ID OPENVAS:1361412562310869961 Type openvas Reporter Copyright (C) 2015 Greenbone Networks GmbH Modified 2019-03-15T00:00:00
Description
The remote host is missing an update for the
###############################################################################
# OpenVAS Vulnerability Test
#
# Fedora Update for libvpx FEDORA-2015-15936
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.869961");
script_version("$Revision: 14223 $");
script_tag(name:"last_modification", value:"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $");
script_tag(name:"creation_date", value:"2015-09-25 07:18:19 +0200 (Fri, 25 Sep 2015)");
script_cve_id("CVE-2015-1258");
script_tag(name:"cvss_base", value:"7.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_tag(name:"qod_type", value:"package");
script_name("Fedora Update for libvpx FEDORA-2015-15936");
script_tag(name:"summary", value:"The remote host is missing an update for the 'libvpx'
package(s) announced via the referenced advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"affected", value:"libvpx on Fedora 22");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_xref(name:"FEDORA", value:"2015-15936");
script_xref(name:"URL", value:"https://lists.fedoraproject.org/pipermail/package-announce/2015-September/167428.html");
script_tag(name:"solution_type", value:"VendorFix");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2015 Greenbone Networks GmbH");
script_family("Fedora Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/fedora", "ssh/login/rpms", re:"ssh/login/release=FC22");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
if(release == "FC22")
{
if ((res = isrpmvuln(pkg:"libvpx", rpm:"libvpx~1.3.0~7.fc22", rls:"FC22")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99);
exit(0);
}
{"id": "OPENVAS:1361412562310869961", "type": "openvas", "bulletinFamily": "scanner", "title": "Fedora Update for libvpx FEDORA-2015-15936", "description": "The remote host is missing an update for the ", "published": "2015-09-25T00:00:00", "modified": "2019-03-15T00:00:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310869961", "reporter": "Copyright (C) 2015 Greenbone Networks GmbH", "references": ["https://lists.fedoraproject.org/pipermail/package-announce/2015-September/167428.html", "2015-15936"], "cvelist": ["CVE-2015-1258"], "lastseen": "2019-05-29T18:37:02", "viewCount": 1, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2015-1258"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310805631", "OPENVAS:1361412562310842213", "OPENVAS:1361412562310703267", "OPENVAS:1361412562310805632", "OPENVAS:703267", "OPENVAS:1361412562310805633", "OPENVAS:1361412562310121381", "OPENVAS:1361412562310130127", "OPENVAS:1361412562310869991"]}, {"type": "nessus", "idList": ["MACOSX_GOOGLE_CHROME_43_0_2357_65.NASL", "OPENSUSE-2015-390.NASL", "FEDORA_2015-15935.NASL", "DEBIAN_DSA-3267.NASL", "FREEBSD_PKG_A9D456B4FE4C11E4AD1500262D5ED8EE.NASL", "GOOGLE_CHROME_43_0_2357_65.NASL", "UBUNTU_USN-2610-1.NASL", "FEDORA_2015-15934.NASL", "REDHAT-RHSA-2015-1023.NASL", "FEDORA_2015-15936.NASL"]}, {"type": "fedora", "idList": ["FEDORA:C19BF612F03E", "FEDORA:8A9B7608B7FE", "FEDORA:4F29E60478E0"]}, {"type": "ubuntu", "idList": ["USN-2610-1"]}, {"type": "archlinux", "idList": ["ASA-201505-14"]}, {"type": "threatpost", "idList": ["THREATPOST:45D2D399F79C59D30CB09CDC7A87747D"]}, {"type": "redhat", "idList": ["RHSA-2015:1023"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:14435", "SECURITYVULNS:DOC:32136"]}, {"type": "debian", "idList": ["DEBIAN:DSA-3267-1:32EBE"]}, {"type": "freebsd", "idList": ["A9D456B4-FE4C-11E4-AD15-00262D5ED8EE"]}, {"type": "kaspersky", "idList": ["KLA10585"]}, {"type": "gentoo", "idList": ["GLSA-201506-04"]}], "modified": "2019-05-29T18:37:02", "rev": 2}, "score": {"value": 6.7, "vector": "NONE", "modified": "2019-05-29T18:37:02", "rev": 2}, "vulnersScore": 6.7}, "pluginID": "1361412562310869961", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for libvpx FEDORA-2015-15936\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.869961\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-09-25 07:18:19 +0200 (Fri, 25 Sep 2015)\");\n script_cve_id(\"CVE-2015-1258\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for libvpx FEDORA-2015-15936\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'libvpx'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"libvpx on Fedora 22\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2015-15936\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2015-September/167428.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC22\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC22\")\n{\n\n if ((res = isrpmvuln(pkg:\"libvpx\", rpm:\"libvpx~1.3.0~7.fc22\", rls:\"FC22\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "naslFamily": "Fedora Local Security Checks"}
{"cve": [{"lastseen": "2021-02-02T06:21:21", "description": "Google Chrome before 43.0.2357.65 relies on libvpx code that was not built with an appropriate --size-limit value, which allows remote attackers to trigger a negative value for a size field, and consequently cause a denial of service or possibly have unspecified other impact, via a crafted frame size in VP9 video data.", "edition": 6, "cvss3": {}, "published": "2015-05-20T10:59:00", "title": "CVE-2015-1258", "type": "cve", "cwe": ["CWE-189"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1258"], "modified": "2017-01-03T02:59:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/a:google:chrome:42.0.2311.152"], "id": "CVE-2015-1258", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1258", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:42.0.2311.152:*:*:*:*:*:*:*"]}], "fedora": [{"lastseen": "2020-12-21T08:17:53", "bulletinFamily": "unix", "cvelist": ["CVE-2015-1258"], "description": "libvpx provides the VP8 SDK, which allows you to integrate your applications with the VP8 video codec, a high quality, royalty free, open source codec deployed on millions of computers and devices worldwide. ", "modified": "2015-09-20T15:26:23", "published": "2015-09-20T15:26:23", "id": "FEDORA:8A9B7608B7FE", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 23 Update: libvpx-1.4.0-5.fc23", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:53", "bulletinFamily": "unix", "cvelist": ["CVE-2015-1258"], "description": "libvpx provides the VP8 SDK, which allows you to integrate your applications with the VP8 video codec, a high quality, royalty free, open source codec deployed on millions of computers and devices worldwide. ", "modified": "2015-09-24T08:32:37", "published": "2015-09-24T08:32:37", "id": "FEDORA:C19BF612F03E", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 22 Update: libvpx-1.3.0-7.fc22", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:53", "bulletinFamily": "unix", "cvelist": ["CVE-2015-1258"], "description": "libvpx provides the VP8 SDK, which allows you to integrate your applications with the VP8 video codec, a high quality, royalty free, open source codec deployed on millions of computers and devices worldwide. ", "modified": "2015-10-05T22:55:46", "published": "2015-10-05T22:55:46", "id": "FEDORA:4F29E60478E0", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 21 Update: libvpx-1.3.0-7.fc21", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2021-01-12T10:13:23", "description": "libvpx-1.3.0-7.fc21 - set --size-limit=16384x16384 to fix\nCVE-2015-1258 libvpx-1.3.0-7.fc22 - set --size-limit=16384x16384 to\nfix CVE-2015-1258 libvpx-1.4.0-5.fc23 - set --size-limit=16384x16384\nto avoid CVE-2015-1258\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 17, "published": "2015-09-21T00:00:00", "title": "Fedora 23 : libvpx-1.4.0-5.fc23 (2015-15934)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1258"], "modified": "2015-09-21T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:23", "p-cpe:/a:fedoraproject:fedora:libvpx"], "id": "FEDORA_2015-15934.NASL", "href": "https://www.tenable.com/plugins/nessus/86043", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2015-15934.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(86043);\n script_version(\"2.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2015-1258\");\n script_xref(name:\"FEDORA\", value:\"2015-15934\");\n\n script_name(english:\"Fedora 23 : libvpx-1.4.0-5.fc23 (2015-15934)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"libvpx-1.3.0-7.fc21 - set --size-limit=16384x16384 to fix\nCVE-2015-1258 libvpx-1.3.0-7.fc22 - set --size-limit=16384x16384 to\nfix CVE-2015-1258 libvpx-1.4.0-5.fc23 - set --size-limit=16384x16384\nto avoid CVE-2015-1258\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1223266\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-September/166975.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?32eb20c8\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libvpx package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:libvpx\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:23\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/09/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/09/21\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^23([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 23.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC23\", reference:\"libvpx-1.4.0-5.fc23\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libvpx\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-12T10:13:23", "description": "libvpx-1.3.0-7.fc21 - set --size-limit=16384x16384 to fix\nCVE-2015-1258 libvpx-1.3.0-7.fc22 - set --size-limit=16384x16384 to\nfix CVE-2015-1258 libvpx-1.4.0-5.fc23 - set --size-limit=16384x16384\nto avoid CVE-2015-1258\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 17, "published": "2015-09-25T00:00:00", "title": "Fedora 22 : libvpx-1.3.0-7.fc22 (2015-15936)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1258"], "modified": "2015-09-25T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:22", "p-cpe:/a:fedoraproject:fedora:libvpx"], "id": "FEDORA_2015-15936.NASL", "href": "https://www.tenable.com/plugins/nessus/86131", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2015-15936.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(86131);\n script_version(\"2.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2015-1258\");\n script_xref(name:\"FEDORA\", value:\"2015-15936\");\n\n script_name(english:\"Fedora 22 : libvpx-1.3.0-7.fc22 (2015-15936)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"libvpx-1.3.0-7.fc21 - set --size-limit=16384x16384 to fix\nCVE-2015-1258 libvpx-1.3.0-7.fc22 - set --size-limit=16384x16384 to\nfix CVE-2015-1258 libvpx-1.4.0-5.fc23 - set --size-limit=16384x16384\nto avoid CVE-2015-1258\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1223266\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-September/167428.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f5a715f2\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libvpx package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:libvpx\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:22\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/09/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/09/25\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^22([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 22.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC22\", reference:\"libvpx-1.3.0-7.fc22\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libvpx\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-12T10:13:23", "description": "libvpx-1.3.0-7.fc21 - set --size-limit=16384x16384 to fix\nCVE-2015-1258 libvpx-1.3.0-7.fc22 - set --size-limit=16384x16384 to\nfix CVE-2015-1258 libvpx-1.4.0-5.fc23 - set --size-limit=16384x16384\nto avoid CVE-2015-1258\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 17, "published": "2015-10-06T00:00:00", "title": "Fedora 21 : libvpx-1.3.0-7.fc21 (2015-15935)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1258"], "modified": "2015-10-06T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:21", "p-cpe:/a:fedoraproject:fedora:libvpx"], "id": "FEDORA_2015-15935.NASL", "href": "https://www.tenable.com/plugins/nessus/86275", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2015-15935.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(86275);\n script_version(\"2.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2015-1258\");\n script_xref(name:\"FEDORA\", value:\"2015-15935\");\n\n script_name(english:\"Fedora 21 : libvpx-1.3.0-7.fc21 (2015-15935)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"libvpx-1.3.0-7.fc21 - set --size-limit=16384x16384 to fix\nCVE-2015-1258 libvpx-1.3.0-7.fc22 - set --size-limit=16384x16384 to\nfix CVE-2015-1258 libvpx-1.4.0-5.fc23 - set --size-limit=16384x16384\nto avoid CVE-2015-1258\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1223266\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-October/168803.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?1f438175\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libvpx package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:libvpx\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:21\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/10/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/10/06\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^21([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 21.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC21\", reference:\"libvpx-1.3.0-7.fc21\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libvpx\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-20T15:28:52", "description": "Several security issues were discovered in the DOM implementation in\nBlink. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit these to bypass Same\nOrigin Policy restrictions. (CVE-2015-1253, CVE-2015-1254)\n\nA use-after-free was discovered in the WebAudio implementation in\nChromium. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit this to cause a denial\nof service via renderer crash, or execute arbitrary code with the\nprivileges of the sandboxed render process. (CVE-2015-1255)\n\nA use-after-free was discovered in the SVG implementation in Blink. If\na user were tricked in to opening a specially crafted website, an\nattacker could potentially exploit this to cause a denial of service\nvia renderer crash, or execute arbitrary code with the privileges of\nthe sandboxed render process. (CVE-2015-1256)\n\nA security issue was discovered in the SVG implementation in Blink. If\na user were tricked in to opening a specially crafted website, an\nattacker could potentially exploit this to cause a denial of service\nvia renderer crash. (CVE-2015-1257)\n\nAn issue was discovered with the build of libvpx. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit this to cause a denial of service via renderer\ncrash, or execute arbitrary code with the privileges of the sandboxed\nrender process. (CVE-2015-1258)\n\nMultiple use-after-free issues were discovered in the WebRTC\nimplementation in Chromium. If a user were tricked in to opening a\nspecially crafted website, an attacker could potentially exploit these\nto cause a denial of service via renderer crash, or execute arbitrary\ncode with the privileges of the sandboxed render process.\n(CVE-2015-1260)\n\nAn uninitialized value bug was discovered in the font shaping code in\nBlink. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit this to cause a denial\nof service via renderer crash. (CVE-2015-1262)\n\nMultiple security issues were discovered in Chromium. