CVE-2018-6076: Incorrect handling of URL fragment identifiers in Blink
CVE-2018-6077: Timing attack using SVG filters
CVE-2018-6078: URL Spoof in OmniBox
CVE-2018-6079: Information disclosure via texture data in WebGL
CVE-2018-6080: Information disclosure in IPC call
CVE-2018-6081: XSS in interstitials
CVE-2018-6082: Circumvention of port blocking
CVE-2018-6083: Incorrect processing of AppManifests
bsc#1086124: Various fixes from internal audits, fuzzing and other
initiatives
This update also supports mitigation against the Spectre vulnerabilities:
"Strict site isolation" is disabled for most users and can be turned on
via: chrome://flags/#enable-site-per-process
This feature is undergoing a small percentage trial. Out out of the trial
is possible via: chrome://flags/#site-isolation-trial-opt-out
{"id": "OPENSUSE-SU-2018:1175-1", "bulletinFamily": "unix", "title": "Security update for Chromium (important)", "description": "This update for Chromium to version 66.0.3359.139 fixes the following\n issues:\n\n - CVE-2018-6118: Use after free in Media Cache (bsc#1091288)\n - CVE-2018-6085: Use after free in Disk Cache\n - CVE-2018-6086: Use after free in Disk Cache\n - CVE-2018-6087: Use after free in WebAssembly\n - CVE-2018-6088: Use after free in PDFium\n - CVE-2018-6089: Same origin policy bypass in Service Worker\n - CVE-2018-6090: Heap buffer overflow in Skia\n - CVE-2018-6091: Incorrect handling of plug-ins by Service Worker\n - CVE-2018-6092: Integer overflow in WebAssembly\n - CVE-2018-6093: Same origin bypass in Service Worker\n - CVE-2018-6094: Exploit hardening regression in Oilpan\n - CVE-2018-6095: Lack of meaningful user interaction requirement before\n file upload\n - CVE-2018-6096: Fullscreen UI spoof\n - CVE-2018-6097: Fullscreen UI spoof\n - CVE-2018-6098: URL spoof in Omnibox\n - CVE-2018-6099: CORS bypass in ServiceWorker\n - CVE-2018-6100: URL spoof in Omnibox\n - CVE-2018-6101: Insufficient protection of remote debugging prototol in\n DevTools\n - CVE-2018-6102: URL spoof in Omnibox\n - CVE-2018-6103: UI spoof in Permissions\n - CVE-2018-6104: URL spoof in Omnibox\n - CVE-2018-6105: URL spoof in Omnibox\n - CVE-2018-6106: Incorrect handling of promises in V8\n - CVE-2018-6107: URL spoof in Omnibox\n - CVE-2018-6108: URL spoof in Omnibox\n - CVE-2018-6109: Incorrect handling of files by FileAPI\n - CVE-2018-6110: Incorrect handling of plaintext files via file://\n - CVE-2018-6111: Heap-use-after-free in DevTools\n - CVE-2018-6112: Incorrect URL handling in DevTools\n - CVE-2018-6113: URL spoof in Navigation\n - CVE-2018-6114: CSP bypass\n - CVE-2018-6115: SmartScreen bypass in downloads\n - CVE-2018-6116: Incorrect low memory handling in WebAssembly\n - CVE-2018-6117: Confusing autofill settings\n - CVE-2017-11215: Use after free in Flash\n - CVE-2017-11225: Use after free in Flash\n - CVE-2018-6060: Use after free in Blink\n - CVE-2018-6061: Race condition in V8\n - CVE-2018-6062: Heap buffer overflow in Skia\n - CVE-2018-6057: Incorrect permissions on shared memory\n - CVE-2018-6063: Incorrect permissions on shared memory\n - CVE-2018-6064: Type confusion in V8\n - CVE-2018-6065: Integer overflow in V8\n - CVE-2018-6066: Same Origin Bypass via canvas\n - CVE-2018-6067: Buffer overflow in Skia\n - CVE-2018-6068: Object lifecycle issues in Chrome Custom Tab\n - CVE-2018-6069: Stack buffer overflow in Skia\n - CVE-2018-6070: CSP bypass through extensions\n - CVE-2018-6071: Heap bufffer overflow in Skia\n - CVE-2018-6072: Integer overflow in PDFium\n - CVE-2018-6073: Heap bufffer overflow in WebGL\n - CVE-2018-6074: Mark-of-the-Web bypass\n - CVE-2018-6075: Overly permissive cross origin downloads\n - CVE-2018-6076: Incorrect handling of URL fragment identifiers in Blink\n - CVE-2018-6077: Timing attack using SVG filters\n - CVE-2018-6078: URL Spoof in OmniBox\n - CVE-2018-6079: Information disclosure via texture data in WebGL\n - CVE-2018-6080: Information disclosure in IPC call\n - CVE-2018-6081: XSS in interstitials\n - CVE-2018-6082: Circumvention of port blocking\n - CVE-2018-6083: Incorrect processing of AppManifests\n - bsc#1086124: Various fixes from internal audits, fuzzing and other\n initiatives\n\n This update also supports mitigation against the Spectre vulnerabilities:\n\n "Strict site isolation" is disabled for most users and can be turned on\n via: chrome://flags/#enable-site-per-process\n\n This feature is undergoing a small percentage trial. Out out of the trial\n is possible via: chrome://flags/#site-isolation-trial-opt-out\n\n", "published": "2018-05-09T15:07:28", "modified": "2018-05-09T15:07:28", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://lists.opensuse.org/opensuse-security-announce/2018-05/msg00009.html", "reporter": "Suse", "references": ["https://bugzilla.suse.com/1091288", "https://bugzilla.suse.com/1086124", "https://bugzilla.suse.com/1084296", "https://bugzilla.suse.com/1090000"], "cvelist": ["CVE-2018-6069", "CVE-2018-6078", "CVE-2018-6097", "CVE-2018-6103", "CVE-2018-6081", "CVE-2018-6099", "CVE-2017-11215", "CVE-2018-6113", "CVE-2018-6080", "CVE-2018-6091", "CVE-2018-6104", "CVE-2018-6096", "CVE-2018-6083", "CVE-2018-6100", "CVE-2018-6082", "CVE-2018-6057", "CVE-2018-6070", "CVE-2018-6074", "CVE-2018-6098", "CVE-2018-6112", "CVE-2018-6110", "CVE-2018-6108", "CVE-2018-6102", "CVE-2018-6114", "CVE-2018-6117", "CVE-2018-6118", "CVE-2018-6109", "CVE-2018-6073", "CVE-2018-6115", "CVE-2018-6095", "CVE-2018-6105", "CVE-2018-6093", "CVE-2018-6087", "CVE-2018-6061", "CVE-2018-6116", "CVE-2018-6106", "CVE-2018-6090", "CVE-2018-6072", "CVE-2018-6068", "CVE-2018-6088", "CVE-2018-6094", "CVE-2018-6065", "CVE-2018-6089", "CVE-2017-11225", "CVE-2018-6062", "CVE-2018-6101", "CVE-2018-6107", "CVE-2018-6086", "CVE-2018-6067", "CVE-2018-6092", "CVE-2018-6071", "CVE-2018-6066", "CVE-2018-6075", "CVE-2018-6064", "CVE-2018-6077", "CVE-2018-6076", "CVE-2018-6111", "CVE-2018-6085", "CVE-2018-6079", "CVE-2018-6060", "CVE-2018-6063"], "type": "suse", "lastseen": "2018-05-09T17:55:56", "edition": 1, "viewCount": 244, "enchantments": {"score": {"value": 6.7, "vector": "NONE", "modified": "2018-05-09T17:55:56", "rev": 2}, "dependencies": {"references": [{"type": "openvas", "idList": ["OPENVAS:1361412562310851718", "OPENVAS:1361412562310812819", "OPENVAS:1361412562310812818", "OPENVAS:1361412562310813096", "OPENVAS:1361412562310704182", "OPENVAS:1361412562310813094", "OPENVAS:1361412562310813095", "OPENVAS:1361412562310874648", "OPENVAS:1361412562310851732", "OPENVAS:1361412562310874635"]}, {"type": "debian", "idList": ["DEBIAN:DSA-4182-1:617C4"]}, {"type": "nessus", "idList": ["GOOGLE_CHROME_66_0_3359_117.NASL", "MACOSX_GOOGLE_CHROME_65_0_3325_107.NASL", "OPENSUSE-2018-264.NASL", "OPENSUSE-2018-381.NASL", "REDHAT-RHSA-2018-1195.NASL", "MACOSX_GOOGLE_CHROME_66_0_3359_117.NASL", "GENTOO_GLSA-201804-22.NASL", "DEBIAN_DSA-4182.NASL", "FREEBSD_PKG_555AF07422B911E8979954EE754AF08E.NASL", "FREEBSD_PKG_36FF7A7447B111E8A7D654E1AD544088.NASL"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2018:1042-1", "OPENSUSE-SU-2018:0704-1", "OPENSUSE-SU-2018:1437-1"]}, {"type": "kaspersky", "idList": ["KLA11204", "KLA11232"]}, {"type": "freebsd", "idList": ["36FF7A74-47B1-11E8-A7D6-54E1AD544088", "555AF074-22B9-11E8-9799-54EE754AF08E"]}, {"type": "gentoo", "idList": ["GLSA-201804-22", "GLSA-201803-05"]}, {"type": "redhat", "idList": ["RHSA-2018:1195", "RHSA-2018:0484"]}, {"type": "fedora", "idList": ["FEDORA:0F54C60BE23D", "FEDORA:3A1D860C5983", "FEDORA:CEA406042D4A", "FEDORA:D76706163D5A", "FEDORA:855A9625F2AD", "FEDORA:D5E9D604E466", "FEDORA:BD8776075EF7"]}, {"type": "cve", "idList": ["CVE-2018-6064", "CVE-2018-6099", "CVE-2018-6069", "CVE-2018-6105", "CVE-2017-11225", "CVE-2018-6057", "CVE-2018-6065", "CVE-2018-6090", "CVE-2017-11215", "CVE-2018-6066"]}], "modified": "2018-05-09T17:55:56", "rev": 2}, "vulnersScore": 6.7}, "affectedPackage": [{"OS": "SUSE Package Hub for SUSE Linux Enterprise", "OSVersion": "12", "arch": "x86_64", "operator": "lt", "packageFilename": "chromium-debugsource-66.0.3359.139-2.1.x86_64.rpm", "packageName": "chromium-debugsource", "packageVersion": "66.0.3359.139-2.1"}, {"OS": "SUSE Package Hub for SUSE Linux Enterprise", "OSVersion": "12", "arch": "x86_64", "operator": "lt", "packageFilename": "chromium-debuginfo-66.0.3359.139-2.1.x86_64.rpm", "packageName": "chromium-debuginfo", "packageVersion": "66.0.3359.139-2.1"}, {"OS": "SUSE Package Hub for SUSE Linux Enterprise", "OSVersion": "12", "arch": "x86_64", "operator": "lt", "packageFilename": "chromedriver-66.0.3359.139-2.1.x86_64.rpm", "packageName": "chromedriver", "packageVersion": "66.0.3359.139-2.1"}, {"OS": "SUSE Package Hub for SUSE Linux Enterprise", "OSVersion": "12", "arch": "x86_64", "operator": "lt", "packageFilename": "chromium-66.0.3359.139-2.1.x86_64.rpm", "packageName": "chromium", "packageVersion": "66.0.3359.139-2.1"}, {"OS": "SUSE Package Hub for SUSE Linux Enterprise", "OSVersion": "12", "arch": "x86_64", "operator": "lt", "packageFilename": "chromedriver-debuginfo-66.0.3359.139-2.1.x86_64.rpm", "packageName": "chromedriver-debuginfo", "packageVersion": "66.0.3359.139-2.1"}]}
