrome development team addressed multiple issues with\n potential security impact for chromium 37.0.2062.120.\n\nFor the stable distribution (wheezy), these problems have been fixed in\nversion 37.0.2062.120-1~deb7u1.\n\nFor the testing (jessie) and unstable (sid) distributions, these\nproblems have been fixed in version 37.0.2062.120-1.\n\nWe recommend that you upgrade your chromium-browser packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 7, "modified": "2014-09-28T19:24:48", "published": "2014-09-28T19:24:48", "id": "DEBIAN:DSA-3039-1:478B5", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2014/msg00227.html", "title": "[SECURITY] [DSA 3039-1] chromium-browser security update", "type": "debian", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:54", "bulletinFamily": "software", "cvelist": ["CVE-2014-3171", "CVE-2014-3168", "CVE-2014-3176", "CVE-2014-3166", "CVE-2014-3165", "CVE-2014-3178", "CVE-2014-3179", "CVE-2014-3174", "CVE-2014-3175", "CVE-2014-3173", "CVE-2014-3167", "CVE-2014-3169", "CVE-2014-3172", "CVE-2014-3162", "CVE-2014-3170", "CVE-2014-3160", "CVE-2014-3177"], "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA512\r\n\r\n- -------------------------------------------------------------------------\r\nDebian Security Advisory DSA-3039-1 security@debian.org\r\nhttp://www.debian.org/security/ Michael Gilbert\r\nSeptember 28, 2014 http://www.debian.org/security/faq\r\n- -------------------------------------------------------------------------\r\n\r\nPackage : chromium-browser\r\nCVE ID : CVE-2014-3160 CVE-2014-3162 CVE-2014-3165 CVE-2014-3166\r\n CVE-2014-3167 CVE-2014-3168 CVE-2014-3169 CVE-2014-3170\r\n CVE-2014-3171 CVE-2014-3172 CVE-2014-3173 CVE-2014-3174\r\n CVE-2014-3175 CVE-2014-3176 CVE-2014-3177 CVE-2014-3178\r\n CVE-2014-3179\r\n\r\nSeveral vulnerabilities were discovered in the chromium web browser.\r\n\r\nCVE-2014-3160\r\n\r\n Christian Schneider discovered a same origin bypass issue in SVG\r\n file resource fetching.\r\n\r\nCVE-2014-3162\r\n\r\n The Google Chrome development team addressed multiple issues with\r\n potential security impact for chromium 36.0.1985.125.\r\n\r\nCVE-2014-3165\r\n\r\n Colin Payne discovered a use-after-free issue in the Web Sockets\r\n implementation.\r\n\r\nCVE-2014-3166\r\n\r\n Antoine Delignat-Lavaud discovered an information leak in the SPDY\r\n protocol implementation.\r\n\r\nCVE-2014-3167\r\n\r\n The Google Chrome development team addressed multiple issues with\r\n potential security impact for chromium 36.0.1985.143.\r\n\r\nCVE-2014-3168\r\n\r\n cloudfuzzer discovered a use-after-free issue in SVG image file\r\n handling.\r\n\r\nCVE-2014-3169\r\n\r\n Andrzej Dyjak discovered a use-after-free issue in the Webkit/Blink\r\n Document Object Model implementation.\r\n\r\nCVE-2014-3170\r\n\r\n Rob Wu discovered a way to spoof the url of chromium extensions.\r\n\r\nCVE-2014-3171\r\n\r\n cloudfuzzer discovered a use-after-free issue in chromium's v8\r\n bindings.\r\n\r\nCVE-2014-3172\r\n\r\n Eli Grey discovered a way to bypass access restrictions using\r\n chromium's Debugger extension API.\r\n\r\nCVE-2014-3173\r\n\r\n jmuizelaar discovered an uninitialized read issue in WebGL.\r\n\r\nCVE-2014-3174\r\n\r\n Atte Kettunen discovered an uninitialized read issue in Web Audio.\r\n\r\nCVE-2014-3175\r\n\r\n The Google Chrome development team addressed multiple issues with\r\n potential security impact for chromium 37.0.2062.94.\r\n\r\nCVE-2014-3176\r\n\r\n lokihardt@asrt discovered a combination of flaws that can lead to\r\n remote code execution outside of chromium's sandbox.\r\n\r\nCVE-2014-3177\r\n\r\n lokihardt@asrt discovered a combination of flaws that can lead to\r\n remote code execution outside of chromium's sandbox.\r\n\r\nCVE-2014-3178\r\n\r\n miaubiz discovered a use-after-free issue in the Document Object\r\n Model implementation in Blink/Webkit.\r\n\r\nCVE-2014-3179\r\n\r\n The Google Chrome development team addressed multiple issues with\r\n potential security impact for chromium 37.0.2062.120.\r\n\r\nFor the stable distribution (wheezy), these problems have been fixed in\r\nversion 37.0.2062.120-1~deb7u1.\r\n\r\nFor the testing (jessie) and unstable (sid) distributions, these\r\nproblems have been fixed in version 37.0.2062.120-1.