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to read uninitialized memory, cause a denial\nof service via application crash or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2015-1265)\n\nMultiple security issues were discovered in V8. If a user were tricked\nin to opening a specially crafted website, an attacker could\npotentially exploit these to read uninitialized memory, cause a denial\nof service via renderer crash or execute arbitrary code with the\nprivileges of the sandboxed render process. (CVE-2015-3910).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 22, "published": "2015-05-22T00:00:00", "title": "Ubuntu 14.04 LTS / 14.10 / 15.04 : oxide-qt vulnerabilities (USN-2610-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1265", "CVE-2015-1257", "CVE-2015-1262", "CVE-2015-1260", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1256", "CVE-2015-3910", "CVE-2015-1258", "CVE-2015-1255"], "modified": "2015-05-22T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:oxideqt-codecs", "cpe:/o:canonical:ubuntu_linux:15.04", "p-cpe:/a:canonical:ubuntu_linux:oxideqt-codecs-extra", "cpe:/o:canonical:ubuntu_linux:14.10", "p-cpe:/a:canonical:ubuntu_linux:liboxideqtcore0", "cpe:/o:canonical:ubuntu_linux:14.04"], "id": "UBUNTU_USN-2610-1.NASL", "href": "https://www.tenable.com/plugins/nessus/83778", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2610-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(83778);\n script_version(\"2.18\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2015-1253\", \"CVE-2015-1254\", \"CVE-2015-1255\", \"CVE-2015-1256\", \"CVE-2015-1257\", \"CVE-2015-1258\", \"CVE-2015-1260\", \"CVE-2015-1262\", \"CVE-2015-1265\", \"CVE-2015-3910\");\n script_bugtraq_id(74723, 74727);\n script_xref(name:\"USN\", value:\"2610-1\");\n\n script_name(english:\"Ubuntu 14.04 LTS / 14.10 / 15.04 : oxide-qt vulnerabilities (USN-2610-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several security issues were discovered in the DOM implementation in\nBlink. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit these to bypass Same\nOrigin Policy restrictions. (CVE-2015-1253, CVE-2015-1254)\n\nA use-after-free was discovered in the WebAudio implementation in\nChromium. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit this to cause a denial\nof service via renderer crash, or execute arbitrary code with the\nprivileges of the sandboxed render process. (CVE-2015-1255)\n\nA use-after-free was discovered in the SVG implementation in Blink. If\na user were tricked in to opening a specially crafted website, an\nattacker could potentially exploit this to cause a denial of service\nvia renderer crash, or execute arbitrary code with the privileges of\nthe sandboxed render process. (CVE-2015-1256)\n\nA security issue was discovered in the SVG implementation in Blink. If\na user were tricked in to opening a specially crafted website, an\nattacker could potentially exploit this to cause a denial of service\nvia renderer crash. (CVE-2015-1257)\n\nAn issue was discovered with the build of libvpx. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit this to cause a denial of service via renderer\ncrash, or execute arbitrary code with the privileges of the sandboxed\nrender process. (CVE-2015-1258)\n\nMultiple use-after-free issues were discovered in the WebRTC\nimplementation in Chromium. If a user were tricked in to opening a\nspecially crafted website, an attacker could potentially exploit these\nto cause a denial of service via renderer crash, or execute arbitrary\ncode with the privileges of the sandboxed render process.\n(CVE-2015-1260)\n\nAn uninitialized value bug was discovered in the font shaping code in\nBlink. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit this to cause a denial\nof service via renderer crash. (CVE-2015-1262)\n\nMultiple security issues were discovered in Chromium. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to read uninitialized memory, cause a denial\nof service via application crash or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2015-1265)\n\nMultiple security issues were discovered in V8. If a user were tricked\nin to opening a specially crafted website, an attacker could\npotentially exploit these to read uninitialized memory, cause a denial\nof service via renderer crash or execute arbitrary code with the\nprivileges of the sandboxed render process. (CVE-2015-3910).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/2610-1/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Update the affected liboxideqtcore0, oxideqt-codecs and / or\noxideqt-codecs-extra packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:liboxideqtcore0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:oxideqt-codecs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:oxideqt-codecs-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:15.04\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/05/20\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/05/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/05/22\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2015-2020 Canonical, Inc. / NASL script (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(14\\.04|14\\.10|15\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 14.04 / 14.10 / 15.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"14.04\", pkgname:\"liboxideqtcore0\", pkgver:\"1.7.8-0ubuntu0.14.04.1\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"oxideqt-codecs\", pkgver:\"1.7.8-0ubuntu0.14.04.1\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"oxideqt-codecs-extra\", pkgver:\"1.7.8-0ubuntu0.14.04.1\")) flag++;\nif (ubuntu_check(osver:\"14.10\", pkgname:\"liboxideqtcore0\", pkgver:\"1.7.8-0ubuntu0.14.10.1\")) flag++;\nif (ubuntu_check(osver:\"14.10\", pkgname:\"oxideqt-codecs\", pkgver:\"1.7.8-0ubuntu0.14.10.1\")) flag++;\nif (ubuntu_check(osver:\"14.10\", pkgname:\"oxideqt-codecs-extra\", pkgver:\"1.7.8-0ubuntu0.14.10.1\")) flag++;\nif (ubuntu_check(osver:\"15.04\", pkgname:\"liboxideqtcore0\", pkgver:\"1.7.8-0ubuntu0.15.04.1\")) flag++;\nif (ubuntu_check(osver:\"15.04\", pkgname:\"oxideqt-codecs\", pkgver:\"1.7.8-0ubuntu0.15.04.1\")) flag++;\nif (ubuntu_check(osver:\"15.04\", pkgname:\"oxideqt-codecs-extra\", pkgver:\"1.7.8-0ubuntu0.15.04.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"liboxideqtcore0 / oxideqt-codecs / oxideqt-codecs-extra\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-02-01T03:46:38", "description": "The version of Google Chrome installed on the remote Mac OS X host is\nprior to 43.0.2357.65. It is, therefore, affected by multiple\nvulnerabilities :\n\n - A Use-after-free memory error exists in the\n SpeechRecognitionClient implementation that allows\n remote attackers, using a crafted document, to execute\n arbitrary code. (CVE-2015-1251)\n\n - The Write() and DoWrite() methods of the class\n PartialCircularBuffer do not properly handle wraps.\n A remote attacker, by using write operations with a\n large amount of data, can exploit this to bypass the\n sandbox protection or cause a denial of service.\n (CVE-2015-1252)\n\n - The DOM implementation in Blink does not properly\n handle SCRIPT elements during adjustment of DOM node\n locations. A remote attacker, using crafted JavaScript\n code that appends a child to a SCRIPT element, can\n exploit this flaw to bypass the same origin policy.\n (CVE-2015-1253)\n\n - The 'core/dom/Document.cpp' in Blink enables the\n inheritance of the 'designMode' attribute. A remote\n attacker, using a crafted web page, can utilize this to\n bypass the same origin policy via the availability of\n editing. (CVE-2015-1254)\n\n - A use-after-free memory error exists in the WebAudio\n implementation when handling the stop action for an\n audio track. A remote attacker can exploit this to\n cause a denial of service or possibly execute\n arbitrary code. (CVE-2015-1255)\n\n - A use-after-free memory error exists in the SVG\n implementation in Blink, related to the improper\n handling of a shadow tree for a use element. A remote\n attacker, using a crafted document, can exploit this\n to cause a denial of service or possibly execute\n arbitrary code. (CVE-2015-1256)\n\n - The SVG implementation in Blink does not properly handle\n an insufficient number of values in an feColorMatrix\n filter. A remote attacker, using a crafted document, can\n exploit this to cause a denial of service via a\n container overflow. (CVE-2015-1257)\n\n - The libvpx library code was not compiled with an\n appropriate '--size-limit' value. This allows a remote\n attacker, using a crafted frame size in VP9 video data,\n to trigger a negative value for a size field, thus\n causing a denial of service or possibly having other\n impact. (CVE-2015-1258)\n\n - Google PDFium does not properly initialize memory. A\n remote attacker can exploit this to cause a denial of\n service or possibly have other unspecified impact.\n (CVE-2015-1259)\n\n - Multiple use-after-free memory errors exist the WebRTC\n implementation. A remote attacker can exploit these, by\n using a crafted JavaScript code that executes upon\n completion of a getUserMedia request, to cause a denial\n of service or possibly have other unspecified impact.\n (CVE-2015-1260)\n\n - The file 'HarfBuzzShaper.cpp' in Blink does not properly\n initialize a certain width field. A remote attacker,\n using crafted Unicode text, can exploit this to cause a\n denial of service or have other unspecified impact.\n (CVE-2015-1262)\n\n - The Spellcheck API implementation does not use an HTTPS\n session for downloading a Hunspell dictionary. A\n man-in-the-middle attacker, using a crafted file, can\n exploit this flaw to deliver incorrect spelling\n suggestions or possibly have other unspecified impact.\n (CVE-2015-1263)\n\n - A cross-site scripting (XSS) vulnerability exists that\n is related to the Bookmarks feature. A remote attacker,\n using crafted data, can exploit this to inject arbitrary\n web script or HTML. (CVE-2015-1264)\n\n - Multiple unspecified vulnerabilities exist that allow an\n attacker to cause a denial of service or possibly have\n other impact via unknown vectors. (CVE-2015-1265)\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.", "edition": 26, "published": "2015-05-21T00:00:00", "title": "Google Chrome < 43.0.2357.65 Multiple Vulnerabilities (Mac OS X)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1265", "CVE-2015-1257", "CVE-2015-1263", "CVE-2015-1251", "CVE-2015-1262", "CVE-2015-1260", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1259", "CVE-2015-1252", "CVE-2015-1256", "CVE-2015-1258", "CVE-2015-1255", "CVE-2015-1264"], "modified": "2021-02-02T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "MACOSX_GOOGLE_CHROME_43_0_2357_65.NASL", "href": "https://www.tenable.com/plugins/nessus/83746", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(83746);\n script_version(\"1.10\");\n script_cvs_date(\"Date: 2019/11/22\");\n\n script_cve_id(\n \"CVE-2015-1251\",\n \"CVE-2015-1252\",\n \"CVE-2015-1253\",\n \"CVE-2015-1254\",\n \"CVE-2015-1255\",\n \"CVE-2015-1256\",\n \"CVE-2015-1257\",\n \"CVE-2015-1258\",\n \"CVE-2015-1259\",\n \"CVE-2015-1260\",\n \"CVE-2015-1262\",\n \"CVE-2015-1263\",\n \"CVE-2015-1264\",\n \"CVE-2015-1265\"\n );\n script_bugtraq_id(74723, 74727);\n\n script_name(english:\"Google Chrome < 43.0.2357.65 Multiple Vulnerabilities (Mac OS X)\");\n script_summary(english:\"Checks the version number of Google Chrome.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Mac OS X host contains a web browser that is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote Mac OS X host is\nprior to 43.0.2357.65. It is, therefore, affected by multiple\nvulnerabilities :\n\n - A Use-after-free memory error exists in the\n SpeechRecognitionClient implementation that allows\n remote attackers, using a crafted document, to execute\n arbitrary code. (CVE-2015-1251)\n\n - The Write() and DoWrite() methods of the class\n PartialCircularBuffer do not properly handle wraps.\n A remote attacker, by using write operations with a\n large amount of data, can exploit this to bypass the\n sandbox protection or cause a denial of service.\n (CVE-2015-1252)\n\n - The DOM implementation in Blink does not properly\n handle SCRIPT elements during adjustment of DOM node\n locations. A remote attacker, using crafted JavaScript\n code that appends a child to a SCRIPT element, can\n exploit this flaw to bypass the same origin policy.\n (CVE-2015-1253)\n\n - The 'core/dom/Document.cpp' in Blink enables the\n inheritance of the 'designMode' attribute. A remote\n attacker, using a crafted web page, can utilize this to\n bypass the same origin policy via the availability of\n editing. (CVE-2015-1254)\n\n - A use-after-free memory error exists in the WebAudio\n implementation when handling the stop action for an\n audio track. A remote attacker can exploit this to\n cause a denial of service or possibly execute\n arbitrary code. (CVE-2015-1255)\n\n - A use-after-free memory error exists in the SVG\n implementation in Blink, related to the improper\n handling of a shadow tree for a use element. A remote\n attacker, using a crafted document, can exploit this\n to cause a denial of service or possibly execute\n arbitrary code. (CVE-2015-1256)\n\n - The SVG implementation in Blink does not properly handle\n an insufficient number of values in an feColorMatrix\n filter. A remote attacker, using a crafted document, can\n exploit this to cause a denial of service via a\n container overflow. (CVE-2015-1257)\n\n - The libvpx library code was not compiled with an\n appropriate '--size-limit' value. This allows a remote\n attacker, using a crafted frame size in VP9 video data,\n to trigger a negative value for a size field, thus\n causing a denial of service or possibly having other\n impact. (CVE-2015-1258)\n\n - Google PDFium does not properly initialize memory. A\n remote attacker can exploit this to cause a denial of\n service or possibly have other unspecified impact.\n (CVE-2015-1259)\n\n - Multiple use-after-free memory errors exist the WebRTC\n implementation. A remote attacker can exploit these, by\n using a crafted JavaScript code that executes upon\n completion of a getUserMedia request, to cause a denial\n of service or possibly have other unspecified impact.\n (CVE-2015-1260)\n\n - The file 'HarfBuzzShaper.cpp' in Blink does not properly\n initialize a certain width field. A remote attacker,\n using crafted Unicode text, can exploit this to cause a\n denial of service or have other unspecified impact.\n (CVE-2015-1262)\n\n - The Spellcheck API implementation does not use an HTTPS\n session for downloading a Hunspell dictionary. A\n man-in-the-middle attacker, using a crafted file, can\n exploit this flaw to deliver incorrect spelling\n suggestions or possibly have other unspecified impact.\n (CVE-2015-1263)\n\n - A cross-site scripting (XSS) vulnerability exists that\n is related to the Bookmarks feature. A remote attacker,\n using crafted data, can exploit this to inject arbitrary\n web script or HTML. (CVE-2015-1264)\n\n - Multiple unspecified vulnerabilities exist that allow an\n attacker to cause a denial of service or possibly have\n other impact via unknown vectors. (CVE-2015-1265)\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n # http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?b9eefd81\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome 43.0.2357.65 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-1265\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/03/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/05/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/05/21\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_google_chrome_installed.nbin\");\n script_require_keys(\"MacOSX/Google Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"MacOSX/Google Chrome/Installed\");\n\ngoogle_chrome_check_version(fix:'43.0.2357.65', severity:SECURITY_HOLE, xss:TRUE);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-02-01T03:19:02", "description": "The version of Google Chrome installed on the remote Windows host is\nprior to 43.0.2357.65. It is, therefore, affected by multiple\nvulnerabilities :\n\n - A Use-after-free memory error exists in the\n SpeechRecognitionClient implementation that allows\n remote attackers, using a crafted document, to execute\n arbitrary code. (CVE-2015-1251)\n\n - The Write() and DoWrite() methods of the class\n PartialCircularBuffer do not properly handle wraps.