{"openvas": [{"lastseen": "2019-07-04T18:56:12", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-6069", "CVE-2018-6078", "CVE-2018-6097", "CVE-2018-6103", "CVE-2018-6081", "CVE-2018-6099", "CVE-2018-6113", "CVE-2018-6080", "CVE-2018-6091", "CVE-2018-6104", "CVE-2018-6096", "CVE-2018-6083", "CVE-2018-6100", "CVE-2018-6082", "CVE-2018-6057", "CVE-2018-6070", "CVE-2018-6074", "CVE-2018-6098", "CVE-2018-6112", "CVE-2018-6110", "CVE-2018-6108", "CVE-2018-6102", "CVE-2018-6056", "CVE-2018-6114", "CVE-2018-6117", "CVE-2018-6109", "CVE-2018-6073", "CVE-2018-6095", "CVE-2018-6105", "CVE-2018-6093", "CVE-2018-6087", "CVE-2018-6061", "CVE-2018-6116", "CVE-2018-6106", "CVE-2018-6090", "CVE-2018-6072", "CVE-2018-6068", "CVE-2018-6088", "CVE-2018-6094", "CVE-2018-6065", "CVE-2018-6089", "CVE-2018-6062", "CVE-2018-6101", "CVE-2018-6107", "CVE-2018-6086", "CVE-2018-6067", "CVE-2018-6092", "CVE-2018-6071", "CVE-2018-6066", "CVE-2018-6075", "CVE-2018-6064", "CVE-2018-6077", "CVE-2018-6076", "CVE-2018-6111", "CVE-2018-6085", "CVE-2018-6079", "CVE-2018-6060", "CVE-2018-6063"], "description": "Several vulnerabilities have been discovered in the chromium web browser.\n\nCVE-2018-6056\nlokihardt discovered an error in the v8 javascript library.\n\nCVE-2018-6057\nGal Beniamini discovered errors related to shared memory permissions.\n\nCVE-2018-6060\nOmair discovered a use-after-free issue in blink/webkit.\n\nCVE-2018-6061\nGuang Gong discovered a race condition in the v8 javascript library.\n\nDescription truncated. Please see the references for more information.", "modified": "2019-07-04T00:00:00", "published": "2018-04-28T00:00:00", "id": "OPENVAS:1361412562310704182", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310704182", "type": "openvas", "title": "Debian Security Advisory DSA 4182-1 (chromium-browser - security update)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Auto-generated from advisory DSA 4182-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2018 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License as published by\n# the Free Software Foundation; either version 2 of the License, or\n# (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.704182\");\n script_version(\"2019-07-04T09:25:28+0000\");\n script_cve_id(\"CVE-2018-6056\", \"CVE-2018-6057\", \"CVE-2018-6060\", \"CVE-2018-6061\", \"CVE-2018-6062\",\n \"CVE-2018-6063\", \"CVE-2018-6064\", \"CVE-2018-6065\", \"CVE-2018-6066\", \"CVE-2018-6067\",\n \"CVE-2018-6068\", \"CVE-2018-6069\", \"CVE-2018-6070\", \"CVE-2018-6071\", \"CVE-2018-6072\",\n \"CVE-2018-6073\", \"CVE-2018-6074\", \"CVE-2018-6075\", \"CVE-2018-6076\", \"CVE-2018-6077\",\n \"CVE-2018-6078\", \"CVE-2018-6079\", \"CVE-2018-6080\", \"CVE-2018-6081\", \"CVE-2018-6082\",\n \"CVE-2018-6083\", \"CVE-2018-6085\", \"CVE-2018-6086\", \"CVE-2018-6087\", \"CVE-2018-6088\",\n \"CVE-2018-6089\", \"CVE-2018-6090\", \"CVE-2018-6091\", \"CVE-2018-6092\", \"CVE-2018-6093\",\n \"CVE-2018-6094\", \"CVE-2018-6095\", \"CVE-2018-6096\", \"CVE-2018-6097\", \"CVE-2018-6098\",\n \"CVE-2018-6099\", \"CVE-2018-6100\", \"CVE-2018-6101\", \"CVE-2018-6102\", \"CVE-2018-6103\",\n \"CVE-2018-6104\", \"CVE-2018-6105\", \"CVE-2018-6106\", \"CVE-2018-6107\", \"CVE-2018-6108\",\n \"CVE-2018-6109\", \"CVE-2018-6110\", \"CVE-2018-6111\", \"CVE-2018-6112\", \"CVE-2018-6113\",\n \"CVE-2018-6114\", \"CVE-2018-6116\", \"CVE-2018-6117\");\n script_name(\"Debian Security Advisory DSA 4182-1 (chromium-browser - security update)\");\n script_tag(name:\"last_modification\", value:\"2019-07-04 09:25:28 +0000 (Thu, 04 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-04-28 00:00:00 +0200 (Sat, 28 Apr 2018)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"https://www.debian.org/security/2018/dsa-4182.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2018 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB9\");\n script_tag(name:\"affected\", value:\"chromium-browser on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the oldstable distribution (jessie), security support for chromium\nhas been discontinued.\n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 66.0.3359.117-1~deb9u1.\n\nWe recommend that you upgrade your chromium-browser packages.\");\n\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/chromium-browser\");\n script_tag(name:\"summary\", value:\"Several vulnerabilities have been discovered in the chromium web browser.\n\nCVE-2018-6056\nlokihardt discovered an error in the v8 javascript library.\n\nCVE-2018-6057\nGal Beniamini discovered errors related to shared memory permissions.\n\nCVE-2018-6060\nOmair discovered a use-after-free issue in blink/webkit.\n\nCVE-2018-6061\nGuang Gong discovered a race condition in the v8 javascript library.\n\nDescription truncated. Please see the references for more information.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"chromedriver\", ver:\"66.0.3359.117-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"chromium\", ver:\"66.0.3359.117-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"chromium-driver\", ver:\"66.0.3359.117-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"chromium-l10n\", ver:\"66.0.3359.117-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"chromium-shell\", ver:\"66.0.3359.117-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"chromium-widevine\", ver:\"66.0.3359.117-1~deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-19T21:54:08", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-6097", "CVE-2018-6103", "CVE-2018-6099", "CVE-2018-6113", "CVE-2018-6091", "CVE-2018-6104", "CVE-2018-6096", "CVE-2018-6100", "CVE-2018-6098", "CVE-2018-6112", "CVE-2018-6110", "CVE-2018-6108", "CVE-2018-6102", "CVE-2018-6114", "CVE-2018-6117", "CVE-2018-6109", "CVE-2018-6115", "CVE-2018-6095", "CVE-2018-6105", "CVE-2018-6093", "CVE-2018-6087", "CVE-2018-6116", "CVE-2018-6106", "CVE-2018-6090", "CVE-2018-6088", "CVE-2018-6094", "CVE-2018-6089", "CVE-2018-6101", "CVE-2018-6107", "CVE-2018-6086", "CVE-2018-6092", "CVE-2018-6111", "CVE-2018-6085"], "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2018-04-18T00:00:00", "id": "OPENVAS:1361412562310813095", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310813095", "type": "openvas", "title": "Google Chrome Security Updates(stable-channel-update-for-desktop-2018-04)-Linux", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Security Updates(stable-channel-update-for-desktop-2018-04)-Linux\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.813095\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2018-6085\", \"CVE-2018-6086\", \"CVE-2018-6087\", \"CVE-2018-6088\",\n \"CVE-2018-6089\", \"CVE-2018-6090\", \"CVE-2018-6091\", \"CVE-2018-6092\",\n \"CVE-2018-6093\", \"CVE-2018-6094\", \"CVE-2018-6095\", \"CVE-2018-6096\",\n \"CVE-2018-6097\", \"CVE-2018-6098\", \"CVE-2018-6099\", \"CVE-2018-6100\",\n \"CVE-2018-6101\", \"CVE-2018-6102\", \"CVE-2018-6103\", \"CVE-2018-6104\",\n \"CVE-2018-6105\", \"CVE-2018-6106\", \"CVE-2018-6107\", \"CVE-2018-6108\",\n \"CVE-2018-6109\", \"CVE-2018-6110\", \"CVE-2018-6111\", \"CVE-2018-6112\",\n \"CVE-2018-6113\", \"CVE-2018-6114\", \"CVE-2018-6115\", \"CVE-2018-6116\",\n \"CVE-2018-6117\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-04-18 14:30:38 +0530 (Wed, 18 Apr 2018)\");\n script_name(\"Google Chrome Security Updates(stable-channel-update-for-desktop-2018-04)-Linux\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Multiple use after free errors in 'Disk Cache', 'WebAssembly' and 'PDFium'.