\r\n\r\nWe recommend that you upgrade your chromium-browser packages.\r\n\r\nFurther information about Debian Security Advisories, how to apply\r\nthese updates to your system and frequently asked questions can be\r\nfound at: https://www.debian.org/security/\r\n\r\nMailing list: debian-security-announce@lists.debian.org\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1\r\n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\r\n=pGsl\r\n-----END PGP SIGNATURE-----\r\n\r\n", "edition": 1, "modified": "2014-10-05T00:00:00", "published": "2014-10-05T00:00:00", "id": "SECURITYVULNS:DOC:31141", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:31141", "title": "[SECURITY] [DSA 3039-1] chromium-browser security update", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:57", "bulletinFamily": "software", "cvelist": ["CVE-2014-3171", "CVE-2014-3168", "CVE-2014-3176", "CVE-2014-3166", "CVE-2014-3165", "CVE-2014-3178", "CVE-2014-3179", "CVE-2014-3174", "CVE-2014-3175", "CVE-2014-3173", "CVE-2014-3167", "CVE-2014-3169", "CVE-2014-3172", "CVE-2014-3162", "CVE-2014-3170", "CVE-2014-3160", "CVE-2014-3177"], "description": "Restrictions bypass, memroy corruptions, information leakage, URL spoofing.", "edition": 1, "modified": "2014-10-05T00:00:00", "published": "2014-10-05T00:00:00", "id": "SECURITYVULNS:VULN:13996", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:13996", "title": "Google Chrome / Chromium multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "ubuntu": [{"lastseen": "2020-07-02T11:35:22", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3155", "CVE-2014-1735", "CVE-2014-3154", "CVE-2014-1742", "CVE-2014-3152", "CVE-2014-3157", "CVE-2014-1744", "CVE-2014-1743", "CVE-2014-1731", "CVE-2014-1740", "CVE-2014-1746", "CVE-2014-3162", "CVE-2014-1730", "CVE-2014-3160", "CVE-2014-1748", "CVE-2014-1741", "CVE-2014-3803"], "description": "A type confusion bug was discovered in V8. If a user were tricked in to \nopening a specially crafted website, an attacker could potentially exploit \nthis to cause a denial of service via renderer crash, or execute arbitrary \ncode with the privileges of the sandboxed render process. (CVE-2014-1730)\n\nA type confusion bug was discovered in Blink. If a user were tricked in to \nopening a specially crafted website, an attacker could potentially exploit \nthis to cause a denial of service via renderer crash, or execute arbitrary \ncode with the privileges of the sandboxed render process. (CVE-2014-1731)\n\nMultiple security issues including memory safety bugs were discovered in \nChromium. If a user were tricked in to opening a specially crafted website, \nan attacker could potentially exploit these to cause a denial of service via \napplication crash or execute arbitrary code with the privileges of the \nuser invoking the program. (CVE-2014-1735, CVE-2014-3162)\n\nMultiple use-after-free issues were discovered in the WebSockets \nimplementation. If a user were tricked in to opening a specially crafted \nwebsite, an attacker could potentially exploit these to cause a denial of \nservice via application crash or execute arbitrary code with the \nprivileges of the user invoking the program. (CVE-2014-1740)\n\nMultiple integer overflows were discovered in CharacterData \nimplementation. If a user were tricked in to opening a specially crafted \nwebsite, an attacker could potentially exploit these to cause a denial of \nservice via renderer crash or execute arbitrary code with the privileges \nof the sandboxed render process. (CVE-2014-1741)\n\nMultiple use-after-free issues were discovered in Blink. If a user were \ntricked in to opening a specially crafted website, an attacker could \npotentially exploit these to cause a denial of service via renderer crash \nor execute arbitrary code with the privileges of the sandboxed render \nprocess. (CVE-2014-1742, CVE-2014-1743)\n\nAn integer overflow bug was discovered in Chromium. If a user were \ntricked in to opening a specially crafted website, an attacker could \npotentially exploit this to cause a denial of service via application \ncrash or execute arbitrary code with the privileges of the user invoking \nthe program. (CVE-2014-1744)\n\nAn out-of-bounds read was discovered in Chromium. If a user were tricked \nin to opening a specially