\n A remote attacker, by using write operations with a\n large amount of data, can exploit this to bypass the\n sandbox protection or cause a denial of service.\n (CVE-2015-1252)\n\n - The DOM implementation in Blink does not properly\n handle SCRIPT elements during adjustment of DOM node\n locations. A remote attacker, using crafted JavaScript\n code that appends a child to a SCRIPT element, can\n exploit this flaw to bypass the same origin policy.\n (CVE-2015-1253)\n\n - The 'core/dom/Document.cpp' in Blink enables the\n inheritance of the 'designMode' attribute. A remote\n attacker, using a crafted web page, can utilize this to\n bypass the same origin policy via the availability of\n editing. (CVE-2015-1254)\n\n - A use-after-free memory error exists in the WebAudio\n implementation when handling the stop action for an\n audio track. A remote attacker can exploit this to\n cause a denial of service or possibly execute\n arbitrary code. (CVE-2015-1255)\n\n - A use-after-free memory error exists in the SVG\n implementation in Blink, related to the improper\n handling of a shadow tree for a use element. A remote\n attacker, using a crafted document, can exploit this\n to cause a denial of service or possibly execute\n arbitrary code. (CVE-2015-1256)\n\n - The SVG implementation in Blink does not properly handle\n an insufficient number of values in an feColorMatrix\n filter. A remote attacker, using a crafted document, can\n exploit this to cause a denial of service via a\n container overflow. (CVE-2015-1257)\n\n - The libvpx library code was not compiled with an\n appropriate '--size-limit' value. This allows a remote\n attacker, using a crafted frame size in VP9 video data,\n to trigger a negative value for a size field, thus\n causing a denial of service or possibly having other\n impact. (CVE-2015-1258)\n\n - Google PDFium does not properly initialize memory. A\n remote attacker can exploit this to cause a denial of\n service or possibly have other unspecified impact.\n (CVE-2015-1259)\n\n - Multiple use-after-free memory errors exist the WebRTC\n implementation. A remote attacker can exploit these, by\n using a crafted JavaScript code that executes upon\n completion of a getUserMedia request, to cause a denial\n of service or possibly have other unspecified impact.\n (CVE-2015-1260)\n\n - The file 'HarfBuzzShaper.cpp' in Blink does not properly\n initialize a certain width field. A remote attacker,\n using crafted Unicode text, can exploit this to cause a\n denial of service or have other unspecified impact.\n (CVE-2015-1262)\n\n - The Spellcheck API implementation does not use an HTTPS\n session for downloading a Hunspell dictionary. A\n man-in-the-middle attacker, using a crafted file, can\n exploit this flaw to deliver incorrect spelling\n suggestions or possibly have other unspecified impact.\n (CVE-2015-1263)\n\n - A cross-site scripting (XSS) vulnerability exists that\n is related to the Bookmarks feature. A remote attacker,\n using crafted data, can exploit this to inject arbitrary\n web script or HTML. (CVE-2015-1264)\n\n - Multiple unspecified vulnerabilities exist that allow an\n attacker to cause a denial of service or possibly have\n other impact via unknown vectors. (CVE-2015-1265)\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.", "edition": 26, "published": "2015-05-21T00:00:00", "title": "Google Chrome < 43.0.2357.65 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1265", "CVE-2015-1257", "CVE-2015-1263", "CVE-2015-1251", "CVE-2015-1262", "CVE-2015-1260", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1259", "CVE-2015-1252", "CVE-2015-1256", "CVE-2015-1258", "CVE-2015-1255", "CVE-2015-1264"], "modified": "2021-02-02T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "GOOGLE_CHROME_43_0_2357_65.NASL", "href": "https://www.tenable.com/plugins/nessus/83745", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(83745);\n script_version(\"1.10\");\n script_cvs_date(\"Date: 2019/11/22\");\n\n script_cve_id(\n \"CVE-2015-1251\",\n \"CVE-2015-1252\",\n \"CVE-2015-1253\",\n \"CVE-2015-1254\",\n \"CVE-2015-1255\",\n \"CVE-2015-1256\",\n \"CVE-2015-1257\",\n \"CVE-2015-1258\",\n \"CVE-2015-1259\",\n \"CVE-2015-1260\",\n \"CVE-2015-1262\",\n \"CVE-2015-1263\",\n \"CVE-2015-1264\",\n \"CVE-2015-1265\"\n );\n script_bugtraq_id(74723, 74727);\n\n script_name(english:\"Google Chrome < 43.0.2357.65 Multiple Vulnerabilities\");\n script_summary(english:\"Checks the version number of Google Chrome.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host contains a web browser that is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote Windows host is\nprior to 43.0.2357.65. It is, therefore, affected by multiple\nvulnerabilities :\n\n - A Use-after-free memory error exists in the\n SpeechRecognitionClient implementation that allows\n remote attackers, using a crafted document, to execute\n arbitrary code. (CVE-2015-1251)\n\n - The Write() and DoWrite() methods of the class\n PartialCircularBuffer do not properly handle wraps.\n A remote attacker, by using write operations with a\n large amount of data, can exploit this to bypass the\n sandbox protection or cause a denial of service.\n (CVE-2015-1252)\n\n - The DOM implementation in Blink does not properly\n handle SCRIPT elements during adjustment of DOM node\n locations. A remote attacker, using crafted JavaScript\n code that appends a child to a SCRIPT element, can\n exploit this flaw to bypass the same origin policy.\n (CVE-2015-1253)\n\n - The 'core/dom/Document.cpp' in Blink enables the\n inheritance of the 'designMode' attribute. A remote\n attacker, using a crafted web page, can utilize this to\n bypass the same origin policy via the availability of\n editing. (CVE-2015-1254)\n\n - A use-after-free memory error exists in the WebAudio\n implementation when handling the stop action for an\n audio track. A remote attacker can exploit this to\n cause a denial of service or possibly execute\n arbitrary code. (CVE-2015-1255)\n\n - A use-after-free memory error exists in the SVG\n implementation in Blink, related to the improper\n handling of a shadow tree for a use element. A remote\n attacker, using a crafted document, can exploit this\n to cause a denial of service or possibly execute\n arbitrary code. (CVE-2015-1256)\n\n - The SVG implementation in Blink does not properly handle\n an insufficient number of values in an feColorMatrix\n filter. A remote attacker, using a crafted document, can\n exploit this to cause a denial of service via a\n container overflow. (CVE-2015-1257)\n\n - The libvpx library code was not compiled with an\n appropriate '--size-limit' value. This allows a remote\n attacker, using a crafted frame size in VP9 video data,\n to trigger a negative value for a size field, thus\n causing a denial of service or possibly having other\n impact. (CVE-2015-1258)\n\n - Google PDFium does not properly initialize memory. A\n remote attacker can exploit this to cause a denial of\n service or possibly have other unspecified impact.\n (CVE-2015-1259)\n\n - Multiple use-after-free memory errors exist the WebRTC\n implementation. A remote attacker can exploit these, by\n using a crafted JavaScript code that executes upon\n completion of a getUserMedia request, to cause a denial\n of service or possibly have other unspecified impact.\n (CVE-2015-1260)\n\n - The file 'HarfBuzzShaper.cpp' in Blink does not properly\n initialize a certain width field. A remote attacker,\n using crafted Unicode text, can exploit this to cause a\n denial of service or have other unspecified impact.\n (CVE-2015-1262)\n\n - The Spellcheck API implementation does not use an HTTPS\n session for downloading a Hunspell dictionary. A\n man-in-the-middle attacker, using a crafted file, can\n exploit this flaw to deliver incorrect spelling\n suggestions or possibly have other unspecified impact.\n (CVE-2015-1263)\n\n - A cross-site scripting (XSS) vulnerability exists that\n is related to the Bookmarks feature. A remote attacker,\n using crafted data, can exploit this to inject arbitrary\n web script or HTML. (CVE-2015-1264)\n\n - Multiple unspecified vulnerabilities exist that allow an\n attacker to cause a denial of service or possibly have\n other impact via unknown vectors. (CVE-2015-1265)\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n # http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?b9eefd81\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome 43.0.2357.65 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-1265\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/03/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/05/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/05/21\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"google_chrome_installed.nasl\");\n script_require_keys(\"SMB/Google_Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"SMB/Google_Chrome/Installed\");\ninstalls = get_kb_list(\"SMB/Google_Chrome/*\");\n\ngoogle_chrome_check_version(installs:installs, fix:'43.0.2357.65', severity:SECURITY_HOLE, xss:TRUE);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T10:48:59", "description": "Google Chrome Releases reports :\n\n37 security fixes in this release, including :\n\n- [474029] High CVE-2015-1252: Sandbox escape in Chrome. Credit to\nanonymous.\n\n- [464552] High CVE-2015-1253: Cross-origin bypass in DOM. Credit to\nanonymous.\n\n- [444927] High CVE-2015-1254: Cross-origin bypass in Editing. Credit\nto armin@rawsec.net.\n\n- [473253] High CVE-2015-1255: Use-after-free in WebAudio. Credit to\nKhalil Zhani.\n\n- [478549] High CVE-2015-1256: Use-after-free in SVG. Credit to Atte\nKettunen of OUSPG.\n\n- [481015] High CVE-2015-1251: Use-after-free in Speech. Credit to\nSkyLined working with HP's Zero Day Initiative.\n\n- [468519] Medium CVE-2015-1257: Container-overflow in SVG. Credit to\nmiaubiz.\n\n- [450939] Medium CVE-2015-1258: Negative-size parameter in libvpx.\nCredit to cloudfuzzer\n\n- [468167] Medium CVE-2015-1259: Uninitialized value in PDFium. Credit\nto Atte Kettunen of OUSPG\n\n- [474370] Medium CVE-2015-1260: Use-after-free in WebRTC. Credit to\nKhalil Zhani.\n\n- [466351] Medium CVE-2015-1261: URL bar spoofing. Credit to Juho\nNurminen.\n\n- [476647] Medium CVE-2015-1262: Uninitialized value in Blink. Credit\nto miaubiz.\n\n- [479162] Low CVE-2015-1263: Insecure download of spellcheck\ndictionary. Credit to Mike Ruddy.\n\n- [481015] Low CVE-2015-1264: Cross-site scripting in bookmarks.\nCredit to K0r3Ph1L.\n\n- [489518] CVE-2015-1265: Various fixes from internal audits, fuzzing\nand other initiatives.\n\n- Multiple vulnerabilities in V8 fixed at the tip of the 4.3 branch\n(currently 4.3.61.21).", "edition": 22, "published": "2015-05-20T00:00:00", "title": "FreeBSD : chromium -- multiple vulnerabilities (a9d456b4-fe4c-11e4-ad15-00262d5ed8ee)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1265", "CVE-2015-1257", "CVE-2015-1263", "CVE-2015-1251", "CVE-2015-1262", "CVE-2015-1260", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1259", "CVE-2015-1252", "CVE-2015-1256", "CVE-2015-1261", "CVE-2015-1258", "CVE-2015-1255", "CVE-2015-1264"], "modified": "2015-05-20T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:chromium-npapi", "cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:chromium-pulse", "p-cpe:/a:freebsd:freebsd:chromium"], "id": "FREEBSD_PKG_A9D456B4FE4C11E4AD1500262D5ED8EE.NASL", "href": "https://www.tenable.com/plugins/nessus/83556", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(83556);\n script_version(\"2.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2015-1251\", \"CVE-2015-1252\", \"CVE-2015-1253\", \"CVE-2015-1254\", \"CVE-2015-1255\", \"CVE-2015-1256\", \"CVE-2015-1257\", \"CVE-2015-1258\", \"CVE-2015-1259\", \"CVE-2015-1260\", \"CVE-2015-1261\", \"CVE-2015-1262\", \"CVE-2015-1263\", \"CVE-2015-1264\", \"CVE-2015-1265\");\n\n script_name(english:\"FreeBSD : chromium -- multiple vulnerabilities (a9d456b4-fe4c-11e4-ad15-00262d5ed8ee)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Google Chrome Releases reports :\n\n37 security fixes in this release, including :\n\n- [474029] High CVE-2015-1252: Sandbox escape in Chrome. Credit to\nanonymous.\n\n- [464552] High CVE-2015-1253: Cross-origin bypass in DOM. Credit to\nanonymous.\n\n- [444927] High CVE-2015-1254: Cross-origin bypass in Editing. Credit\nto armin@rawsec.net.\n\n- [473253] High CVE-2015-1255: Use-after-free in WebAudio. Credit to\nKhalil Zhani.\n\n- [478549] High CVE-2015-1256: Use-after-free in SVG. Credit to Atte\nKettunen of OUSPG.\n\n- [481015] High CVE-2015-1251: Use-after-free in Speech. Credit to\nSkyLined working with HP's Zero Day Initiative.\n\n- [468519] Medium CVE-2015-1257: Container-overflow in SVG. Credit to\nmiaubiz.\n\n- [450939] Medium CVE-2015-1258: Negative-size parameter in libvpx.\nCredit to cloudfuzzer\n\n- [468167] Medium CVE-2015-1259: Uninitialized value in PDFium. Credit\nto Atte Kettunen of OUSPG\n\n- [474370] Medium CVE-2015-1260: Use-after-free in WebRTC. Credit to\nKhalil Zhani.\n\n- [466351] Medium CVE-2015-1261: URL bar spoofing. Credit to Juho\nNurminen.\n\n- [476647] Medium CVE-2015-1262: Uninitialized value in Blink. Credit\nto miaubiz.\n\n- [479162] Low CVE-2015-1263: Insecure download of spellcheck\ndictionary. Credit to Mike Ruddy.\n\n- [481015] Low CVE-2015-1264: Cross-site scripting in bookmarks.\nCredit to K0r3Ph1L.\n\n- [489518] CVE-2015-1265: Various fixes from internal audits, fuzzing\nand other initiatives.\n\n- Multiple vulnerabilities in V8 fixed at the tip of the 4.3 branch\n(currently 4.3.61.21).\"\n );\n # http://googlechromereleases.blogspot.nl/2015/05/stable-channel-update_19.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?73e36afd\"\n );\n # https://vuxml.freebsd.org/freebsd/a9d456b4-fe4c-11e4-ad15-00262d5ed8ee.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7182e7bf\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium-npapi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium-pulse\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/05/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/05/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/05/20\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"chromium<43.0.2357.65\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"chromium-npapi<43.0.2357.65\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"chromium-pulse<43.0.2357.65\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-12T09:49:07", "description": "Several vulnerabilities were discovered in the chromium web browser.\n\n - CVE-2015-1251\n SkyLined discovered a use-after-free issue in speech\n recognition.\n\n - CVE-2015-1252\n An out-of-bounds write issue was discovered that could\n be used to escape from the sandbox.\n\n - CVE-2015-1253\n A cross-origin bypass issue was discovered in the DOM\n parser.\n\n - CVE-2015-1254\n A cross-origin bypass issue was discovered in the DOM\n editing feature.\n\n - CVE-2015-1255\n Khalil Zhani discovered a use-after-free issue in\n WebAudio.\n\n - CVE-2015-1256\n Atte Kettunen discovered a use-after-free issue in the\n SVG implementation.\n\n - CVE-2015-1257\n miaubiz discovered an overflow issue in the SVG\n implementation.