\n\n - A same origin policy bypass error in Service Worker.\n\n - A heap buffer overflow error in Skia.\n\n - An incorrect handling of plug-ins by Service Worker.\n\n - An integer overflow error in WebAssembly.\n\n - Multiple UI spoofing errors.\n\n - Multiple URL spoofing errors in Omnibox.\n\n - An insufficient protection of remote debugging prototol in DevTools.\n\n - An incorrect handling of promises in V8, files by FileAPI, plaintext files\n via file://.\n\n - An incorrect low memory handling in WebAssembly.\n\n - A content security policy bypass error.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to conduct spoofing attacks, bypass security restrictions, cause\n denial of service condition and also some unspecified impacts.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version prior to 66.0.3359.117 on Linux.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 66.0.3359.117 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_lin.nasl\");\n script_mandatory_keys(\"Google-Chrome/Linux/Ver\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE)) exit(0);\nvers = infos['version'];\npath = infos['location'];\n\nif(version_is_less(version:vers, test_version:\"66.0.3359.117\"))\n{\n report = report_fixed_ver(installed_version:vers, fixed_version:\"66.0.3359.117\", install_path:path);\n security_message(data:report);\n exit(0);\n}\nexit(0);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-19T21:52:44", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-6097", "CVE-2018-6103", "CVE-2018-6099", "CVE-2018-6113", "CVE-2018-6091", "CVE-2018-6104", "CVE-2018-6096", "CVE-2018-6100", "CVE-2018-6098", "CVE-2018-6112", "CVE-2018-6110", "CVE-2018-6108", "CVE-2018-6102", "CVE-2018-6114", "CVE-2018-6117", "CVE-2018-6109", "CVE-2018-6115", "CVE-2018-6095", "CVE-2018-6105", "CVE-2018-6093", "CVE-2018-6087", "CVE-2018-6116", "CVE-2018-6106", "CVE-2018-6090", "CVE-2018-6088", "CVE-2018-6094", "CVE-2018-6089", "CVE-2018-6101", "CVE-2018-6107", "CVE-2018-6086", "CVE-2018-6092", "CVE-2018-6111", "CVE-2018-6085"], "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2018-04-18T00:00:00", "id": "OPENVAS:1361412562310813094", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310813094", "type": "openvas", "title": "Google Chrome Security Updates(stable-channel-update-for-desktop-2018-04)-Windows", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Security Updates(stable-channel-update-for-desktop-2018-04)-Windows\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.813094\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2018-6085\", \"CVE-2018-6086\", \"CVE-2018-6087\", \"CVE-2018-6088\",\n \"CVE-2018-6089\", \"CVE-2018-6090\", \"CVE-2018-6091\", \"CVE-2018-6092\",\n \"CVE-2018-6093\", \"CVE-2018-6094\", \"CVE-2018-6095\", \"CVE-2018-6096\",\n \"CVE-2018-6097\", \"CVE-2018-6098\", \"CVE-2018-6099\", \"CVE-2018-6100\",\n \"CVE-2018-6101\", \"CVE-2018-6102\", \"CVE-2018-6103\", \"CVE-2018-6104\",\n \"CVE-2018-6105\", \"CVE-2018-6106\", \"CVE-2018-6107\", \"CVE-2018-6108\",\n \"CVE-2018-6109\", \"CVE-2018-6110\", \"CVE-2018-6111\", \"CVE-2018-6112\",\n \"CVE-2018-6113\", \"CVE-2018-6114\", \"CVE-2018-6115\", \"CVE-2018-6116\",\n \"CVE-2018-6117\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-04-18 14:30:38 +0530 (Wed, 18 Apr 2018)\");\n script_name(\"Google Chrome Security Updates(stable-channel-update-for-desktop-2018-04)-Windows\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Multiple use after free errors in 'Disk Cache', 'WebAssembly' and 'PDFium'.\n\n - A same origin policy bypass error in Service Worker.\n\n - A heap buffer overflow error in Skia.\n\n - An incorrect handling of plug-ins by Service Worker.\n\n - An integer overflow error in WebAssembly.\n\n - Multiple UI spoofing errors.\n\n - Multiple URL spoofing errors in Omnibox.\n\n - An insufficient protection of remote debugging prototol in DevTools.\n\n - An incorrect handling of promises in V8, files by FileAPI, plaintext files\n via 'file://'.\n\n - An incorrect low memory handling in WebAssembly.\n\n - A content security policy bypass error.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to conduct spoofing attacks, bypass security restrictions, cause\n denial of service condition and also some unspecified impacts.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version prior to 66.0.3359.117 on Windows\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 66.0.3359.117 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_xref(name:\"URL\", value:\"https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_portable_win.nasl\");\n script_mandatory_keys(\"GoogleChrome/Win/Ver\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE)) exit(0);\nvers = infos['version'];\npath = infos['location'];\n\nif(version_is_less(version:vers, test_version:\"66.0.3359.117\"))\n{\n report = report_fixed_ver(installed_version:vers, fixed_version:\"66.0.3359.117\", install_path:path);\n security_message(data:report);\n exit(0);\n}\nexit(0);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-19T21:52:13", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-6084", "CVE-2018-6097", "CVE-2018-6103", "CVE-2018-6099", "CVE-2018-6113", "CVE-2018-6091", "CVE-2018-6104", "CVE-2018-6096", "CVE-2018-6100", "CVE-2018-6098", "CVE-2018-6112", "CVE-2018-6110", "CVE-2018-6108", "CVE-2018-6102", "CVE-2018-6114", "CVE-2018-6117", "CVE-2018-6109", "CVE-2018-6115", "CVE-2018-6095", "CVE-2018-6105", "CVE-2018-6093", "CVE-2018-6087", "CVE-2018-6116", "CVE-2018-6106", "CVE-2018-6090", "CVE-2018-6088", "CVE-2018-6094", "CVE-2018-6089", "CVE-2018-6101", "CVE-2018-6107", "CVE-2018-6086", "CVE-2018-6092", "CVE-2018-6111", "CVE-2018-6085"], "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2018-04-18T00:00:00", "id": "OPENVAS:1361412562310813096", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310813096", "type": "openvas", "title": "Google Chrome Security Updates(stable-channel-update-for-desktop-2018-04)-MAC OS X", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Security Updates(stable-channel-update-for-desktop-2018-04)-MAC OS X\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.813096\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2018-6085\", \"CVE-2018-6086\", \"CVE-2018-6087\", \"CVE-2018-6088\",\n \"CVE-2018-6089\", \"CVE-2018-6090\", \"CVE-2018-6091\", \"CVE-2018-6092\",\n \"CVE-2018-6093\", \"CVE-2018-6094\", \"CVE-2018-6095\", \"CVE-2018-6096\",\n \"CVE-2018-6097\", \"CVE-2018-6098\", \"CVE-2018-6099\", \"CVE-2018-6100\",\n \"CVE-2018-6101\", \"CVE-2018-6102\", \"CVE-2018-6103\", \"CVE-2018-6104\",\n \"CVE-2018-6105\", \"CVE-2018-6106\", \"CVE-2018-6107\", \"CVE-2018-6108\",\n \"CVE-2018-6109\", \"CVE-2018-6110\", \"CVE-2018-6111\", \"CVE-2018-6112\",\n \"CVE-2018-6113\", \"CVE-2018-6114\", \"CVE-2018-6115\", \"CVE-2018-6116\",\n \"CVE-2018-6117\", \"CVE-2018-6084\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-04-18 14:30:38 +0530 (Wed, 18 Apr 2018)\");\n script_name(\"Google Chrome Security Updates(stable-channel-update-for-desktop-2018-04)-MAC OS X\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Multiple use after free errors in 'Disk Cache', 'WebAssembly' and 'PDFium'.\n\n - A same origin policy bypass error in Service Worker.\n\n - A heap buffer overflow error in Skia.\n\n - An incorrect handling of plug-ins by Service Worker.\n\n - An integer overflow error in WebAssembly.\n\n - Multiple UI spoofing errors.\n\n - Multiple URL spoofing errors in Omnibox.\n\n - An insufficient protection of remote debugging prototol in DevTools.\n\n - An incorrect handling of promises in V8, files by FileAPI, plaintext files\n via 'file://'.\n\n - An incorrect low memory handling in WebAssembly.\n\n - A content security policy bypass error.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to conduct spoofing attacks, bypass security restrictions, cause\n denial of service condition and also some unspecified impacts.