crafter website, an attacker could potentially \nexploit this to cause a denial of service via application crash. \n(CVE-2014-1746)\n\nIt was discovered that Blink allowed scrollbar painting to extend in to \nthe parent frame in some circumstances. An attacker could potentially \nexploit this to conduct clickjacking attacks via UI redress. \n(CVE-2014-1748)\n\nAn integer underflow was discovered in Blink. If a user were tricked in to \nopening a specially crafter website, an attacker could potentially exploit \nthis to cause a denial of service via renderer crash or execute arbitrary \ncode with the privileges of the sandboxed render process. (CVE-2014-3152)\n\nA use-after-free was discovered in Chromium. If a use were tricked in to \nopening a specially crafted website, an attacker could potentially exploit \nthis to cause a denial of service via renderer crash or execute arbitrary \ncode with the privileges of the sandboxed render process. \n(CVE-2014-3154)\n\nA security issue was discovered in the SPDY implementation. An attacker \ncould potentially exploit this to cause a denial of service via \napplication crash or execute arbitrary code with the privileges of the \nuser invoking the program. (CVE-2014-3155)\n\nA heap overflow was discovered in Chromium. If a use were tricked in to \nopening a specially crafted website, an attacker could potentially exploit \nthis to cause a denial of service via renderer crash or execute arbitrary \ncode with the privileges of the sandboxed render process. (CVE-2014-3157)\n\nIt was discovered that Blink did not enforce security rules for \nsubresource loading in SVG images. If a user opened a site that embedded a \nspecially crafted image, an attacker could exploit this to log page views. \n(CVE-2014-3160)\n\nIt was discovered that the SpeechInput feature in Blink could be activated \nwithout consent or any visible indication. If a user were tricked in to \nopening a specially crafted website, an attacker could exploit this to \neavesdrop on the user. (CVE-2014-3803)", "edition": 5, "modified": "2014-07-23T00:00:00", "published": "2014-07-23T00:00:00", "id": "USN-2298-1", "href": "https://ubuntu.com/security/notices/USN-2298-1", "title": "Oxide vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:C/I:N/A:N"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:00", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3171", "CVE-2014-3155", "CVE-2014-1747", "CVE-2014-3168", "CVE-2014-3176", "CVE-2014-1724", "CVE-2014-3166", "CVE-2014-1735", "CVE-2014-1729", "CVE-2014-3165", "CVE-2014-1720", "CVE-2014-3154", "CVE-2014-1742", "CVE-2014-1728", "CVE-2014-1703", "CVE-2014-1719", "CVE-2014-3157", "CVE-2014-1726", "CVE-2014-1705", "CVE-2014-1734", "CVE-2014-1733", "CVE-2014-1732", "CVE-2014-1718", "CVE-2014-1744", "CVE-2014-0538", "CVE-2014-1716", "CVE-2014-1722", "CVE-2014-1743", "CVE-2014-1731", "CVE-2014-1740", "CVE-2014-3174", "CVE-2014-3175", "CVE-2014-3173", "CVE-2014-3167", "CVE-2014-1746", "CVE-2014-1714", "CVE-2014-1749", "CVE-2014-1713", "CVE-2014-3169", "CVE-2014-1745", "CVE-2014-3172", "CVE-2014-1701", "CVE-2014-1704", "CVE-2014-3162", "CVE-2014-3170", "CVE-2014-1730", "CVE-2014-1721", "CVE-2014-3160", "CVE-2014-1725", "CVE-2014-1715", "CVE-2014-1727", "CVE-2014-1702", "CVE-2014-1723", "CVE-2014-1748", "CVE-2014-1717", "CVE-2014-3177", "CVE-2014-1741", "CVE-2014-1700", "CVE-2014-3156"], "description": "### Background\n\nChromium is an open-source web browser project.\n\n### Description\n\nMultiple vulnerabilities have been discovered in Chromium. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA remote attacker could conduct a number of attacks which include: cross site scripting attacks, bypassing of sandbox protection, potential execution of arbitrary code with the privileges of the process, or cause a Denial of Service condition. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll chromium users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose\n \">=www-client/chromium-37.0.2062.94\"", "edition": 1, "modified": "2014-08-30T00:00:00", "published": "2014-08-30T00:00:00", "id": "GLSA-201408-16", "href": "https://security.gentoo.org/glsa/201408-16", "type": "gentoo", "title": "Chromium: Multiple vulnerabilities", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}