\n\n - CVE-2015-1258\n cloudfuzzer discovered an invalid size parameter used in\n the libvpx library.\n\n - CVE-2015-1259\n Atte Kettunen discovered an uninitialized memory issue\n in the pdfium library.\n\n - CVE-2015-1260\n Khalil Zhani discovered multiple use-after-free issues\n in chromium's interface to the WebRTC library.\n\n - CVE-2015-1261\n Juho Nurminen discovered a URL bar spoofing issue.\n\n - CVE-2015-1262\n miaubiz discovered the use of an uninitialized class\n member in font handling.\n\n - CVE-2015-1263\n Mike Ruddy discovered that downloading the spellcheck\n dictionary was not done over HTTPS.\n\n - CVE-2015-1264\n K0r3Ph1L discovered a cross-site scripting issue that\n could be triggered by bookmarking a site.\n\n - CVE-2015-1265\n The chrome 43 development team found and fixed various\n issues during internal auditing. Also multiple issues\n were fixed in the libv8 library, version 4.3.61.21.", "edition": 24, "published": "2015-05-26T00:00:00", "title": "Debian DSA-3267-1 : chromium-browser - security update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1265", "CVE-2015-1257", "CVE-2015-1263", "CVE-2015-1251", "CVE-2015-1262", "CVE-2015-1260", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1259", "CVE-2015-1252", "CVE-2015-1256", "CVE-2015-1261", "CVE-2015-1258", "CVE-2015-1255", "CVE-2015-1264"], "modified": "2015-05-26T00:00:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "p-cpe:/a:debian:debian_linux:chromium-browser"], "id": "DEBIAN_DSA-3267.NASL", "href": "https://www.tenable.com/plugins/nessus/83784", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-3267. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(83784);\n script_version(\"2.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2015-1251\", \"CVE-2015-1252\", \"CVE-2015-1253\", \"CVE-2015-1254\", \"CVE-2015-1255\", \"CVE-2015-1256\", \"CVE-2015-1257\", \"CVE-2015-1258\", \"CVE-2015-1259\", \"CVE-2015-1260\", \"CVE-2015-1261\", \"CVE-2015-1262\", \"CVE-2015-1263\", \"CVE-2015-1264\", \"CVE-2015-1265\");\n script_bugtraq_id(74723, 74727);\n script_xref(name:\"DSA\", value:\"3267\");\n\n script_name(english:\"Debian DSA-3267-1 : chromium-browser - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities were discovered in the chromium web browser.\n\n - CVE-2015-1251\n SkyLined discovered a use-after-free issue in speech\n recognition.\n\n - CVE-2015-1252\n An out-of-bounds write issue was discovered that could\n be used to escape from the sandbox.\n\n - CVE-2015-1253\n A cross-origin bypass issue was discovered in the DOM\n parser.\n\n - CVE-2015-1254\n A cross-origin bypass issue was discovered in the DOM\n editing feature.\n\n - CVE-2015-1255\n Khalil Zhani discovered a use-after-free issue in\n WebAudio.\n\n - CVE-2015-1256\n Atte Kettunen discovered a use-after-free issue in the\n SVG implementation.\n\n - CVE-2015-1257\n miaubiz discovered an overflow issue in the SVG\n implementation.\n\n - CVE-2015-1258\n cloudfuzzer discovered an invalid size parameter used in\n the libvpx library.\n\n - CVE-2015-1259\n Atte Kettunen discovered an uninitialized memory issue\n in the pdfium library.\n\n - CVE-2015-1260\n Khalil Zhani discovered multiple use-after-free issues\n in chromium's interface to the WebRTC library.\n\n - CVE-2015-1261\n Juho Nurminen discovered a URL bar spoofing issue.\n\n - CVE-2015-1262\n miaubiz discovered the use of an uninitialized class\n member in font handling.\n\n - CVE-2015-1263\n Mike Ruddy discovered that downloading the spellcheck\n dictionary was not done over HTTPS.\n\n - CVE-2015-1264\n K0r3Ph1L discovered a cross-site scripting issue that\n could be triggered by bookmarking a site.\n\n - CVE-2015-1265\n The chrome 43 development team found and fixed various\n issues during internal auditing. Also multiple issues\n were fixed in the libv8 library, version 4.3.61.21.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1251\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1252\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1253\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1254\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1255\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1256\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1257\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1258\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1259\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1260\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1261\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1262\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1263\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1264\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1265\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/chromium-browser\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2015/dsa-3267\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the chromium-browser packages.\n\nFor the stable distribution (jessie), these problems have been fixed\nin version 43.0.2357.65-1~deb8u1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:chromium-browser\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/05/20\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/05/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/05/26\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"8.0\", prefix:\"chromedriver\", reference:\"43.0.2357.65-1~deb8u1\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"chromium\", reference:\"43.0.2357.65-1~deb8u1\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"chromium-dbg\", reference:\"43.0.2357.65-1~deb8u1\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"chromium-inspector\", reference:\"43.0.2357.65-1~deb8u1\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"chromium-l10n\", reference:\"43.0.2357.65-1~deb8u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-20T12:28:34", "description": "Chromium was updated to 43.0.2357.65 to fix security issues and bugs.\n\nThe following vulnerabilities were fixed :\n\n - CVE-2015-1251: Use-after-free in Speech (boo#931659)\n\n - CVE-2015-1252: Sandbox escape in Chrome (boo#931671)\n\n - CVE-2015-1253: Cross-origin bypass in DOM (boo#931670)\n\n - CVE-2015-1254: Cross-origin bypass in Editing\n (boo#931669)\n\n - CVE-2015-1255: Use-after-free in WebAudio (boo#931674)\n\n - CVE-2015-1256: Use-after-free in SVG (boo#931664)\n\n - CVE-2015-1257: Container-overflow in SVG (boo#931665)\n\n - CVE-2015-1258: Negative-size parameter in Libvpx\n (boo#931666)\n\n - CVE-2015-1259: Uninitialized value in PDFium\n (boo#931667)\n\n - CVE-2015-1260: Use-after-free in WebRTC (boo#931668)\n\n - CVE-2015-1261: URL bar spoofing (boo#931673)\n\n - CVE-2015-1262: Uninitialized value in Blink (boo#931672)\n\n - CVE-2015-1263: Insecure download of spellcheck\n dictionary (boo#931663)\n\n - CVE-2015-1264: Cross-site scripting in bookmarks\n (boo#931661)\n\n - CVE-2015-1265: Various fixes from internal audits,\n fuzzing and other initiatives (boo#931660)\n\n - Multiple vulnerabilities in V8 fixed at the tip of the\n 4.3 branch (currently 4.3.61.21)", "edition": 17, "published": "2015-06-01T00:00:00", "title": "openSUSE Security Update : Chromium (openSUSE-2015-390)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1265", "CVE-2015-1257", "CVE-2015-1263", "CVE-2015-1251", "CVE-2015-1262", "CVE-2015-1260", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1259", "CVE-2015-1252", "CVE-2015-1256", "CVE-2015-1261", "CVE-2015-1258", "CVE-2015-1255", "CVE-2015-1264"], "modified": "2015-06-01T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:chromedriver-debuginfo", "p-cpe:/a:novell:opensuse:chromium-desktop-gnome", "p-cpe:/a:novell:opensuse:chromium", "p-cpe:/a:novell:opensuse:chromium-debugsource", "p-cpe:/a:novell:opensuse:chromedriver", "p-cpe:/a:novell:opensuse:chromium-ffmpegsumo", "cpe:/o:novell:opensuse:13.2", "p-cpe:/a:novell:opensuse:chromium-debuginfo", "cpe:/o:novell:opensuse:13.1", "p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo", "p-cpe:/a:novell:opensuse:chromium-desktop-kde"], "id": "OPENSUSE-2015-390.NASL", "href": "https://www.tenable.com/plugins/nessus/83915", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2015-390.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(83915);\n script_version(\"2.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2015-1251\", \"CVE-2015-1252\", \"CVE-2015-1253\", \"CVE-2015-1254\", \"CVE-2015-1255\", \"CVE-2015-1256\", \"CVE-2015-1257\", \"CVE-2015-1258\", \"CVE-2015-1259\", \"CVE-2015-1260\", \"CVE-2015-1261\", \"CVE-2015-1262\", \"CVE-2015-1263\", \"CVE-2015-1264\", \"CVE-2015-1265\");\n\n script_name(english:\"openSUSE Security Update : Chromium (openSUSE-2015-390)\");\n script_summary(english:\"Check for the openSUSE-2015-390 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Chromium was updated to 43.0.2357.65 to fix security issues and bugs.\n\nThe following vulnerabilities were fixed :\n\n - CVE-2015-1251: Use-after-free in Speech (boo#931659)\n\n - CVE-2015-1252: Sandbox escape in Chrome (boo#931671)\n\n - CVE-2015-1253: Cross-origin bypass in DOM (boo#931670)\n\n - CVE-2015-1254: Cross-origin bypass in Editing\n (boo#931669)\n\n - CVE-2015-1255: Use-after-free in WebAudio (boo#931674)\n\n - CVE-2015-1256: Use-after-free in SVG (boo#931664)\n\n - CVE-2015-1257: Container-overflow in SVG (boo#931665)\n\n - CVE-2015-1258: Negative-size parameter in Libvpx\n (boo#931666)\n\n - CVE-2015-1259: Uninitialized value in PDFium\n (boo#931667)\n\n - CVE-2015-1260: Use-after-free in WebRTC (boo#931668)\n\n - CVE-2015-1261: URL bar spoofing (boo#931673)\n\n - CVE-2015-1262: Uninitialized value in Blink (boo#931672)\n\n - CVE-2015-1263: Insecure download of spellcheck\n dictionary (boo#931663)\n\n - CVE-2015-1264: Cross-site scripting in bookmarks\n (boo#931661)\n\n - CVE-2015-1265: Various fixes from internal audits,\n fuzzing and other initiatives (boo#931660)\n\n - Multiple vulnerabilities in V8 fixed at the tip of the\n 4.3 branch (currently 4.3.61.21)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931659\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931660\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931661\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931663\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931664\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931665\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931667\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931668\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931669\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931670\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931671\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931672\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931673\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=931674\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected Chromium packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-desktop-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-desktop-kde\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-ffmpegsumo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/05/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/06/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE13\\.1|SUSE13\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"13.1 / 13.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromedriver-43.0.2357.65-84.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromedriver-debuginfo-43.0.2357.65-84.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-43.0.2357.65-84.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-debuginfo-43.0.2357.65-84.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-debugsource-43.0.2357.65-84.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-desktop-gnome-43.0.2357.65-84.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-desktop-kde-43.0.2357.65-84.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-ffmpegsumo-43.0.2357.65-84.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-ffmpegsumo-debuginfo-43.0.2357.65-84.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromedriver-43.0.2357.65-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromedriver-debuginfo-43.0.2357.65-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-43.0.2357.65-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-debuginfo-43.0.2357.65-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-debugsource-43.0.2357.65-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-desktop-gnome-43.0.2357.65-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-desktop-kde-43.0.2357.65-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-ffmpegsumo-43.0.2357.65-29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-ffmpegsumo-debuginfo-43.0.2357.65-29.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromedriver / chromedriver-debuginfo / chromium / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-02-06T13:44:48", "description": "Updated chromium-browser packages that fix multiple security issues\nare now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nChromium is an open source web browser, powered by WebKit (Blink).\n\nSeveral flaws were found in the processing of malformed web content. A\nweb page containing malicious content could cause Chromium to crash\nor, potentially, execute arbitrary code with the privileges of the\nuser running Chromium. (CVE-2015-1251, CVE-2015-1252, CVE-2015-1253,\nCVE-2015-1254, CVE-2015-1255, CVE-2015-1256, CVE-2015-1257,\nCVE-2015-1258, CVE-2015-1259, CVE-2015-1260, CVE-2015-1261,\nCVE-2015-1262, CVE-2015-1263, CVE-2015-1264, CVE-2015-1265)\n\nAll Chromium users should upgrade to these updated packages, which\ncontain Chromium version 43.0.2357.65, which corrects these issues.\nAfter installing the update, Chromium must be restarted for the\nchanges to take effect.", "edition": 22, "published": "2015-05-26T00:00:00", "title": "RHEL 6 : chromium-browser (RHSA-2015:1023)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1265", "CVE-2015-1257", "CVE-2015-1263", "CVE-2015-1251", "CVE-2015-1262", "CVE-2015-1260", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1259", "CVE-2015-1252", "CVE-2015-1256", "CVE-2015-1261", "CVE-2015-1258", "CVE-2015-1255", "CVE-2015-1264"], "modified": "2015-05-26T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:chromium-browser-debuginfo", "cpe:/o:redhat:enterprise_linux:6.6", "p-cpe:/a:redhat:enterprise_linux:chromium-browser", "cpe:/o:redhat:enterprise_linux:6"], "id": "REDHAT-RHSA-2015-1023.NASL", "href": "https://www.tenable.com/plugins/nessus/83808", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2015:1023. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(83808);\n script_version(\"2.22\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/02/05\");\n\n script_cve_id(\"CVE-2015-1251\", \"CVE-2015-1252\", \"CVE-2015-1253\", \"CVE-2015-1254\", \"CVE-2015-1255\", \"CVE-2015-1256\", \"CVE-2015-1257\", \"CVE-2015-1258\", \"CVE-2015-1259\", \"CVE-2015-1260\", \"CVE-2015-1261\", \"CVE-2015-1262\", \"CVE-2015-1263\", \"CVE-2015-1264\", \"CVE-2015-1265\");\n script_bugtraq_id(74723, 74727);\n script_xref(name:\"RHSA\", value:\"2015:1023\");\n\n script_name(english:\"RHEL 6 : chromium-browser (RHSA-2015:1023)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Updated chromium-browser packages that fix multiple security issues\nare now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nChromium is an open source web browser, powered by WebKit (Blink).