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version\n prior to 66.0.3359.117 on MAC OS X\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 66.0.3359.117 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_macosx.nasl\");\n script_mandatory_keys(\"GoogleChrome/MacOSX/Version\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE)) exit(0);\nvers = infos['version'];\npath = infos['location'];\n\nif(version_is_less(version:vers, test_version:\"66.0.3359.117\"))\n{\n report = report_fixed_ver(installed_version:vers, fixed_version:\"66.0.3359.117\", install_path:path);\n security_message(data:report);\n exit(0);\n}\nexit(0);\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-01-31T17:36:01", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-6097", "CVE-2018-6103", "CVE-2018-6099", "CVE-2018-6113", "CVE-2018-6091", "CVE-2018-6104", "CVE-2018-6096", "CVE-2018-6100", "CVE-2018-6098", "CVE-2018-6112", "CVE-2018-6110", "CVE-2018-6108", "CVE-2018-6102", "CVE-2018-6114", "CVE-2018-6117", "CVE-2018-6109", "CVE-2018-6115", "CVE-2018-6095", "CVE-2018-6105", "CVE-2018-6093", "CVE-2018-6087", "CVE-2018-6116", "CVE-2018-6106", "CVE-2018-6090", "CVE-2018-6088", "CVE-2018-6094", "CVE-2018-6089", "CVE-2018-6101", "CVE-2018-6107", "CVE-2018-6086", "CVE-2018-6092", "CVE-2018-6111", "CVE-2018-6085"], "description": "The remote host is missing an update for the ", "modified": "2020-01-31T00:00:00", "published": "2018-04-21T00:00:00", "id": "OPENVAS:1361412562310851732", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310851732", "type": "openvas", "title": "openSUSE: Security Advisory for chromium (openSUSE-SU-2018:1042-1)", "sourceData": "# Copyright (C) 2018 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.851732\");\n script_version(\"2020-01-31T08:23:39+0000\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:23:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2018-04-21 08:59:09 +0200 (Sat, 21 Apr 2018)\");\n script_cve_id(\"CVE-2018-6085\", \"CVE-2018-6086\", \"CVE-2018-6087\", \"CVE-2018-6088\",\n \"CVE-2018-6089\", \"CVE-2018-6090\", \"CVE-2018-6091\", \"CVE-2018-6092\",\n \"CVE-2018-6093\", \"CVE-2018-6094\", \"CVE-2018-6095\", \"CVE-2018-6096\",\n \"CVE-2018-6097\", \"CVE-2018-6098\", \"CVE-2018-6099\", \"CVE-2018-6100\",\n \"CVE-2018-6101\", \"CVE-2018-6102\", \"CVE-2018-6103\", \"CVE-2018-6104\",\n \"CVE-2018-6105\", \"CVE-2018-6106\", \"CVE-2018-6107\", \"CVE-2018-6108\",\n \"CVE-2018-6109\", \"CVE-2018-6110\", \"CVE-2018-6111\", \"CVE-2018-6112\",\n \"CVE-2018-6113\", \"CVE-2018-6114\", \"CVE-2018-6115\", \"CVE-2018-6116\",\n \"CVE-2018-6117\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"openSUSE: Security Advisory for chromium (openSUSE-SU-2018:1042-1)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'chromium'\n package(s) announced via the referenced advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"This update for Chromium to version 66.0.3359.117 fixes the following\n issues:\n\n Security issues fixed (boo#1090000):\n\n - CVE-2018-6085: Use after free in Disk Cache\n\n - CVE-2018-6086: Use after free in Disk Cache\n\n - CVE-2018-6087: Use after free in WebAssembly\n\n - CVE-2018-6088: Use after free in PDFium\n\n - CVE-2018-6089: Same origin policy bypass in Service Worker\n\n - CVE-2018-6090: Heap buffer overflow in Skia\n\n - CVE-2018-6091: Incorrect handling of plug-ins by Service Worker\n\n - CVE-2018-6092: Integer overflow in WebAssembly\n\n - CVE-2018-6093: Same origin bypass in Service Worker\n\n - CVE-2018-6094: Exploit hardening regression in Oilpan\n\n - CVE-2018-6095: Lack of meaningful user interaction requirement before\n file upload\n\n - CVE-2018-6096: Fullscreen UI spoof\n\n - CVE-2018-6097: Fullscreen UI spoof\n\n - CVE-2018-6098: URL spoof in Omnibox\n\n - CVE-2018-6099: CORS bypass in ServiceWorker\n\n - CVE-2018-6100: URL spoof in Omnibox\n\n - CVE-2018-6101: Insufficient protection of remote debugging prototol in\n DevTools\n\n - CVE-2018-6102: URL spoof in Omnibox\n\n - CVE-2018-6103: UI spoof in Permissions\n\n - CVE-2018-6104: URL spoof in Omnibox\n\n - CVE-2018-6105: URL spoof in Omnibox\n\n - CVE-2018-6106: Incorrect handling of promises in V8\n\n - CVE-2018-6107: URL spoof in Omnibox\n\n - CVE-2018-6108: URL spoof in Omnibox\n\n - CVE-2018-6109: Incorrect handling of files by FileAPI\n\n - CVE-2018-6110: Incorrect handling of plaintext files via file://\n\n - CVE-2018-6111: Heap-use-after-free in DevTools\n\n - CVE-2018-6112: Incorrect URL handling in DevTools\n\n - CVE-2018-6113: URL spoof in Navigation\n\n - CVE-2018-6114: CSP bypass\n\n - CVE-2018-6115: SmartScreen bypass in downloads\n\n - CVE-2018-6116: Incorrect low memory handling in WebAssembly\n\n - CVE-2018-6117: Confusing autofill settings\n\n - Various fixes from internal audits, fuzzing and other initiatives\n\n This update also supports mitigation against the Spectre vulnerabilities:\n 'Strict site isolation' is disabled for most users and can be turned on\n via: chrome://flags/#enable-site-per-process This feature is undergoing a\n small percentage trial. Out out of the trial is possible via:\n chrome://flags/#site-isolation-trial-opt-out\n\n The following other changes are included:\n\n - distrust certificates issued by Symantec before 2016-06-01\n\n - add option to export saved passwords\n\n - Reduce videos that auto-play with sound\n\n - boo#1086199: Fix UI freezing when loading/scaling down large images\n\n This update also contains a number of upstream bug fixes and improvements.\n\n Patch Instructions:\n\n To install this openSUSE Security Update use the S ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n\n script_tag(name:\"affected\", value:\"chromium on openSUSE Leap 42.3\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2018:1042-1\");\n script_xref(name:\"URL\", value:\"https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00063.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSELeap42\\.3\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap42.3\") {\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver\", rpm:\"chromedriver~66.0.3359.117~152.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver-debuginfo\", rpm:\"chromedriver-debuginfo~66.0.3359.117~152.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium\", rpm:\"chromium~66.0.3359.117~152.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debuginfo\", rpm:\"chromium-debuginfo~66.0.3359.117~152.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debugsource\", rpm:\"chromium-debugsource~66.0.3359.117~152.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:33:05", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-6097", "CVE-2018-6103", "CVE-2018-6099", "CVE-2018-6120", "CVE-2018-6113", "CVE-2018-6091", "CVE-2018-6104", "CVE-2018-6096", "CVE-2018-6100", "CVE-2018-6098", "CVE-2018-6112", "CVE-2018-6110", "CVE-2018-6108", "CVE-2018-6102", "CVE-2018-6114", "CVE-2018-6117", "CVE-2018-6118", "CVE-2018-6109", "CVE-2018-6115", "CVE-2018-6122", "CVE-2018-6095", "CVE-2018-6105", "CVE-2018-6093", "CVE-2018-6087", "CVE-2018-6116", "CVE-2018-6106", "CVE-2018-6090", "CVE-2018-6088", "CVE-2018-6094", "CVE-2018-6089", "CVE-2018-6101", "CVE-2018-6107", "CVE-2018-6086", "CVE-2018-6092", "CVE-2018-6121", "CVE-2018-6111", "CVE-2018-6085"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2018-06-05T00:00:00", "id": "OPENVAS:1361412562310874635", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310874635", "type": "openvas", "title": "Fedora Update for chromium FEDORA-2018-94e1bc8c23", "sourceData": " ###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2018_94e1bc8c23_chromium_fc28.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for chromium FEDORA-2018-94e1bc8c23\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.874635\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-06-05 14:03:12 +0530 (Tue, 05 Jun 2018)\");\n script_cve_id(\"CVE-2018-6085\", \"CVE-2018-6086\", \"CVE-2018-6087\", \"CVE-2018-6088\",\n \"CVE-2018-6089\", \"CVE-2018-6090\", \"CVE-2018-6091\", \"CVE-2018-6092\",\n \"CVE-2018-6093\", \"CVE-2018-6094\", \"CVE-2018-6095\", \"CVE-2018-6096\",\n \"CVE-2018-6097\", \"CVE-2018-6098\", \"CVE-2018-6099\", \"CVE-2018-6100\",\n \"CVE-2018-6101\", \"CVE-2018-6102\", \"CVE-2018-6103\", \"CVE-2018-6104\",\n \"CVE-2018-6105\", \"CVE-2018-6106\", \"CVE-2018-6107\", \"CVE-2018-6108\",\n \"CVE-2018-6109\", \"CVE-2018-6110\", \"CVE-2018-6111\", \"CVE-2018-6112\",\n \"CVE-2018-6113\", \"CVE-2018-6114\", \"CVE-2018-6116\", \"CVE-2018-6117\",\n \"CVE-2018-6118\", \"CVE-2018-6121\", \"CVE-2018-6122\", \"CVE-2018-6120\",\n \"CVE-2018-6115\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for chromium FEDORA-2018-94e1bc8c23\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'chromium'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\non the target host.\");\n script_tag(name:\"affected\", value:\"chromium on Fedora 28\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"FEDORA\", value:\"2018-94e1bc8c23\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FV3FJ4MT2NVIWCXYD5H43NB4FENSAMGN\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC28\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC28\")\n{\n\n if ((res = isrpmvuln(pkg:\"chromium\", rpm:\"chromium~66.0.3359.181~2.fc28\", rls:\"FC28\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:32:55", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-6097", "CVE-2018-6103", "CVE-2018-6099", "CVE-2018-6120", "CVE-2018-6113", "CVE-2018-6091", "CVE-2018-6104", "CVE-2018-6096", "CVE-2018-6100", "CVE-2018-6098", "CVE-2018-6112", "CVE-2018-6110", "CVE-2018-6108", "CVE-2018-6102", "CVE-2018-6114", "CVE-2018-6117", "CVE-2018-6118", "CVE-2018-6109", "CVE-2018-6115", "CVE-2018-6122", "CVE-2018-6095", "CVE-2018-6105", "CVE-2018-6093", "CVE-2018-6087", "CVE-2018-6116", "CVE-2018-6106", "CVE-2018-6090", "CVE-2018-6088", "CVE-2018-6094", "CVE-2018-6089", "CVE-2018-6101", "CVE-2018-6107", "CVE-2018-6086", "CVE-2018-6092", "CVE-2018-6121", "CVE-2018-6111", "CVE-2018-6085"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2018-06-06T00:00:00", "id": "OPENVAS:1361412562310874648", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310874648", "type": "openvas", "title": "Fedora Update for chromium FEDORA-2018-812b5d5a71", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2018_812b5d5a71_chromium_fc27.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for chromium FEDORA-2018-812b5d5a71\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.874648\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-06-06 10:24:11 +0200 (Wed, 06 Jun 2018)\");\n script_cve_id(\"CVE-2018-6085\", \"CVE-2018-6086\", \"CVE-2018-6087\", \"CVE-2018-6088\",\n \"CVE-2018-6089\", \"CVE-2018-6090\", \"CVE-2018-6091\", \"CVE-2018-6092\",\n \"CVE-2018-6093\", \"CVE-2018-6094\", \"CVE-2018-6095\", \"CVE-2018-6096\",\n \"CVE-2018-6097\", \"CVE-2018-6098\", \"CVE-2018-6099\", \"CVE-2018-6100\",\n \"CVE-2018-6101\", \"CVE-2018-6102\", \"CVE-2018-6103\", \"CVE-2018-6104\",\n \"CVE-2018-6105\", \"CVE-2018-6106\", \"CVE-2018-6107\", \"CVE-2018-6108\",\n \"CVE-2018-6109\", \"CVE-2018-6110\", \"CVE-2018-6111\", \"CVE-2018-6112\",\n \"CVE-2018-6113\", \"CVE-2018-6114\", \"CVE-2018-6116\", \"CVE-2018-6117\",\n \"CVE-2018-6118\", \"CVE-2018-6121\", \"CVE-2018-6122\", \"CVE-2018-6120\",\n \"CVE-2018-6115\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for chromium FEDORA-2018-812b5d5a71\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'chromium'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\non the target host.\");\n script_tag(name:\"affected\", value:\"chromium on Fedora 27\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"FEDORA\", value:\"2018-812b5d5a71\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N3R4UPGKKZ56KTGNOT2UBMDZTWJQWIM3\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC27\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC27\")\n{\n\n if ((res = isrpmvuln(pkg:\"chromium\", rpm:\"chromium~66.0.3359.181~2.fc27\", rls:\"FC27\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-31T17:37:36", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-6069", "CVE-2018-6078", "CVE-2018-6081", "CVE-2017-11215", "CVE-2018-6080", "CVE-2018-6083", "CVE-2018-6082", "CVE-2018-6057", "CVE-2018-6070", "CVE-2018-6074", "CVE-2018-6073", "CVE-2018-6061", "CVE-2018-6072", "CVE-2018-6068", "CVE-2018-6065", "CVE-2017-11225", "CVE-2018-6062", "CVE-2018-6067", "CVE-2018-6071", "CVE-2018-6066", "CVE-2018-6075", "CVE-2018-6064", "CVE-2018-6077", "CVE-2018-6076", "CVE-2018-6079", "CVE-2018-6060", "CVE-2018-6063"], "description": "The remote host is missing an update for the ", "modified": "2020-01-31T00:00:00", "published": "2018-03-17T00:00:00", "id": "OPENVAS:1361412562310851718", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310851718", "type": "openvas", "title": "openSUSE: Security Advisory for Chromium (openSUSE-SU-2018:0704-1)", "sourceData": "# Copyright (C) 2018 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.851718\");\n script_version(\"2020-01-31T08:23:39+0000\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:23:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2018-03-17 08:45:38 +0100 (Sat, 17 Mar 2018)\");\n script_cve_id(\"CVE-2017-11215\", \"CVE-2017-11225\", \"CVE-2018-6057\", \"CVE-2018-6060\",\n \"CVE-2018-6061\", \"CVE-2018-6062\", \"CVE-2018-6063\", \"CVE-2018-6064\",\n \"CVE-2018-6065\", \"CVE-2018-6066\", \"CVE-2018-6067\", \"CVE-2018-6068\",\n \"CVE-2018-6069\", \"CVE-2018-6070\", \"CVE-2018-6071\", \"CVE-2018-6072\",\n \"CVE-2018-6073\", \"CVE-2018-6074\", \"CVE-2018-6075\", \"CVE-2018-6076\",\n \"CVE-2018-6077\", \"CVE-2018-6078\", \"CVE-2018-6079\", \"CVE-2018-6080\",\n \"CVE-2018-6081\", \"CVE-2018-6082\", \"CVE-2018-6083\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"openSUSE: Security Advisory for Chromium (openSUSE-SU-2018:0704-1)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'Chromium'\n package(s) announced via the referenced advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"This update for Chromium to version 65.0.3325.162 fixes the following\n issues:\n\n - CVE-2017-11215: Use after free in Flash\n\n - CVE-2017-11225: Use after free in Flash\n\n - CVE-2018-6060: Use after free in Blink\n\n - CVE-2018-6061: Race condition in V8\n\n - CVE-2018-6062: Heap buffer overflow in Skia\n\n - CVE-2018-6057: Incorrect permissions on shared memory\n\n - CVE-2018-6063: Incorrect permissions on shared memory\n\n - CVE-2018-6064: Type confusion in V8\n\n - CVE-2018-6065: Integer overflow in V8\n\n - CVE-2018-6066: Same Origin Bypass via canvas\n\n - CVE-2018-6067: Buffer overflow in Skia\n\n - CVE-2018-6068: Object lifecycle issues in Chrome Custom Tab\n\n - CVE-2018-6069: Stack buffer overflow in Skia\n\n - CVE-2018-6070: CSP bypass through extensions\n\n - CVE-2018-6071: Heap buffer overflow in Skia\n\n - CVE-2018-6072: Integer overflow in PDFium\n\n - CVE-2018-6073: Heap buffer overflow in WebGL\n\n - CVE-2018-6074: Mark-of-the-Web bypass\n\n - CVE-2018-6075: Overly permissive cross origin downloads\n\n - CVE-2018-6076: Incorrect handling of URL fragment identifiers in Blink\n\n - CVE-2018-6077: Timing attack using SVG filters\n\n - CVE-2018-6078: URL Spoof in OmniBox\n\n - CVE-2018-6079: Information disclosure via texture data in WebGL\n\n - CVE-2018-6080: Information disclosure in IPC call\n\n - CVE-2018-6081: XSS in interstitials\n\n - CVE-2018-6082: Circumvention of port blocking\n\n - CVE-2018-6083: Incorrect processing of AppManifests\");\n\n script_tag(name:\"affected\", value:\"Chromium on openSUSE Leap 42.3\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2018:0704-1\");\n script_xref(name:\"URL\", value:\"https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00042.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSELeap42\\.3\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap42.3\") {\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver\", rpm:\"chromedriver~65.0.3325.162~146.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromedriver-debuginfo\", rpm:\"chromedriver-debuginfo~65.0.3325.162~146.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium\", rpm:\"chromium~65.0.3325.162~146.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debuginfo\", rpm:\"chromium-debuginfo~65.0.3325.162~146.