\n\nSeveral flaws were found in the processing of malformed web content. A\nweb page containing malicious content could cause Chromium to crash\nor, potentially, execute arbitrary code with the privileges of the\nuser running Chromium. (CVE-2015-1251, CVE-2015-1252, CVE-2015-1253,\nCVE-2015-1254, CVE-2015-1255, CVE-2015-1256, CVE-2015-1257,\nCVE-2015-1258, CVE-2015-1259, CVE-2015-1260, CVE-2015-1261,\nCVE-2015-1262, CVE-2015-1263, CVE-2015-1264, CVE-2015-1265)\n\nAll Chromium users should upgrade to these updated packages, which\ncontain Chromium version 43.0.2357.65, which corrects these issues.\nAfter installing the update, Chromium must be restarted for the\nchanges to take effect.\"\n );\n # https://googlechromereleases.blogspot.com/2015/05/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://chromereleases.googleblog.com/2015/05/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2015:1023\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1260\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1261\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1262\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1263\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1264\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1265\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1251\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1253\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1252\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1255\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1254\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1257\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1256\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1259\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1258\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"Update the affected chromium-browser and / or\nchromium-browser-debuginfo packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:chromium-browser\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:chromium-browser-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/05/20\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/05/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/05/26\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2015:1023\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"chromium-browser-43.0.2357.65-1.el6_6\", allowmaj:TRUE)) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"chromium-browser-43.0.2357.65-1.el6_6\", allowmaj:TRUE)) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"chromium-browser-debuginfo-43.0.2357.65-1.el6_6\", allowmaj:TRUE)) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"chromium-browser-debuginfo-43.0.2357.65-1.el6_6\", allowmaj:TRUE)) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromium-browser / chromium-browser-debuginfo\");\n }\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "openvas": [{"lastseen": "2019-05-29T18:36:09", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1258"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310869991", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310869991", "type": "openvas", "title": "Fedora Update for libvpx FEDORA-2015-15935", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for libvpx FEDORA-2015-15935\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.869991\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 12:42:09 +0200 (Tue, 06 Oct 2015)\");\n script_cve_id(\"CVE-2015-1258\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for libvpx FEDORA-2015-15935\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'libvpx'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"libvpx on Fedora 21\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2015-15935\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2015-October/168803.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC21\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC21\")\n{\n\n if ((res = isrpmvuln(pkg:\"libvpx\", rpm:\"libvpx~1.3.0~7.fc21\", rls:\"FC21\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:36:36", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1258"], "description": "Mageia Linux Local Security Checks mgasa-2015-0249", "modified": "2018-09-28T00:00:00", "published": "2015-10-15T00:00:00", "id": "OPENVAS:1361412562310130127", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310130127", "type": "openvas", "title": "Mageia Linux Local Check: mgasa-2015-0249", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: mgasa-2015-0249.nasl 11692 2018-09-28 16:55:19Z cfischer $\n#\n# Mageia Linux security check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://www.solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.130127\");\n script_version(\"$Revision: 11692 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-15 10:43:02 +0300 (Thu, 15 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 18:55:19 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Mageia Linux Local Check: mgasa-2015-0249\");\n script_tag(name:\"insight\", value:\"libvpx before 1.4.0 allows remote attackers to trigger a negative value for a size field, and consequently cause a denial of service or possibly have unspecified other impact, via a crafted frame size in VP9 video data (CVE-2015-1258)\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://advisories.mageia.org/MGASA-2015-0249.html\");\n script_cve_id(\"CVE-2015-1258\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mageia_linux\", \"ssh/login/release\", re:\"ssh/login/release=MAGEIA5\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"Mageia Linux Local Security Checks mgasa-2015-0249\");\n script_copyright(\"Eero Volotinen\");\n script_family(\"Mageia Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"MAGEIA5\")\n{\nif ((res = isrpmvuln(pkg:\"libvpx\", rpm:\"libvpx~1.3.0~3.1.mga5\", rls:\"MAGEIA5\")) != NULL) {\n security_message(data:res);\n exit(0);\n}\nif (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:35:58", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1265", "CVE-2015-1257", "CVE-2015-1262", "CVE-2015-1260", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1256", "CVE-2015-3910", "CVE-2015-1258", "CVE-2015-1255"], "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2015-06-09T00:00:00", "id": "OPENVAS:1361412562310842213", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310842213", "type": "openvas", "title": "Ubuntu Update for oxide-qt USN-2610-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for oxide-qt USN-2610-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.842213\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-06-09 11:06:47 +0200 (Tue, 09 Jun 2015)\");\n script_cve_id(\"CVE-2015-1253\", \"CVE-2015-1254\", \"CVE-2015-1255\", \"CVE-2015-1256\",\n \"CVE-2015-1257\", \"CVE-2015-1258\", \"CVE-2015-1260\", \"CVE-2015-1262\",\n \"CVE-2015-1265\", \"CVE-2015-3910\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for oxide-qt USN-2610-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'oxide-qt'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Several security issues were discovered\nin the DOM implementation in Blink. If a user were tricked in to opening a\nspecially crafted website, an attacker could potentially exploit these to\nbypass Same Origin Policy restrictions. (CVE-2015-1253, CVE-2015-1254)\n\nA use-after-free was discovered in the WebAudio implementation in\nChromium. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit this to cause a denial of\nservice via renderer crash, or execute arbitrary code with the privileges\nof the sandboxed render process. (CVE-2015-1255)\n\nA use-after-free was discovered in the SVG implementation in Blink. If a\nuser were tricked in to opening a specially crafted website, an attacker\ncould potentially exploit this to cause a denial of service via renderer\ncrash, or execute arbitrary code with the privileges of the sandboxed\nrender process. (CVE-2015-1256)\n\nA security issue was discovered in the SVG implementation in Blink. If a\nuser were tricked in to opening a specially crafted website, an attacker\ncould potentially exploit this to cause a denial of service via renderer\ncrash. (CVE-2015-1257)\n\nAn issue was discovered with the build of libvpx. If a user were tricked\nin to opening a specially crafted website, an attacker could potentially\nexploit this to cause a denial of service via renderer crash, or execute\narbitrary code with the privileges of the sandboxed render process.\n(CVE-2015-1258)\n\nMultiple use-after-free issues were discovered in the WebRTC\nimplementation in Chromium. If a user were tricked in to opening a\nspecially crafted website, an attacker could potentially exploit these to\ncause a denial of service via renderer crash, or execute arbitrary code\nwith the privileges of the sandboxed render process. (CVE-2015-1260)\n\nAn uninitialized value bug was discovered in the font shaping code in\nBlink. If a user were tricked in to opening a specially crafted website,\nan attacker could potentially exploit this to cause a denial of service\nvia renderer crash. (CVE-2015-1262)\n\nMultiple security issues were discovered in Chromium. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to read uninitialized memory, cause a denial\nof service via application crash or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2015-1265)\n\nMultiple security issues were discovered in V8. If a user were tricked\nin to opening a specially crafted website, an attacker could potentially\nexploit these to read uninitialized memory, cause a denial of service via\nrenderer crash or execute arbitrary code with the privileges of the\nsandboxed render process. (CVE-2015-3910)\");\n script_tag(name:\"affected\", value:\"oxide-qt on Ubuntu 14.10,\n Ubuntu 14.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_xref(name:\"USN\", value:\"2610-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2610-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(14\\.10|14\\.04 LTS)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:amd64\", ver:\"1.7.8-0ubuntu0.14.10.1\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:i386\", ver:\"1.7.8-0ubuntu0.14.10.1\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n\n if ((res = isdpkgvuln(pkg:\"oxideqt-codecs:amd64\", ver:\"1.7.8-0ubuntu0.14.10.1\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"oxideqt-codecs:i386\", ver:\"1.7.8-0ubuntu0.14.10.1\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n\n if ((res = isdpkgvuln(pkg:\"oxideqt-codecs-extra:amd64\", ver:\"1.7.8-0ubuntu0.14.10.1\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n if ((res = isdpkgvuln(pkg:\"oxideqt-codecs-extra:i386\", ver:\"1.7.8-0ubuntu0.14.10.1\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:amd64\", ver:\"1.7.8-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:i386\", ver:\"1.7.8-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n\n if ((res = isdpkgvuln(pkg:\"oxideqt-codecs:i386\", ver:\"1.7.8-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"oxideqt-codecs:amd64\", ver:\"1.7.8-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n\n if ((res = isdpkgvuln(pkg:\"oxideqt-codecs-extra:amd64\", ver:\"1.7.8-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"oxideqt-codecs-extra:i386\", ver:\"1.7.8-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2017-07-24T12:53:43", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1265", "CVE-2015-1257", "CVE-2015-1263", "CVE-2015-1251", "CVE-2015-1262", "CVE-2015-1260", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1259", "CVE-2015-1252", "CVE-2015-1256", "CVE-2015-1261", "CVE-2015-1258", "CVE-2015-1255", "CVE-2015-1264"], "description": "Several vulnerabilities were discovered in the chromium web browser.\n\nCVE-2015-1251 \nSkyLined discovered a use-after-free issue in speech\nrecognition.\n\nCVE-2015-1252 \nAn out-of-bounds write issue was discovered that could be used to\nescape from the sandbox.\n\nCVE-2015-1253 \nA cross-origin bypass issue was discovered in the DOM parser.\n\nCVE-2015-1254 \nA cross-origin bypass issue was discovered in the DOM editing\nfeature.\n\nCVE-2015-1255 \nKhalil Zhani discovered a use-after-free issue in WebAudio.\n\nCVE-2015-1256 \nAtte Kettunen discovered a use-after-free issue in the SVG\nimplementation.\n\nCVE-2015-1257 \nmiaubiz discovered an overflow issue in the SVG implementation.\n\nCVE-2015-1258 \ncloudfuzzer discovered an invalid size parameter used in the\nlibvpx library.\n\nCVE-2015-1259 \nAtte Kettunen discovered an uninitialized memory issue in the\npdfium library.\n\nCVE-2015-1260 \nKhalil Zhani discovered multiple use-after-free issues in chromium", "modified": "2017-07-07T00:00:00", "published": "2015-05-22T00:00:00", "id": "OPENVAS:703267", "href": "http://plugins.openvas.org/nasl.php?oid=703267", "type": "openvas", "title": "Debian Security Advisory DSA 3267-1 (chromium-browser - security update)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3267.nasl 6609 2017-07-07 12:05:59Z cfischer $\n# Auto-generated from advisory DSA 3267-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\n\nif(description)\n{\n script_id(703267);\n script_version(\"$Revision: 6609 $\");\n script_cve_id(\"CVE-2015-1251\", \"CVE-2015-1252\", \"CVE-2015-1253\", \"CVE-2015-1254\",\n \"CVE-2015-1255\", \"CVE-2015-1256\", \"CVE-2015-1257\", \"CVE-2015-1258\",\n \"CVE-2015-1259\", \"CVE-2015-1260\", \"CVE-2015-1261\", \"CVE-2015-1262\",\n \"CVE-2015-1263\", \"CVE-2015-1264\", \"CVE-2015-1265\");\n script_name(\"Debian Security Advisory DSA 3267-1 (chromium-browser - security update)\");\n script_tag(name: \"last_modification\", value: \"$Date: 2017-07-07 14:05:59 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name: \"creation_date\", value: \"2015-05-22 00:00:00 +0200 (Fri, 22 May 2015)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name: \"solution_type\", value: \"VendorFix\");\n script_tag(name: \"qod_type\", value: \"package\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2015/dsa-3267.html\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: \"chromium-browser on Debian Linux\");\n script_tag(name: \"solution\", value: \"For the stable distribution (jessie), these problems have been fixed in\nversion 43.0.2357.65-1~deb8u1.\n\nFor the testing distribution (stretch), these problems will be fixed soon.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 43.0.2357.65-1.\n\nWe recommend that you upgrade your chromium-browser packages.\");\n script_tag(name: \"summary\", value: \"Several vulnerabilities were discovered in the chromium web browser.\n\nCVE-2015-1251 \nSkyLined discovered a use-after-free issue in speech\nrecognition.\n\nCVE-2015-1252 \nAn out-of-bounds write issue was discovered that could be used to\nescape from the sandbox.\n\nCVE-2015-1253 \nA cross-origin bypass issue was discovered in the DOM parser.\n\nCVE-2015-1254 \nA cross-origin bypass issue was discovered in the DOM editing\nfeature.\n\nCVE-2015-1255 \nKhalil Zhani discovered a use-after-free issue in WebAudio.\n\nCVE-2015-1256 \nAtte Kettunen discovered a use-after-free issue in the SVG\nimplementation.\n\nCVE-2015-1257 \nmiaubiz discovered an overflow issue in the SVG implementation.\n\nCVE-2015-1258 \ncloudfuzzer discovered an invalid size parameter used in the\nlibvpx library.\n\nCVE-2015-1259 \nAtte Kettunen discovered an uninitialized memory issue in the\npdfium library.\n\nCVE-2015-1260 \nKhalil Zhani discovered multiple use-after-free issues in chromium's\ninterface to the WebRTC library.\n\nCVE-2015-1261 \nJuho Nurminen discovered a URL bar spoofing issue.\n\nCVE-2015-1262 \nmiaubiz discovered the use of an uninitialized class member in\nfont handling.\n\nCVE-2015-1263 \nMike Ruddy discovered that downloading the spellcheck dictionary\nwas not done over HTTPS.\n\nCVE-2015-1264 \nK0r3Ph1L discovered a cross-site scripting issue that could be\ntriggered by bookmarking a site.