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"chromium-debugsource\", rpm:\"chromium-debugsource~65.0.3325.162~146.1\", rls:\"openSUSELeap42.3\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-19T21:52:32", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-6069", "CVE-2018-6078", "CVE-2018-6081", "CVE-2018-6080", "CVE-2018-6083", "CVE-2018-6082", "CVE-2018-6057", "CVE-2018-6070", "CVE-2018-6074", "CVE-2018-6059", "CVE-2018-6073", "CVE-2018-6061", "CVE-2018-6072", "CVE-2018-6058", "CVE-2018-6068", "CVE-2018-6065", "CVE-2018-6062", "CVE-2018-6067", "CVE-2018-6071", "CVE-2018-6066", "CVE-2018-6075", "CVE-2018-6064", "CVE-2018-6077", "CVE-2018-6076", "CVE-2018-6079", "CVE-2018-6060", "CVE-2018-6063"], "description": "This host is installed with Google Chrome and is\n prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2018-03-07T00:00:00", "id": "OPENVAS:1361412562310812819", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310812819", "type": "openvas", "title": "Google Chrome Multiple Security Vulnerabilities Mar18 (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Multiple Security Vulnerabilities Mar18 (Windows)\n#\n# Authors:\n# Rajat Mishra <rajatm@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.812819\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2018-6057\", \"CVE-2018-6058\", \"CVE-2018-6059\", \"CVE-2018-6060\",\n \"CVE-2018-6061\", \"CVE-2018-6062\", \"CVE-2018-6063\", \"CVE-2018-6064\",\n \"CVE-2018-6065\", \"CVE-2018-6066\", \"CVE-2018-6067\", \"CVE-2018-6068\",\n \"CVE-2018-6069\", \"CVE-2018-6070\", \"CVE-2018-6071\", \"CVE-2018-6072\",\n \"CVE-2018-6073\", \"CVE-2018-6074\", \"CVE-2018-6075\", \"CVE-2018-6076\",\n \"CVE-2018-6077\", \"CVE-2018-6078\", \"CVE-2018-6079\", \"CVE-2018-6080\",\n \"CVE-2018-6081\", \"CVE-2018-6082\", \"CVE-2018-6083\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-03-07 11:13:56 +0530 (Wed, 07 Mar 2018)\");\n script_name(\"Google Chrome Multiple Security Vulnerabilities Mar18 (Windows)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Google Chrome and is\n prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to:\n\n - Multiple use after free errors in flash and Blink.\n\n - Race condition, type confusion and integer overflow errors in V8.\n\n - Buffer overflows errors in Skia, PDFium and WebGL.\n\n - Multiple incorrect permission errors on shared memory.\n\n - Same origin bypass error via canvas.\n\n - CSP bypass error through extensions.\n\n - Object lifecycle issues in Chrome custom.\n\n - Mark-of-the-Web bypass error.\n\n - Overly permissive cross origin download errors.\n\n - Timing attack error using SVG filters.\n\n - URL Spoof error in OmniBox.\n\n - Information disclosure error in IPC call.\n\n - XSS due to input validation error in interstitials.\n\n - Circumvention of port blocking error.\n\n - Incorrect processing error of AppManifests.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers\n to cause a denial of service, manipulate shared memory, bypass the same origin\n policy, content-security-policy and mark-of-the-web, allow overly permissive\n cross origin downloads, spoof the URL, disclose sensitive information, perform\n cross site scripting or possibly have other unspecified impacts via crafted\n dimensions.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome versions prior to 65.0.3325.146 on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 65.0.3325.146 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n script_xref(name:\"URL\", value:\"https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html\");\n\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_portable_win.nasl\");\n script_mandatory_keys(\"GoogleChrome/Win/Ver\");\n\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE )) exit(0);\nvers = infos['version'];\npath = infos['location'];\n\nif(version_is_less(version:vers, test_version:\"65.0.3325.146\"))\n{\n report = report_fixed_ver(installed_version:vers, fixed_version:\"65.0.3325.146\", install_path:path);\n security_message(data:report);\n exit(0);\n}\nexit(0);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-17T14:07:35", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-6069", "CVE-2018-6078", "CVE-2018-6081", "CVE-2018-6080", "CVE-2018-6083", "CVE-2018-6082", "CVE-2018-6057", "CVE-2018-6070", "CVE-2018-6074", "CVE-2018-6059", "CVE-2018-6073", "CVE-2018-6061", "CVE-2018-6072", "CVE-2018-6058", "CVE-2018-6068", "CVE-2018-6065", "CVE-2018-6062", "CVE-2018-6067", "CVE-2018-6071", "CVE-2018-6066", "CVE-2018-6075", "CVE-2018-6064", "CVE-2018-6077", "CVE-2018-6076", "CVE-2018-6079", "CVE-2018-6060", "CVE-2018-6063"], "description": "This host is installed with Google Chrome and is\n prone to multiple vulnerabilities.", "modified": "2019-07-16T00:00:00", "published": "2018-03-07T00:00:00", "id": "OPENVAS:1361412562310812818", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310812818", "type": "openvas", "title": "Google Chrome Multiple Security Vulnerabilities Mar18 (Mac OS X)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Multiple Security Vulnerabilities Mar18 (Mac OS X)\n#\n# Authors:\n# Rajat Mishra <rajatm@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.812818\");\n script_version(\"2019-07-16T15:57:25+0000\");\n script_cve_id(\"CVE-2018-6057\", \"CVE-2018-6058\", \"CVE-2018-6059\", \"CVE-2018-6060\",\n \"CVE-2018-6061\", \"CVE-2018-6062\", \"CVE-2018-6063\", \"CVE-2018-6064\",\n \"CVE-2018-6065\", \"CVE-2018-6066\", \"CVE-2018-6067\", \"CVE-2018-6068\",\n \"CVE-2018-6069\", \"CVE-2018-6070\", \"CVE-2018-6071\", \"CVE-2018-6072\",\n \"CVE-2018-6073\", \"CVE-2018-6074\", \"CVE-2018-6075\", \"CVE-2018-6076\",\n \"CVE-2018-6077\", \"CVE-2018-6078\", \"CVE-2018-6079\", \"CVE-2018-6080\",\n \"CVE-2018-6081\", \"CVE-2018-6082\", \"CVE-2018-6083\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-16 15:57:25 +0000 (Tue, 16 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-03-07 17:41:21 +0530 (Wed, 07 Mar 2018)\");\n script_name(\"Google Chrome Multiple Security Vulnerabilities Mar18 (Mac OS X)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Google Chrome and is\n prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to:\n\n - Multiple use after free errors in flash and Blink.\n\n - Race condition, type confusion and integer overflow errors in V8.\n\n - Buffer overflows errors in Skia, PDFium and WebGL.\n\n - Multiple incorrect permission errors on shared memory.\n\n - Same origin bypass error via canvas.\n\n - CSP bypass error through extensions.\n\n - Object lifecycle issues in Chrome custom.\n\n - Mark-of-the-Web bypass error.\n\n - Overly permissive cross origin download errors.\n\n - Timing attack error using SVG filters.\n\n - URL Spoof error in OmniBox.\n\n - Information disclosure error in IPC call.\n\n - XSS due to input validation error in interstitials.\n\n - Circumvention of port blocking error.\n\n - Incorrect processing error of AppManifests.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers\n to cause a denial of service, manipulate shared memory, bypass the same origin\n policy, content-security-policy and mark-of-the-web, allow overly permissive\n cross origin downloads, spoof the URL, disclose sensitive information, perform\n cross site scripting or possibly have other unspecified impacts via crafted\n dimensions.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome versions prior to\n 65.0.3325.146 on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 65.0.3325.146 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html\");\n\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_macosx.nasl\");\n script_mandatory_keys(\"GoogleChrome/MacOSX/Version\");\n\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE))\n exit(0);\n\nvers = infos['version'];\npath = infos['location'];\n\nif(version_is_less(version:vers, test_version:\"65.0.3325.146\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"65.0.3325.146\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "debian": [{"lastseen": "2019-05-30T02:22:58", "bulletinFamily": "unix", "cvelist": ["CVE-2018-6069", "CVE-2018-6078", "CVE-2018-6097", "CVE-2018-6103", "CVE-2018-6081", "CVE-2018-6099", "CVE-2018-6113", "CVE-2018-6080", "CVE-2018-6091", "CVE-2018-6104", "CVE-2018-6096", "CVE-2018-6083", "CVE-2018-6100", "CVE-2018-6082", "CVE-2018-6057", "CVE-2018-6070", "CVE-2018-6074", "CVE-2018-6098", "CVE-2018-6112", "CVE-2018-6110", "CVE-2018-6108", "CVE-2018-6102", "CVE-2018-6056", "CVE-2018-6114", "CVE-2018-6117", "CVE-2018-6109", "CVE-2018-6073", "CVE-2018-6095", "CVE-2018-6105", "CVE-2018-6093", "CVE-2018-6087", "CVE-2018-6061", "CVE-2018-6116", "CVE-2018-6106", "CVE-2018-6090", "CVE-2018-6072", "CVE-2018-6068", "CVE-2018-6088", "CVE-2018-6094", "CVE-2018-6065", "CVE-2018-6089", "CVE-2018-6062", "CVE-2018-6101", "CVE-2018-6107", "CVE-2018-6086", "CVE-2018-6067", "CVE-2018-6092", "CVE-2018-6071", "CVE-2018-6066", "CVE-2018-6075", "CVE-2018-6064", "CVE-2018-6077", "CVE-2018-6076", "CVE-2018-6111", "CVE-2018-6085", "CVE-2018-6079", "CVE-2018-6060", "CVE-2018-6063"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4182-1 security@debian.org\nhttps://www.debian.org/security/ Michael Gilbert\nApril 28, 2018 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : chromium-browser\nCVE ID : CVE-2018-6056 CVE-2018-6057 CVE-2018-6060 CVE-2018-6061\n CVE-2018-6062 CVE-2018-6063 CVE-2018-6064 CVE-2018-6065\n CVE-2018-6066 CVE-2018-6067 CVE-2018-6068 CVE-2018-6069\n CVE-2018-6070 CVE-2018-6071 CVE-2018-6072 CVE-2018-6073\n CVE-2018-6074 CVE-2018-6075 CVE-2018-6076 CVE-2018-6077\n CVE-2018-6078 CVE-2018-6079 CVE-2018-6080 CVE-2018-6081\n CVE-2018-6082 CVE-2018-6083 CVE-2018-6085 CVE-2018-6086\n CVE-2018-6087 CVE-2018-6088 CVE-2018-6089 CVE-2018-6090\n CVE-2018-6091 CVE-2018-6092 CVE-2018-6093 CVE-2018-6094\n CVE-2018-6095 CVE-2018-6096 CVE-2018-6097 CVE-2018-6098\n CVE-2018-6099 CVE-2018-6100 CVE-2018-6101 CVE-2018-6102\n CVE-2018-6103 CVE-2018-6104 CVE-2018-6105 CVE-2018-6106\n CVE-2018-6107 CVE-2018-6108 CVE-2018-6109 CVE-2018-6110\n CVE-2018-6111 CVE-2018-6112 CVE-2018-6113 CVE-2018-6114\n CVE-2018-6116 CVE-2018-6117\n\nSeveral vulnerabilities have been discovered in the chromium web browser.\n\nCVE-2018-6056\n\n lokihardt discovered an error in the v8 javascript library.\n\nCVE-2018-6057\n\n Gal Beniamini discovered errors related to shared memory permissions.\n\nCVE-2018-6060\n\n Omair discovered a use-after-free issue in blink/webkit.\n\nCVE-2018-6061\n\n Guang Gong discovered a race condition in the v8 javascript library.\n\nCVE-2018-6062\n\n A heap overflow issue was discovered in the v8 javascript library.\n\nCVE-2018-6063\n\n Gal Beniamini discovered errors related to shared memory permissions.\n\nCVE-2018-6064\n\n lokihardt discovered a type confusion error in the v8 javascript\n library.\n\nCVE-2018-6065\n\n Mark Brand discovered an integer overflow issue in the v8 javascript\n library.\n\nCVE-2018-6066\n\n Masato Kinugawa discovered a way to bypass the Same Origin Policy.\n\nCVE-2018-6067\n\n Ned Williamson discovered a buffer overflow issue in the skia library.\n\nCVE-2018-6068\n\n Luan Herrera discovered object lifecycle issues.\n\nCVE-2018-6069\n\n Wanglu and Yangkang discovered a stack overflow issue in the skia\n library.\n\nCVE-2018-6070\n\n Rob Wu discovered a way to bypass the Content Security Policy.\n\nCVE-2018-6071\n\n A heap overflow issue was discovered in the skia library.\n\nCVE-2018-6072\n\n Atte Kettunen discovered an integer overflow issue in the pdfium\n library.\n\nCVE-2018-6073\n\n Omair discover a heap overflow issue in the WebGL implementation.\n\nCVE-2018-6074\n\n Abdulrahman Alqabandi discovered a way to cause a downloaded web page\n to not contain a Mark of the Web.\n\nCVE-2018-6075\n\n Inti De Ceukelaire discovered a way to bypass the Same Origin Policy.\n\nCVE-2018-6076\n\n Mateusz Krzeszowiec discovered that URL fragment identifiers could be\n handled incorrectly.\n\nCVE-2018-6077\n\n Khalil Zhani discovered a timing issue.\n\nCVE-2018-6078\n\n Khalil Zhani discovered a URL spoofing issue.\n\nCVE-2018-6079\n\n Ivars discovered an information disclosure issue.\n\nCVE-2018-6080\n\n Gal Beniamini discovered an information disclosure issue.\n\nCVE-2018-6081\n\n Rob Wu discovered a cross-site scripting issue.\n\nCVE-2018-6082\n\n WenXu Wu discovered a way to bypass blocked ports.\n\nCVE-2018-6083\n\n Jun Kokatsu discovered that AppManifests could be handled incorrectly.\n\nCVE-2018-6085\n\n Ned Williamson discovered a use-after-free issue.\n\nCVE-2018-6086\n\n Ned Williamson discovered a use-after-free issue.\n\nCVE-2018-6087\n\n A use-after-free issue was discovered in the WebAssembly implementation.\n\nCVE-2018-6088\n\n A use-after-free issue was discovered in the pdfium library.\n\nCVE-2018-6089\n\n Rob Wu discovered a way to bypass the Same Origin Policy.\n\nCVE-2018-6090\n\n ZhanJia Song discovered a heap overflow issue in the skia library.\n\nCVE-2018-6091\n\n Jun Kokatsu discovered that plugins could be handled incorrectly.\n\nCVE-2018-6092\n\n Natalie Silvanovich discovered an integer overflow issue in the\n WebAssembly implementation.\n\nCVE-2018-6093\n\n Jun Kokatsu discovered a way to bypass the Same Origin Policy.\n\nCVE-2018-6094\n\n Chris Rohlf discovered a regression in garbage collection hardening.\n\nCVE-2018-6095\n\n Abdulrahman Alqabandi discovered files could be uploaded without user\n interaction.\n\nCVE-2018-6096\n\n WenXu Wu discovered a user interface spoofing issue.\n\nCVE-2018-6097\n\n xisigr discovered a user interface spoofing issue.\n\nCVE-2018-6098\n\n Khalil Zhani discovered a URL spoofing issue.\n\nCVE-2018-6099\n\n Jun Kokatsu discovered a way to bypass the Cross Origin Resource\n Sharing mechanism.\n\nCVE-2018-6100\n\n Lnyas Zhang dsicovered a URL spoofing issue.\n\nCVE-2018-6101\n\n Rob Wu discovered an issue in the developer tools remote debugging\n protocol.\n\nCVE-2018-6102\n\n Khalil Zhani discovered a URL spoofing issue.\n\nCVE-2018-6103\n\n Khalil Zhani discovered a user interface spoofing issue.\n\nCVE-2018-6104\n\n Khalil Zhani discovered a URL spoofing issue.\n\nCVE-2018-6105\n\n Khalil Zhani discovered a URL spoofing issue.\n\nCVE-2018-6106\n\n lokihardt discovered that v8 promises could be handled incorrectly.\n\nCVE-2018-6107\n\n Khalil Zhani discovered a URL spoofing issue.\n\nCVE-2018-6108\n\n Khalil Zhani discovered a URL spoofing issue.\n\nCVE-2018-6109\n\n Dominik Weber discovered a way to misuse the FileAPI feature.\n\nCVE-2018-6110\n\n Wenxiang Qian discovered that local plain text files could be handled\n incorrectly.\n\nCVE-2018-6111\n\n Khalil Zhani discovered a use-after-free issue in the developer tools.\n\nCVE-2018-6112\n\n Khalil Zhani discovered incorrect handling of URLs in the developer\n tools.\n\nCVE-2018-6113\n\n Khalil Zhani discovered a URL spoofing issue.\n\nCVE-2018-6114\n\n Lnyas Zhang discovered a way to bypass the Content Security Policy.\n\nCVE-2018-6116\n\n Chengdu Security Response Center discovered an error when memory\n is low.\n\nCVE-2018-6117\n\n Spencer Dailey discovered an error in form autofill settings.\n\nFor the oldstable distribution (jessie), security support for chromium\nhas been discontinued.\n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 66.0.3359.117-1~deb9u1.\n\nWe recommend that you upgrade your chromium-browser packages.\n\nFor the detailed security status of chromium-browser please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/chromium-browser\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 5, "modified": "2018-04-28T05:31:43", "published": "2018-04-28T05:31:43", "id": "DEBIAN:DSA-4182-1:617C4", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2018/msg00108.html", "title": "[SECURITY] [DSA 4182-1] chromium-browser security update", "type": "debian", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2021-03-01T01:56:27", "description": "Several vulnerabilities have been discovered in the chromium web\nbrowser.\n\n - CVE-2018-6056\n lokihardt discovered an error in the v8 JavaScript\n library.\n\n - CVE-2018-6057\n Gal Beniamini discovered errors related to shared memory\n permissions.\n\n - CVE-2018-6060\n Omair discovered a use-after-free issue in blink/webkit.\n\n - CVE-2018-6061\n Guang Gong discovered a race condition in the v8\n JavaScript library.\n\n - CVE-2018-6062\n A heap overflow issue was discovered in the v8\n JavaScript library.\n\n - CVE-2018-6063\n Gal Beniamini discovered errors related to shared memory\n permissions.\n\n - CVE-2018-6064\n lokihardt discovered a type confusion error in the v8\n JavaScript library.\n\n - CVE-2018-6065\n Mark Brand discovered an integer overflow issue in the\n v8 JavaScript library.