\n\nCVE-2015-1265 \nThe chrome 43 development team found and fixed various issues\nduring internal auditing. Also multiple issues were fixed in\nthe libv8 library, version 4.3.61.21.\");\n script_tag(name: \"vuldetect\", value: \"This check tests the installed software version using the apt package manager.\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"chromedriver\", ver:\"43.0.2357.65-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium\", ver:\"43.0.2357.65-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-dbg\", ver:\"43.0.2357.65-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-inspector\", ver:\"43.0.2357.65-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-l10n\", ver:\"43.0.2357.65-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-07-19T22:13:24", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1265", "CVE-2015-1257", "CVE-2015-1263", "CVE-2015-1251", "CVE-2015-1262", "CVE-2015-1260", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1259", "CVE-2015-1252", "CVE-2015-1256", "CVE-2015-3910", "CVE-2015-1258", "CVE-2015-1255", "CVE-2015-1264"], "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2015-05-27T00:00:00", "id": "OPENVAS:1361412562310805632", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805632", "type": "openvas", "title": "Google Chrome Multiple Vulnerabilities - 02 - May15 (Mac OS X)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Multiple Vulnerabilities - 02 - May15 (Mac OS X)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805632\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2015-1251\", \"CVE-2015-1252\", \"CVE-2015-1253\", \"CVE-2015-1254\",\n \"CVE-2015-1255\", \"CVE-2015-1256\", \"CVE-2015-1257\", \"CVE-2015-1258\",\n \"CVE-2015-1259\", \"CVE-2015-1260\", \"CVE-2015-1262\", \"CVE-2015-1263\",\n \"CVE-2015-1264\", \"CVE-2015-1265\", \"CVE-2015-3910\");\n script_bugtraq_id(74723);\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-05-27 09:42:43 +0530 (Wed, 27 May 2015)\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_name(\"Google Chrome Multiple Vulnerabilities - 02 - May15 (Mac OS X)\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to:\n\n - Multiple unspecified vulnerabilities in Google V8.\n\n - Use-after-free vulnerability in the SpeechRecognitionClient implementation\n in the Speech subsystem.\n\n - common/partial_circular_buffer.cc script in Google Chrome does not properly\n handle wraps.\n\n - Vulnerability in core/html/parser/HTMLConstructionSite.cpp in the DOM\n implementation in Blink, as used in Google Chrome.\n\n - Vulnerability in core/dom/Document.cpp in Blink, as used in Google Chrome\n which allows the inheritance of the designMode attribute.\n\n - Use-after-free vulnerability in\n content/renderer/media/webaudio_capturer_source.cc script in the WebAudio\n implementation.\n\n - Use-after-free vulnerability in the SVG implementation in Blink.\n\n - platform/graphics/filters/FEColorMatrix.cpp script in the SVG implementation\n in Blink.\n\n - Google Chrome relies on libvpx code that was not built with an appropriate\n size-limit value.\n\n - PDFium, as used in Google Chrome, does not properly initialize memory.\n\n - Multiple use-after-free vulnerabilities in\n content/renderer/media/user_media_client_impl.cc script in the WebRTC\n implementation.\n\n - Cross-site scripting (XSS) vulnerability in Google Chrome.\n\n - The Spellcheck API implementation in Google Chrome before does not use an\n HTTPS session for downloading a Hunspell dictionary.\n\n - platform/fonts/shaping/HarfBuzzShaper.cpp script in Blink, does not\n initialize a certain width field.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to cause a denial of service, inject arbitrary web script, spoof the\n URL bar or deliver misleading popup content, bypass the Same Origin Policy and\n a sandbox protection mechanism, execute arbitrary code and allow\n man-in-the-middle attackers to deliver incorrect spelling suggestions or\n possibly have unspecified other impact via crafted dimensions.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version prior to\n 43.0.2357.65 on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 43.0.2357.65 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"http://googlechromereleases.blogspot.in/2015/05/stable-channel-update_19.html\");\n\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_macosx.nasl\");\n script_mandatory_keys(\"GoogleChrome/MacOSX/Version\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!chromeVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:chromeVer, test_version:\"43.0.2357.65\"))\n{\n report = 'Installed version: ' + chromeVer + '\\n' +\n 'Fixed version: 43.0.2357.65' + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-19T22:14:07", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1265", "CVE-2015-1257", "CVE-2015-1263", "CVE-2015-1251", "CVE-2015-1262", "CVE-2015-1260", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1259", "CVE-2015-1252", "CVE-2015-1256", "CVE-2015-3910", "CVE-2015-1258", "CVE-2015-1255", "CVE-2015-1264"], "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2015-05-27T00:00:00", "id": "OPENVAS:1361412562310805633", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805633", "type": "openvas", "title": "Google Chrome Multiple Vulnerabilities - 02 - May15 (Linux)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Multiple Vulnerabilities - 02 - May15 (Linux)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805633\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2015-1251\", \"CVE-2015-1252\", \"CVE-2015-1253\", \"CVE-2015-1254\",\n \"CVE-2015-1255\", \"CVE-2015-1256\", \"CVE-2015-1257\", \"CVE-2015-1258\",\n \"CVE-2015-1259\", \"CVE-2015-1260\", \"CVE-2015-1262\", \"CVE-2015-1263\",\n \"CVE-2015-1264\", \"CVE-2015-1265\", \"CVE-2015-3910\");\n script_bugtraq_id(74723);\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-05-27 09:42:43 +0530 (Wed, 27 May 2015)\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_name(\"Google Chrome Multiple Vulnerabilities - 02 - May15 (Linux)\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to:\n\n - Multiple unspecified vulnerabilities in Google V8.\n\n - Use-after-free vulnerability in the SpeechRecognitionClient implementation\n in the Speech subsystem.\n\n - common/partial_circular_buffer.cc script in Google Chrome does not properly\n handle wraps.\n\n - Vulnerability in core/html/parser/HTMLConstructionSite.cpp in the DOM\n implementation in Blink, as used in Google Chrome.\n\n - Vulnerability in core/dom/Document.cpp in Blink, as used in Google Chrome\n which allows the inheritance of the designMode attribute.\n\n - Use-after-free vulnerability in\n content/renderer/media/webaudio_capturer_source.cc script in the WebAudio\n implementation.\n\n - Use-after-free vulnerability in the SVG implementation in Blink.\n\n - platform/graphics/filters/FEColorMatrix.cpp script in the SVG implementation\n in Blink.\n\n - Google Chrome relies on libvpx code that was not built with an appropriate\n size-limit value.\n\n - PDFium, as used in Google Chrome, does not properly initialize memory.\n\n - Multiple use-after-free vulnerabilities in\n content/renderer/media/user_media_client_impl.cc script in the WebRTC\n implementation.\n\n - Cross-site scripting (XSS) vulnerability in Google Chrome.\n\n - The Spellcheck API implementation in Google Chrome before does not use an\n HTTPS session for downloading a Hunspell dictionary.\n\n - platform/fonts/shaping/HarfBuzzShaper.cpp script in Blink, does not\n initialize a certain width field.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to cause a denial of service, inject arbitrary web script, spoof the\n URL bar or deliver misleading popup content, bypass the Same Origin Policy and\n a sandbox protection mechanism, execute arbitrary code and allow\n man-in-the-middle attackers to deliver incorrect spelling suggestions or\n possibly have unspecified other impact via crafted dimensions.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version prior to\n 43.0.2357.65 on Linux.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 43.0.2357.65 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"http://googlechromereleases.blogspot.in/2015/05/stable-channel-update_19.html\");\n\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_lin.nasl\");\n script_mandatory_keys(\"Google-Chrome/Linux/Ver\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!chromeVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:chromeVer, test_version:\"43.0.2357.65\"))\n{\n report = 'Installed version: ' + chromeVer + '\\n' +\n 'Fixed version: 43.0.2357.65' + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-19T22:13:24", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1265", "CVE-2015-1257", "CVE-2015-1263", "CVE-2015-1251", "CVE-2015-1262", "CVE-2015-1260", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1259", "CVE-2015-1252", "CVE-2015-1256", "CVE-2015-3910", "CVE-2015-1258", "CVE-2015-1255", "CVE-2015-1264"], "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2015-05-27T00:00:00", "id": "OPENVAS:1361412562310805631", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805631", "type": "openvas", "title": "Google Chrome Multiple Vulnerabilities - 02 - May15 (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Multiple Vulnerabilities - 02 - May15 (Windows)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805631\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2015-1251\", \"CVE-2015-1252\", \"CVE-2015-1253\", \"CVE-2015-1254\",\n \"CVE-2015-1255\", \"CVE-2015-1256\", \"CVE-2015-1257\", \"CVE-2015-1258\",\n \"CVE-2015-1259\", \"CVE-2015-1260\", \"CVE-2015-1262\", \"CVE-2015-1263\",\n \"CVE-2015-1264\", \"CVE-2015-1265\", \"CVE-2015-3910\");\n script_bugtraq_id(74723);\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-05-27 09:42:43 +0530 (Wed, 27 May 2015)\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_name(\"Google Chrome Multiple Vulnerabilities - 02 - May15 (Windows)\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to:\n\n - Multiple unspecified vulnerabilities in Google V8.\n\n - Use-after-free vulnerability in the SpeechRecognitionClient implementation\n in the Speech subsystem.\n\n - common/partial_circular_buffer.cc script in Google Chrome does not properly\n handle wraps.\n\n - Vulnerability in core/html/parser/HTMLConstructionSite.cpp in the DOM\n implementation in Blink, as used in Google Chrome.\n\n - Vulnerability in core/dom/Document.cpp in Blink, as used in Google Chrome\n which allows the inheritance of the designMode attribute.\n\n - Use-after-free vulnerability in\n content/renderer/media/webaudio_capturer_source.cc script in the WebAudio\n implementation.\n\n - Use-after-free vulnerability in the SVG implementation in Blink.\n\n - platform/graphics/filters/FEColorMatrix.cpp script in the SVG implementation\n in Blink.\n\n - Google Chrome relies on libvpx code that was not built with an appropriate\n size-limit value.\n\n - PDFium, as used in Google Chrome, does not properly initialize memory.\n\n - Multiple use-after-free vulnerabilities in\n content/renderer/media/user_media_client_impl.cc script in the WebRTC\n implementation.\n\n - Cross-site scripting (XSS) vulnerability in Google Chrome.\n\n - The Spellcheck API implementation in Google Chrome before does not use an\n HTTPS session for downloading a Hunspell dictionary.\n\n - platform/fonts/shaping/HarfBuzzShaper.cpp script in Blink, does not\n initialize a certain width field.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to cause a denial of service, inject arbitrary web script, spoof the\n URL bar or deliver misleading popup content, bypass the Same Origin Policy and\n a sandbox protection mechanism, execute arbitrary code and allow\n man-in-the-middle attackers to deliver incorrect spelling suggestions or\n possibly have unspecified other impact via crafted dimensions.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version prior to\n 43.0.2357.65 on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 43.0.2357.65 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"http://googlechromereleases.blogspot.in/2015/05/stable-channel-update_19.html\");\n\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_portable_win.nasl\");\n script_mandatory_keys(\"GoogleChrome/Win/Ver\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!chromeVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:chromeVer, test_version:\"43.0.2357.65\"))\n{\n report = 'Installed version: ' + chromeVer + '\\n' +\n 'Fixed version: 43.0.2357.65' + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:36:16", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1265", "CVE-2015-1257", "CVE-2015-1263", "CVE-2015-1251", "CVE-2015-1262", "CVE-2015-1260", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1259", "CVE-2015-1252", "CVE-2015-1256", "CVE-2015-1261", "CVE-2015-1258", "CVE-2015-1255", "CVE-2015-1264"], "description": "Several vulnerabilities were discovered in the chromium web browser.\n\nCVE-2015-1251\nSkyLined discovered a use-after-free issue in speech\nrecognition.\n\nCVE-2015-1252\nAn out-of-bounds write issue was discovered that could be used to\nescape from the sandbox.\n\nCVE-2015-1253\nA cross-origin bypass issue was discovered in the DOM parser.\n\nCVE-2015-1254\nA cross-origin bypass issue was discovered in the DOM editing\nfeature.\n\nCVE-2015-1255\nKhalil Zhani discovered a use-after-free issue in WebAudio.\n\nCVE-2015-1256\nAtte Kettunen discovered a use-after-free issue in the SVG\nimplementation.\n\nCVE-2015-1257\nmiaubiz discovered an overflow issue in the SVG implementation.\n\nCVE-2015-1258\ncloudfuzzer discovered an invalid size parameter used in the\nlibvpx library.\n\nCVE-2015-1259\nAtte Kettunen discovered an uninitialized memory issue in the\npdfium library.\n\nCVE-2015-1260\nKhalil Zhani discovered multiple use-after-free issues in chromium", "modified": "2019-03-18T00:00:00", "published": "2015-05-22T00:00:00", "id": "OPENVAS:1361412562310703267", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703267", "type": "openvas", "title": "Debian Security Advisory DSA 3267-1 (chromium-browser - security update)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3267.nasl 14275 2019-03-18 14:39:45Z cfischer $\n# Auto-generated from advisory DSA 3267-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.703267\");\n script_version(\"$Revision: 14275 $\");\n script_cve_id(\"CVE-2015-1251\", \"CVE-2015-1252\", \"CVE-2015-1253\", \"CVE-2015-1254\",\n \"CVE-2015-1255\", \"CVE-2015-1256\", \"CVE-2015-1257\", \"CVE-2015-1258\",\n \"CVE-2015-1259\", \"CVE-2015-1260\", \"CVE-2015-1261\", \"CVE-2015-1262\",\n \"CVE-2015-1263\", \"CVE-2015-1264\", \"CVE-2015-1265\");\n script_name(\"Debian Security Advisory DSA 3267-1 (chromium-browser - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:39:45 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-05-22 00:00:00 +0200 (Fri, 22 May 2015)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2015/dsa-3267.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB8\");\n script_tag(name:\"affected\", value:\"chromium-browser on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the stable distribution (jessie), these problems have been fixed in\nversion 43.0.2357.65-1~deb8u1.\n\nFor the testing distribution (stretch), these problems will be fixed soon.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 43.0.2357.65-1.\n\nWe recommend that you upgrade your chromium-browser packages.\");\n script_tag(name:\"summary\", value:\"Several vulnerabilities were discovered in the chromium web browser.\n\nCVE-2015-1251\nSkyLined discovered a use-after-free issue in speech\nrecognition.\n\nCVE-2015-1252\nAn out-of-bounds write issue was discovered that could be used to\nescape from the sandbox.\n\nCVE-2015-1253\nA cross-origin bypass issue was discovered in the DOM parser.\n\nCVE-2015-1254\nA cross-origin bypass issue was discovered in the DOM editing\nfeature.\n\nCVE-2015-1255\nKhalil Zhani discovered a use-after-free issue in WebAudio.\n\nCVE-2015-1256\nAtte Kettunen discovered a use-after-free issue in the SVG\nimplementation.\n\nCVE-2015-1257\nmiaubiz discovered an overflow issue in the SVG implementation.\n\nCVE-2015-1258\ncloudfuzzer discovered an invalid size parameter used in the\nlibvpx library.\n\nCVE-2015-1259\nAtte Kettunen discovered an uninitialized memory issue in the\npdfium library.\n\nCVE-2015-1260\nKhalil Zhani discovered multiple use-after-free issues in chromium's\ninterface to the WebRTC library.\n\nCVE-2015-1261\nJuho Nurminen discovered a URL bar spoofing issue.\n\nCVE-2015-1262\nmiaubiz discovered the use of an uninitialized class member in\nfont handling.\n\nCVE-2015-1263\nMike Ruddy discovered that downloading the spellcheck dictionary\nwas not done over HTTPS.\n\nCVE-2015-1264\nK0r3Ph1L discovered a cross-site scripting issue that could be\ntriggered by bookmarking a site.\n\nCVE-2015-1265\nThe chrome 43 development team found and fixed various issues\nduring internal auditing. Also multiple issues were fixed in\nthe libv8 library, version 4.3.61.21.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"chromedriver\", ver:\"43.0.2357.65-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium\", ver:\"43.0.2357.65-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-dbg\", ver:\"43.0.2357.65-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-inspector\", ver:\"43.0.2357.65-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-l10n\", ver:\"43.0.2357.65-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:36:11", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1265", "CVE-2015-1247", "CVE-2015-1257", "CVE-2015-1246", "CVE-2015-1244", "CVE-2015-1263", "CVE-2015-1251", "CVE-2015-1262", "CVE-2015-1260", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-1250", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1259", "CVE-2015-1243", "CVE-2015-1252", "CVE-2015-1233", "CVE-2015-1248", "CVE-2015-1236", "CVE-2015-1256", "CVE-2015-1242", "CVE-2015-1245", "CVE-2015-1235", "CVE-2015-1237", "CVE-2015-1258", "CVE-2015-1255", "CVE-2015-1238", "CVE-2015-1264", "CVE-2015-1234"], "description": "Gentoo Linux Local Security Checks GLSA 201506-04", "modified": "2018-10-26T00:00:00", "published": "2015-09-29T00:00:00", "id": "OPENVAS:1361412562310121381", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310121381", "type": "openvas", "title": "Gentoo Security Advisory GLSA 201506-04", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: glsa-201506-04.nasl 12128 2018-10-26 13:35:25Z cfischer $\n#\n# Gentoo Linux security check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.121381\");\n script_version(\"$Revision: 12128 $\");\n script_tag(name:\"creation_date\", value:\"2015-09-29 11:28:51 +0300 (Tue, 29 Sep 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-26 15:35:25 +0200 (Fri, 26 Oct 2018) $\");\n script_name(\"Gentoo Security Advisory GLSA 201506-04\");\n script_tag(name:\"insight\", value:\"Multiple vulnerabilities have been discovered in Chromium. Please review the CVE identifiers referenced below for details.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://security.gentoo.org/glsa/201506-04\");\n script_cve_id(\"CVE-2015-1233\", \"CVE-2015-1234\", \"CVE-2015-1235\", \"CVE-2015-1236\", \"CVE-2015-1237\", \"CVE-2015-1238\", \"CVE-2015-1240\", \"CVE-2015-1241\", \"CVE-2015-1242\", \"CVE-2015-1243\", \"CVE-2015-1244\", \"CVE-2015-1245\", \"CVE-2015-1246\", \"CVE-2015-1247\", \"CVE-2015-1248\", \"CVE-2015-1250\", \"CVE-2015-1251\", \"CVE-2015-1252\", \"CVE-2015-1253\", \"CVE-2015-1254\", \"CVE-2015-1255\", \"CVE-2015-1256\", \"CVE-2015-1257\", \"CVE-2015-1258\", \"CVE-2015-1259\", \"CVE-2015-1260\", \"CVE-2015-1262\", \"CVE-2015-1263\", \"CVE-2015-1264\", \"CVE-2015-1265\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"Gentoo Linux Local Security Checks GLSA 201506-04\");\n script_copyright(\"Eero Volotinen\");\n script_family(\"Gentoo Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\n\nif((res=ispkgvuln(pkg:\"www-client/chromium\", unaffected: make_list(\"ge 43.0.2357.65\"), vulnerable: make_list(\"lt 43.0.2357.65\"))) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "ubuntu": [{"lastseen": "2020-07-02T11:33:16", "bulletinFamily": "unix", "cvelist": ["CVE-2015-1265", "CVE-2015-1257", "CVE-2015-1262", "CVE-2015-1260", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1256", "CVE-2015-3910", "CVE-2015-1258", "CVE-2015-1255"], "description": "Several security issues were discovered in the DOM implementation in \nBlink. If a user were tricked in to opening a specially crafted website, \nan attacker could potentially exploit these to bypass Same Origin Policy \nrestrictions. (CVE-2015-1253, CVE-2015-1254)\n\nA use-after-free was discovered in the WebAudio implementation in \nChromium. If a user were tricked in to opening a specially crafted \nwebsite, an attacker could potentially exploit this to cause a denial of \nservice via renderer crash, or execute arbitrary code with the privileges \nof the sandboxed render process. (CVE-2015-1255)\n\nA use-after-free was discovered in the SVG implementation in Blink. If a \nuser were tricked in to opening a specially crafted website, an attacker \ncould potentially exploit this to cause a denial of service via renderer \ncrash, or execute arbitrary code with the privileges of the sandboxed \nrender process. (CVE-2015-1256)\n\nA security issue was discovered in the SVG implementation in Blink. If a \nuser were tricked in to opening a specially crafted website, an attacker \ncould potentially exploit this to cause a denial of service via renderer \ncrash. (CVE-2015-1257)\n\nAn issue was discovered with the build of libvpx. If a user were tricked \nin to opening a specially crafted website, an attacker could potentially \nexploit this to cause a denial of service via renderer crash, or execute \narbitrary code with the privileges of the sandboxed render process. \n(CVE-2015-1258)\n\nMultiple use-after-free issues were discovered in the WebRTC \nimplementation in Chromium. If a user were tricked in to opening a \nspecially crafted website, an attacker could potentially exploit these to \ncause a denial of service via renderer crash, or execute arbitrary code \nwith the privileges of the sandboxed render process. (CVE-2015-1260)\n\nAn uninitialized value bug was discovered in the font shaping code in \nBlink. If a user were tricked in to opening a specially crafted website, \nan attacker could potentially exploit this to cause a denial of service \nvia renderer crash. (CVE-2015-1262)\n\nMultiple security issues were discovered in Chromium. If a user were \ntricked in to opening a specially crafted website, an attacker could \npotentially exploit these to read uninitialized memory, cause a denial \nof service via application crash or execute arbitrary code with the \nprivileges of the user invoking the program. (CVE-2015-1265)\n\nMultiple security issues were discovered in V8. If a user were tricked \nin to opening a specially crafted website, an attacker could potentially \nexploit these to read uninitialized memory, cause a denial of service via \nrenderer crash or execute arbitrary code with the privileges of the \nsandboxed render process. (CVE-2015-3910)", "edition": 5, "modified": "2015-05-21T00:00:00", "published": "2015-05-21T00:00:00", "id": "USN-2610-1", "href": "https://ubuntu.com/security/notices/USN-2610-1", "title": "Oxide vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "archlinux": [{"lastseen": "2016-09-02T18:44:47", "bulletinFamily": "unix", "cvelist": ["CVE-2015-1265", "CVE-2015-1257", "CVE-2015-1263", "CVE-2015-1251", "CVE-2015-1260", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1259", "CVE-2015-1252", "CVE-2015-1256", "CVE-2015-1258", "CVE-2015-1255", "CVE-2015-1264"], "description": "- CVE-2015-1251 (arbitrary code execution)\n\nUse-after-free vulnerability in the SpeechRecognitionClient\nimplementation in the Speech subsystem allows remote attackers to\nexecute arbitrary code via a crafted document.\n\n- CVE-2015-1252 (sandbox protection bypass)\n\nIt has been discovered that common/partial_circular_buffer.cc does not\nproperly handle wraps, which allows remote attackers to bypass a sandbox\nprotection mechanism or cause a denial of service (out-of-bounds write)\nvia vectors that trigger a write operation with a large amount of data,\nrelated to the PartialCircularBuffer::Write and\nPartialCircularBuffer::DoWrite functions.\n\n- CVE-2015-1253 (same origin policy bypass)\n\nIt has been discovered that core/html/parser/HTMLConstructionSite.cpp in\nthe DOM implementation in Blink allows remote attackers to bypass the\nSame Origin Policy via crafted JavaScript code that appends a child to a\nSCRIPT element, related to the insert and executeReparentTask functions.\n\n- CVE-2015-1254 (same origin policy bypass)\n\nIt has been discovered that core/dom/Document.cpp in Blink enables the\ninheritance of the designMode attribute, which allows remote attackers\nto bypass the Same Origin Policy by leveraging the availability of editing.\n\n- CVE-2015-1255 (denial of service)\n\nUse-after-free vulnerability in\ncontent/renderer/media/webaudio_capturer_source.cc in the WebAudio\nimplementation allows remote attackers to cause a denial of service\n(heap memory corruption) or possibly have unspecified other impact by\nleveraging improper handling of a stop action for an audio track.\n\n- CVE-2015-1256 (denial of service)\n\nUse-after-free vulnerability in the SVG implementation in Blink allows\nremote attackers to cause a denial of service or possibly have\nunspecified other impact via a crafted document that leverages improper\nhandling of a shadow tree for a use element.\n\n- CVE-2015-1257 (denial of service)\n\nIt has been discovered that platform/graphics/filters/FEColorMatrix.cpp\nin the SVG implementation in Blink does not properly handle an\ninsufficient number of values in an feColorMatrix filter, which allows\nremote attackers to cause a denial of service (container overflow) or\npossibly have unspecified other impact via a crafted document.\n\n- CVE-2015-1258 (denial of service)\n\nGoogle Chrome before 43.0.2357.65 relies on libvpx code that was not\nbuilt with an appropriate --size-limit value, which allows remote\nattackers to trigger a negative value for a size field, and consequently\ncause a denial of service or possibly have unspecified other impact, via\na crafted frame size in VP9 video data.\n\n- CVE-2015-1259 (denial of service)\n\nPDFium does not properly initialize memory, which allows remote\nattackers to cause a denial of service or possibly have unspecified\nother impact via unknown vectors.\n\n- CVE-2015-1260 (denial of service)\n\nMultiple use-after-free vulnerabilities in\ncontent/renderer/media/user_media_client_impl.cc in the WebRTC\nimplementation allow remote attackers to cause a denial of service or\npossibly have unspecified other impact via crafted JavaScript code that\nexecutes upon completion of a getUserMedia request.\n\n- CVE-2015-1263 (man-in-the-middle)\n\nThe Spellcheck API implementation does not use an HTTPS session for\ndownloading a Hunspell dictionary, which allows man-in-the-middle\nattackers to deliver incorrect spelling suggestions or possibly have\nunspecified other impact via a crafted file.\n\n- CVE-2015-1264 (cross side scripting)\n\nCross-site scripting (XSS) vulnerability allows user-assisted remote\nattackers to inject arbitrary web script or HTML via crafted data that\nis improperly handled by the Bookmarks feature.\n\n- CVE-2015-1265 (denial of service)\n\nMultiple unspecified vulnerabilities in Google Chrome before\n43.0.2357.65 allow attackers to cause a denial of service or possibly\nhave other impact via unknown vectors.", "modified": "2015-05-21T00:00:00", "published": "2015-05-21T00:00:00", "id": "ASA-201505-14", "href": "https://lists.archlinux.org/pipermail/arch-security/2015-May/000335.html", "type": "archlinux", "title": "chromium: multiple issues", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "threatpost": [{"lastseen": "2018-10-06T22:56:51", "bulletinFamily": "info", "cvelist": ["CVE-2015-1251", "CVE-2015-1252", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1255", "CVE-2015-1256", "CVE-2015-1257", "CVE-2015-1258", "CVE-2015-1259", "CVE-2015-1260", "CVE-2015-1261", "CVE-2015-1262", "CVE-2015-1263", "CVE-2015-1264"], "description": "Google has patched a high-risk vulnerability in its Chrome browser that allows an attacker to escape the Chrome sandbox.\n\nThat vulnerability is one of 37 bugs fixed in version 43 of Chrome. Six of those flaws are rated as high risks and Google paid out more than $38,000 in rewards to researchers who reported vulnerabilities to the company. Among the other serious vulnerabilities are cross-origin bypasses and three use-after-free vulnerabilities.\n\nGoogle has not yet released the details of the vulnerabilities, so the nature and location of the sandbox-escape bug aren\u2019t clear. The company waits until most users have updated to the new version before releasing complete details of the vulnerabilities.\n\nHere are the public bugs fixed in Chrome 43:\n\n[$16337][[474029](<https://code.google.com/p/chromium/issues/detail?id=474029>)] High CVE-2015-1252: Sandbox escape in Chrome. Credit to anonymous.\n\n[$7500][[464552](<https://code.google.com/p/chromium/issues/detail?id=464552>)] High CVE-2015-1253: Cross-origin bypass in DOM. Credit to anonymous.\n\n[$3000][[444927](<https://code.google.com/p/chromium/issues/detail?id=444927>)] High CVE-2015-1254: Cross-origin bypass in Editing. Credit to armin@rawsec.net.\n\n[$3000][[473253](<https://code.google.com/p/chromium/issues/detail?id=473253>)] High CVE-2015-1255: Use-after-free in WebAudio. Credit to Khalil Zhani.\n\n[$2000][[478549](<https://code.google.com/p/chromium/issues/detail?id=478549>)] High CVE-2015-1256: Use-after-free in SVG. Credit to Atte Kettunen of OUSPG.\n\n[[481015](<https://code.google.com/p/chromium/issues/detail?id=481015>)] High CVE-2015-1251: Use-after-free in Speech. Credit to SkyLined working with HP\u2019s Zero Day Initiative \n\n[$1500][[468519](<https://code.google.com/p/chromium/issues/detail?id=468519>)] Medium CVE-2015-1257: Container-overflow in SVG. Credit to miaubiz.\n\n[$1000][[450939](<https://code.google.com/p/chromium/issues/detail?id=450939>)] Medium CVE-2015-1258: Negative-size parameter in Libvpx. Credit to cloudfuzzer\n\n[$1000][[468167](<https://code.google.com/p/chromium/issues/detail?id=468167>)] Medium CVE-2015-1259: Uninitialized value in PDFium. Credit to Atte Kettunen of OUSPG\n\n[$1000][[474370](<https://code.google.com/p/chromium/issues/detail?id=474370>)] Medium CVE-2015-1260: Use-after-free in WebRTC. Credit to Khalil Zhani.\n\n[$500][[466351](<https://code.google.com/p/chromium/issues/detail?id=466351>)] Medium CVE-2015-1261: URL bar spoofing. Credit to Juho Nurminen.\n\n[$500][[476647](<https://code.google.com/p/chromium/issues/detail?id=476647>)] Medium CVE-2015-1262: Uninitialized value in Blink. Credit to miaubiz.\n\n[$500][[479162](<https://code.google.com/p/chromium/issues/detail?id=479162>)] Low CVE-2015-1263: Insecure download of spellcheck dictionary. Credit to Mike Ruddy.\n\n[$500][[481015](<https://code.google.com/p/chromium/issues/detail?id=481015>)] Low CVE-2015-1264: Cross-site scripting in bookmarks. Credit to K0r3Ph1L.\n", "modified": "2015-05-19T17:19:05", "published": "2015-05-19T13:19:05", "id": "THREATPOST:45D2D399F79C59D30CB09CDC7A87747D", "href": "https://threatpost.com/google-fixes-sandbox-escape-in-chrome/112899/", "type": "threatpost", "title": "Google Fixes Sandbox Escape in Chrome", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "debian": [{"lastseen": "2020-08-12T01:03:42", "bulletinFamily": "unix", "cvelist": ["CVE-2015-1265", "CVE-2015-1257", "CVE-2015-1263", "CVE-2015-1251", "CVE-2015-1262", "CVE-2015-1260", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1259", "CVE-2015-1252", "CVE-2015-1256", "CVE-2015-1261", "CVE-2015-1258", "CVE-2015-1255", "CVE-2015-1264"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3267-1 security@debian.org\nhttp://www.debian.org/security/ Michael Gilbert\nMay 22, 2015 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : chromium-browser\nCVE ID : CVE-2015-1251 CVE-2015-1252 CVE-2015-1253 CVE-2015-1254\n CVE-2015-1255 CVE-2015-1256 CVE-2015-1257 CVE-2015-1258\n CVE-2015-1259 CVE-2015-1260 CVE-2015-1261 CVE-2015-1262\n CVE-2015-1263 CVE-2015-1264 CVE-2015-1265\n\nSeveral vulnerabilities were discovered in the chromium web browser.\n\nCVE-2015-1251\n\n SkyLined discovered a use-after-free issue in speech recognition.\n\nCVE-2015-1252\n\n An out-of-bounds write issue was discovered that could be used to\n escape from the sandbox.\n\nCVE-2015-1253\n\n A cross-origin bypass issue was discovered in the DOM parser.\n\nCVE-2015-1254\n\n A cross-origin bypass issue was discovered in the DOM editing feature.\n\nCVE-2015-1255\n\n Khalil Zhani discovered a use-after-free issue in WebAudio.\n\nCVE-2015-1256\n\n Atte Kettunen discovered a use-after-free issue in the SVG\n implementation.\n\nCVE-2015-1257\n\n miaubiz discovered an overflow issue in the SVG implementation.\n\nCVE-2015-1258\n\n cloudfuzzer discovered an invalid size parameter used in the\n libvpx library.\n\nCVE-2015-1259\n\n Atte Kettunen discovered an uninitialized memory issue in the\n pdfium library.\n\nCVE-2015-1260\n\n Khalil Zhani discovered multiple use-after-free issues in chromium's\n interface to the WebRTC library.\n\nCVE-2015-1261\n\n Juho Nurminen discovered a URL bar spoofing issue.\n\nCVE-2015-1262\n\n miaubiz discovered the use of an uninitialized class member in\n font handling.\n\nCVE-2015-1263\n\n Mike Ruddy discovered that downloading the spellcheck dictionary\n was not done over HTTPS.\n\nCVE-2015-1264\n\n K0r3Ph1L discovered a cross-site scripting issue that could be\n triggered by bookmarking a site.\n\nCVE-2015-1265\n\n The chrome 43 development team found and fixed various issues\n during internal auditing. Also multiple issues were fixed in\n the libv8 library, version 4.3.61.21.\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 43.0.2357.65-1~deb8u1.\n\nFor the testing distribution (stretch), these problems will be fixed soon.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 43.0.2357.65-1.\n\nWe recommend that you upgrade your chromium-browser packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 8, "modified": "2015-05-22T05:03:03", "published": "2015-05-22T05:03:03", "id": "DEBIAN:DSA-3267-1:32EBE", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2015/msg00158.html", "title": "[SECURITY] [DSA 3267-1] chromium-browser security update", "type": "debian", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:59", "bulletinFamily": "software", "cvelist": ["CVE-2015-1265", "CVE-2015-1257", "CVE-2015-1263", "CVE-2015-1251", "CVE-2015-1262", "CVE-2015-1260", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1259", "CVE-2015-1252", "CVE-2015-1256", "CVE-2015-1261", "CVE-2015-1258", "CVE-2015-1255", "CVE-2015-1264"], "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA512\r\n\r\n- -------------------------------------------------------------------------\r\nDebian Security Advisory DSA-3267-1 security@debian.org\r\nhttp://www.debian.org/security/ Michael Gilbert\r\nMay 22, 2015 http://www.debian.org/security/faq\r\n- -------------------------------------------------------------------------\r\n\r\nPackage : chromium-browser\r\nCVE ID : CVE-2015-1251 CVE-2015-1252 CVE-2015-1253 CVE-2015-1254\r\n CVE-2015-1255 CVE-2015-1256 CVE-2015-1257 CVE-2015-1258\r\n CVE-2015-1259 CVE-2015-1260 CVE-2015-1261 CVE-2015-1262\r\n CVE-2015-1263 CVE-2015-1264 CVE-2015-1265\r\n\r\nSeveral vulnerabilities were discovered in the chromium web browser.\r\n\r\nCVE-2015-1251\r\n\r\n SkyLined discovered a use-after-free issue in speech recognition.\r\n\r\nCVE-2015-1252\r\n\r\n An out-of-bounds write issue was discovered that could be used to\r\n escape from the sandbox.\r\n\r\nCVE-2015-1253\r\n\r\n A cross-origin bypass issue was discovered in the DOM parser.\r\n\r\nCVE-2015-1254\r\n\r\n A cross-origin bypass issue was discovered in the DOM editing feature.\r\n\r\nCVE-2015-1255\r\n\r\n Khalil Zhani discovered a use-after-free issue in WebAudio.\r\n\r\nCVE-2015-1256\r\n\r\n Atte Kettunen discovered a use-after-free issue in the SVG\r\n implementation.\r\n\r\nCVE-2015-1257\r\n\r\n miaubiz discovered an overflow issue in the SVG implementation.\r\n\r\nCVE-2015-1258\r\n\r\n cloudfuzzer discovered an invalid size parameter used in the\r\n libvpx library.\r\n\r\nCVE-2015-1259\r\n\r\n Atte Kettunen discovered an uninitialized memory issue in the\r\n pdfium library.\r\n\r\nCVE-2015-1260\r\n\r\n Khalil Zhani discovered multiple use-after-free issues in chromium's\r\n interface to the WebRTC library.\r\n\r\nCVE-2015-1261\r\n\r\n Juho Nurminen discovered a URL bar spoofing issue.\r\n\r\nCVE-2015-1262\r\n\r\n miaubiz discovered the use of an uninitialized class member in\r\n font handling.\r\n\r\nCVE-2015-1263\r\n\r\n Mike Ruddy discovered that downloading the spellcheck dictionary\r\n was not done over HTTPS.\r\n\r\nCVE-2015-1264\r\n\r\n K0r3Ph1L discovered a cross-site scripting issue that could be\r\n triggered by bookmarking a site.\r\n\r\nCVE-2015-1265\r\n\r\n The chrome 43 development team found and fixed various issues\r\n during internal auditing. Also multiple issues were fixed in\r\n the libv8 library, version 4.3.61.21.\r\n\r\nFor the stable distribution (jessie), these problems have been fixed in\r\nversion 43.0.2357.65-1~deb8u1.\r\n\r\nFor the testing distribution (stretch), these problems will be fixed soon.\r\n\r\nFor the unstable distribution (sid), these problems have been fixed in\r\nversion 43.0.2357.65-1.\r\n\r\nWe recommend that you upgrade your chromium-browser packages.\r\n\r\nFurther information about Debian Security Advisories, how to apply\r\nthese updates to your system and frequently asked questions can be\r\nfound at: https://www.debian.org/security/\r\n\r\nMailing list: debian-security-announce@lists.debian.org\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1\r\n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\r\n=GyQo\r\n-----END PGP SIGNATURE-----\r\n\r\n", "edition": 1, "modified": "2015-05-25T00:00:00", "published": "2015-05-25T00:00:00", "id": "SECURITYVULNS:DOC:32136", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:32136", "title": "[SECURITY] [DSA 3267-1] chromium-browser security update", "type": "securityvulns", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:00", "bulletinFamily": "software", "cvelist": ["CVE-2015-1265", "CVE-2015-1247", "CVE-2015-1257", "CVE-2015-3334", "CVE-2015-1246", "CVE-2015-1244", "CVE-2015-1263", "CVE-2015-1251", "CVE-2015-1262", "CVE-2015-1260", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-1250", "CVE-2015-1253", "CVE-2015-3336", "CVE-2015-1254", "CVE-2015-1259", "CVE-2015-1243", "CVE-2015-1252", "CVE-2015-1248", "CVE-2015-1236", "CVE-2015-1256", "CVE-2015-1242", "CVE-2015-1245", "CVE-2015-1235", "CVE-2015-3333", "CVE-2015-1261", "CVE-2015-1237", "CVE-2015-1258", "CVE-2015-1255", "CVE-2015-1238", "CVE-2015-1264", "CVE-2015-1249"], "description": "No description provided", "edition": 1, "modified": "2015-05-25T00:00:00", "published": "2015-05-25T00:00:00", "id": "SECURITYVULNS:VULN:14435", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:14435", "title": "Google Chrome / Chromium multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "freebsd": [{"lastseen": "2019-05-29T18:33:15", "bulletinFamily": "unix", "cvelist": ["CVE-2015-1265", "CVE-2015-1257", "CVE-2015-1263", "CVE-2015-1251", "CVE-2015-1262", "CVE-2015-1260", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1259", "CVE-2015-1252", "CVE-2015-1256", "CVE-2015-1261", "CVE-2015-1258", "CVE-2015-1255", "CVE-2015-1264"], "description": "\nGoogle Chrome Releases reports:\n\n37 security fixes in this release, including:\n\n[474029] High CVE-2015-1252: Sandbox escape in Chrome. Credit\n\t to anonymous.\n[464552] High CVE-2015-1253: Cross-origin bypass in DOM. Credit\n\t to anonymous.\n[444927] High CVE-2015-1254: Cross-origin bypass in Editing.\n\t Credit to armin@rawsec.net.\n[473253] High CVE-2015-1255: Use-after-free in WebAudio. Credit\n\t to Khalil Zhani.\n[478549] High CVE-2015-1256: Use-after-free in SVG. Credit to\n\t Atte Kettunen of OUSPG.\n[481015] High CVE-2015-1251: Use-after-free in Speech. Credit\n\t to SkyLined working with HP's Zero Day Initiative.\n[468519] Medium CVE-2015-1257: Container-overflow in SVG.\n\t Credit to miaubiz.\n[450939] Medium CVE-2015-1258: Negative-size parameter in\n\t libvpx. Credit to cloudfuzzer\n[468167] Medium CVE-2015-1259: Uninitialized value in PDFium.\n\t Credit to Atte Kettunen of OUSPG\n[474370] Medium CVE-2015-1260: Use-after-free in WebRTC. Credit\n\t to Khalil Zhani.\n[466351] Medium CVE-2015-1261: URL bar spoofing. Credit to Juho\n\t Nurminen.\n[476647] Medium CVE-2015-1262: Uninitialized value in Blink.\n\t Credit to miaubiz.\n[479162] Low CVE-2015-1263: Insecure download of spellcheck\n\t dictionary. Credit to Mike Ruddy.\n[481015] Low CVE-2015-1264: Cross-site scripting in bookmarks.\n\t Credit to K0r3Ph1L.\n[489518] CVE-2015-1265: Various fixes from internal audits,\n\t fuzzing and other initiatives.\nMultiple vulnerabilities in V8 fixed at the tip of the 4.3\n\t branch (currently 4.3.61.21).\n\n\n", "edition": 4, "modified": "2015-05-19T00:00:00", "published": "2015-05-19T00:00:00", "id": "A9D456B4-FE4C-11E4-AD15-00262D5ED8EE", "href": "https://vuxml.freebsd.org/freebsd/a9d456b4-fe4c-11e4-ad15-00262d5ed8ee.html", "title": "chromium -- multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "redhat": [{"lastseen": "2019-08-13T18:45:27", "bulletinFamily": "unix", "cvelist": ["CVE-2015-1251", "CVE-2015-1252", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1255", "CVE-2015-1256", "CVE-2015-1257", "CVE-2015-1258", "CVE-2015-1259", "CVE-2015-1260", "CVE-2015-1261", "CVE-2015-1262", "CVE-2015-1263", "CVE-2015-1264", "CVE-2015-1265"], "description": "Chromium is an open-source web browser, powered by WebKit (Blink).\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Chromium to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nChromium. (CVE-2015-1251, CVE-2015-1252, CVE-2015-1253, CVE-2015-1254,\nCVE-2015-1255, CVE-2015-1256, CVE-2015-1257, CVE-2015-1258, CVE-2015-1259,\nCVE-2015-1260, CVE-2015-1261, CVE-2015-1262, CVE-2015-1263, CVE-2015-1264,\nCVE-2015-1265)\n\nAll Chromium users should upgrade to these updated packages, which contain\nChromium version 43.0.2357.65, which corrects these issues. After\ninstalling the update, Chromium must be restarted for the changes to take\neffect.\n", "modified": "2018-06-07T09:04:24", "published": "2015-05-25T04:00:00", "id": "RHSA-2015:1023", "href": "https://access.redhat.com/errata/RHSA-2015:1023", "type": "redhat", "title": "(RHSA-2015:1023) Important: chromium-browser security update", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "kaspersky": [{"lastseen": "2020-09-02T11:43:39", "bulletinFamily": "info", "cvelist": ["CVE-2015-1265", "CVE-2015-1257", "CVE-2015-1263", "CVE-2015-1251", "CVE-2015-1262", "CVE-2015-1260", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1259", "CVE-2015-1252", "CVE-2015-1256", "CVE-2015-1261", "CVE-2015-3910", "CVE-2015-1258", "CVE-2015-1255", "CVE-2015-1264"], "description": "### *Detect date*:\n05/19/2015\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to bypass security restrictions, spoof user interface, conduct cross-scripting attack, cause denial of service or execute arbitrary code.\n\n### *Affected products*:\nGoogle Chrome versions earlier than 43.0.2357.65\n\n### *Solution*:\nUpdate to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk. \n[Get Google Chrome](<https://www.google.com/chrome/browser/desktop/index.html>)\n\n### *Original advisories*:\n[Google blog](<http://feedproxy.google.com/~r/GoogleChromeReleases/~3/r7j0t-RwdaU/stable-channel-update_19.html>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Google Chrome](<https://threats.kaspersky.com/en/product/Google-Chrome/>)\n\n### *CVE-IDS*:\n[CVE-2015-1258](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1258>)7.5Critical \n[CVE-2015-1259](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1259>)7.5Critical \n[CVE-2015-1265](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1265>)7.5Critical \n[CVE-2015-1251](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1251>)6.8High \n[CVE-2015-1262](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1262>)7.5Critical \n[CVE-2015-1264](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1264>)4.3Warning \n[CVE-2015-1252](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1252>)7.5Critical \n[CVE-2015-3910](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3910>)7.5Critical \n[CVE-2015-1263](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1263>)4.3Warning \n[CVE-2015-1260](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1260>)7.5Critical \n[CVE-2015-1261](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1261>)5.0Critical \n[CVE-2015-1255](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1255>)6.8High \n[CVE-2015-1257](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1257>)7.5Critical \n[CVE-2015-1256](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1256>)7.5Critical \n[CVE-2015-1254](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1254>)5.0Critical \n[CVE-2015-1253](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1253>)7.5Critical\n\n### *Exploitation*:\nThe following public exploits exists for this vulnerability:", "edition": 41, "modified": "2020-06-18T00:00:00", "published": "2015-05-19T00:00:00", "id": "KLA10585", "href": "https://threats.kaspersky.com/en/vulnerability/KLA10585", "title": "\r KLA10585Multiple vulnerabilities in Google Chrome ", "type": "kaspersky", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:39", "bulletinFamily": "unix", "cvelist": ["CVE-2015-1265", "CVE-2015-1247", "CVE-2015-1257", "CVE-2015-1246", "CVE-2015-1244", "CVE-2015-1263", "CVE-2015-1251", "CVE-2015-1262", "CVE-2015-1260", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-1250", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1259", "CVE-2015-1243", "CVE-2015-1252", "CVE-2015-1233", "CVE-2015-1248", "CVE-2015-1236", "CVE-2015-1256", "CVE-2015-1242", "CVE-2015-1245", "CVE-2015-1235", "CVE-2015-1237", "CVE-2015-1258", "CVE-2015-1255", "CVE-2015-1238", "CVE-2015-1264", "CVE-2015-1234"], "edition": 1, "description": "### Background\n\nChromium is an open-source web browser project.\n\n### Description\n\nMultiple vulnerabilities have been discovered in Chromium. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA remote attacker can cause arbitrary remote code execution, Denial of Service or bypass of security mechanisms. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Chromium users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose\n \">=www-client/chromium-43.0.2357.65\"", "modified": "2015-06-23T00:00:00", "published": "2015-06-23T00:00:00", "id": "GLSA-201506-04", "href": "https://security.gentoo.org/glsa/201506-04", "type": "gentoo", "title": "Chromium: Multiple vulnerabilities", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}