\n\n - CVE-2018-6066\n Masato Kinugawa discovered a way to bypass the Same\n Origin Policy.\n\n - CVE-2018-6067\n Ned Williamson discovered a buffer overflow issue in the\n skia library.\n\n - CVE-2018-6068\n Luan Herrera discovered object lifecycle issues.\n\n - CVE-2018-6069\n Wanglu and Yangkang discovered a stack overflow issue in\n the skia library.\n\n - CVE-2018-6070\n Rob Wu discovered a way to bypass the Content Security\n Policy.\n\n - CVE-2018-6071\n A heap overflow issue was discovered in the skia\n library.\n\n - CVE-2018-6072\n Atte Kettunen discovered an integer overflow issue in\n the pdfium library.\n\n - CVE-2018-6073\n Omair discover a heap overflow issue in the WebGL\n implementation.\n\n - CVE-2018-6074\n Abdulrahman Alqabandi discovered a way to cause a\n downloaded web page to not contain a Mark of the Web.\n\n - CVE-2018-6075\n Inti De Ceukelaire discovered a way to bypass the Same\n Origin Policy.\n\n - CVE-2018-6076\n Mateusz Krzeszowiec discovered that URL fragment\n identifiers could be handled incorrectly.\n\n - CVE-2018-6077\n Khalil Zhani discovered a timing issue.\n\n - CVE-2018-6078\n Khalil Zhani discovered a URL spoofing issue.\n\n - CVE-2018-6079\n Ivars discovered an information disclosure issue.\n\n - CVE-2018-6080\n Gal Beniamini discovered an information disclosure\n issue.\n\n - CVE-2018-6081\n Rob Wu discovered a cross-site scripting issue.\n\n - CVE-2018-6082\n WenXu Wu discovered a way to bypass blocked ports.\n\n - CVE-2018-6083\n Jun Kokatsu discovered that AppManifests could be\n handled incorrectly.\n\n - CVE-2018-6085\n Ned Williamson discovered a use-after-free issue.\n\n - CVE-2018-6086\n Ned Williamson discovered a use-after-free issue.\n\n - CVE-2018-6087\n A use-after-free issue was discovered in the WebAssembly\n implementation.\n\n - CVE-2018-6088\n A use-after-free issue was discovered in the pdfium\n library.\n\n - CVE-2018-6089\n Rob Wu discovered a way to bypass the Same Origin\n Policy.\n\n - CVE-2018-6090\n ZhanJia Song discovered a heap overflow issue in the\n skia library.\n\n - CVE-2018-6091\n Jun Kokatsu discovered that plugins could be handled\n incorrectly.\n\n - CVE-2018-6092\n Natalie Silvanovich discovered an integer overflow issue\n in the WebAssembly implementation.\n\n - CVE-2018-6093\n Jun Kokatsu discovered a way to bypass the Same Origin\n Policy.\n\n - CVE-2018-6094\n Chris Rohlf discovered a regression in garbage\n collection hardening.\n\n - CVE-2018-6095\n Abdulrahman Alqabandi discovered files could be uploaded\n without user interaction.\n\n - CVE-2018-6096\n WenXu Wu discovered a user interface spoofing issue.\n\n - CVE-2018-6097\n xisigr discovered a user interface spoofing issue.\n\n - CVE-2018-6098\n Khalil Zhani discovered a URL spoofing issue.\n\n - CVE-2018-6099\n Jun Kokatsu discovered a way to bypass the Cross Origin\n Resource Sharing mechanism.\n\n - CVE-2018-6100\n Lnyas Zhang discovered a URL spoofing issue.\n\n - CVE-2018-6101\n Rob Wu discovered an issue in the developer tools remote\n debugging protocol.\n\n - CVE-2018-6102\n Khalil Zhani discovered a URL spoofing issue.\n\n - CVE-2018-6103\n Khalil Zhani discovered a user interface spoofing issue.\n\n - CVE-2018-6104\n Khalil Zhani discovered a URL spoofing issue.\n\n - CVE-2018-6105\n Khalil Zhani discovered a URL spoofing issue.\n\n - CVE-2018-6106\n lokihardt discovered that v8 promises could be handled\n incorrectly.\n\n - CVE-2018-6107\n Khalil Zhani discovered a URL spoofing issue.\n\n - CVE-2018-6108\n Khalil Zhani discovered a URL spoofing issue.\n\n - CVE-2018-6109\n Dominik Weber discovered a way to misuse the FileAPI\n feature.\n\n - CVE-2018-6110\n Wenxiang Qian discovered that local plain text files\n could be handled incorrectly.\n\n - CVE-2018-6111\n Khalil Zhani discovered a use-after-free issue in the\n developer tools.\n\n - CVE-2018-6112\n Khalil Zhani discovered incorrect handling of URLs in\n the developer tools.\n\n - CVE-2018-6113\n Khalil Zhani discovered a URL spoofing issue.\n\n - CVE-2018-6114\n Lnyas Zhang discovered a way to bypass the Content\n Security Policy.\n\n - CVE-2018-6116\n Chengdu Security Response Center discovered an error\n when memory is low.\n\n - CVE-2018-6117\n Spencer Dailey discovered an error in form autofill\n settings.", "edition": 28, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2018-04-30T00:00:00", "title": "Debian DSA-4182-1 : chromium-browser - security update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-6069", "CVE-2018-6078", "CVE-2018-6097", "CVE-2018-6103", "CVE-2018-6081", "CVE-2018-6099", "CVE-2018-6113", "CVE-2018-6080", "CVE-2018-6091", "CVE-2018-6104", "CVE-2018-6096", "CVE-2018-6083", "CVE-2018-6100", "CVE-2018-6082", "CVE-2018-6057", "CVE-2018-6070", "CVE-2018-6074", "CVE-2018-6098", "CVE-2018-6112", "CVE-2018-6110", "CVE-2018-6108", "CVE-2018-6102", "CVE-2018-6056", "CVE-2018-6114", "CVE-2018-6117", "CVE-2018-6109", "CVE-2018-6073", "CVE-2018-6095", "CVE-2018-6105", "CVE-2018-6093", "CVE-2018-6087", "CVE-2018-6061", "CVE-2018-6116", "CVE-2018-6106", "CVE-2018-6090", "CVE-2018-6072", "CVE-2018-6068", "CVE-2018-6088", "CVE-2018-6094", "CVE-2018-6065", "CVE-2018-6089", "CVE-2018-6062", "CVE-2018-6101", "CVE-2018-6107", "CVE-2018-6086", "CVE-2018-6067", "CVE-2018-6092", "CVE-2018-6071", "CVE-2018-6066", "CVE-2018-6075", "CVE-2018-6064", "CVE-2018-6077", "CVE-2018-6076", "CVE-2018-6111", "CVE-2018-6085", "CVE-2018-6079", "CVE-2018-6060", "CVE-2018-6063"], "modified": "2021-03-02T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:chromium-browser", "cpe:/o:debian:debian_linux:9.0"], "id": "DEBIAN_DSA-4182.NASL", "href": "https://www.tenable.com/plugins/nessus/109411", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-4182. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(109411);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2019/07/15 14:20:30\");\n\n script_cve_id(\"CVE-2018-6056\", \"CVE-2018-6057\", \"CVE-2018-6060\", \"CVE-2018-6061\", \"CVE-2018-6062\", \"CVE-2018-6063\", \"CVE-2018-6064\", \"CVE-2018-6065\", \"CVE-2018-6066\", \"CVE-2018-6067\", \"CVE-2018-6068\", \"CVE-2018-6069\", \"CVE-2018-6070\", \"CVE-2018-6071\", \"CVE-2018-6072\", \"CVE-2018-6073\", \"CVE-2018-6074\", \"CVE-2018-6075\", \"CVE-2018-6076\", \"CVE-2018-6077\", \"CVE-2018-6078\", \"CVE-2018-6079\", \"CVE-2018-6080\", \"CVE-2018-6081\", \"CVE-2018-6082\", \"CVE-2018-6083\", \"CVE-2018-6085\", \"CVE-2018-6086\", \"CVE-2018-6087\", \"CVE-2018-6088\", \"CVE-2018-6089\", \"CVE-2018-6090\", \"CVE-2018-6091\", \"CVE-2018-6092\", \"CVE-2018-6093\", \"CVE-2018-6094\", \"CVE-2018-6095\", \"CVE-2018-6096\", \"CVE-2018-6097\", \"CVE-2018-6098\", \"CVE-2018-6099\", \"CVE-2018-6100\", \"CVE-2018-6101\", \"CVE-2018-6102\", \"CVE-2018-6103\", \"CVE-2018-6104\", \"CVE-2018-6105\", \"CVE-2018-6106\", \"CVE-2018-6107\", \"CVE-2018-6108\", \"CVE-2018-6109\", \"CVE-2018-6110\", \"CVE-2018-6111\", \"CVE-2018-6112\", \"CVE-2018-6113\", \"CVE-2018-6114\", \"CVE-2018-6116\", \"CVE-2018-6117\");\n script_xref(name:\"DSA\", value:\"4182\");\n\n script_name(english:\"Debian DSA-4182-1 : chromium-browser - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities have been discovered in the chromium web\nbrowser.\n\n - CVE-2018-6056\n lokihardt discovered an error in the v8 JavaScript\n library.\n\n - CVE-2018-6057\n Gal Beniamini discovered errors related to shared memory\n permissions.\n\n - CVE-2018-6060\n Omair discovered a use-after-free issue in blink/webkit.\n\n - CVE-2018-6061\n Guang Gong discovered a race condition in the v8\n JavaScript library.\n\n - CVE-2018-6062\n A heap overflow issue was discovered in the v8\n JavaScript library.\n\n - CVE-2018-6063\n Gal Beniamini discovered errors related to shared memory\n permissions.\n\n - CVE-2018-6064\n lokihardt discovered a type confusion error in the v8\n JavaScript library.\n\n - CVE-2018-6065\n Mark Brand discovered an integer overflow issue in the\n v8 JavaScript library.\n\n - CVE-2018-6066\n Masato Kinugawa discovered a way to bypass the Same\n Origin Policy.\n\n - CVE-2018-6067\n Ned Williamson discovered a buffer overflow issue in the\n skia library.\n\n - CVE-2018-6068\n Luan Herrera discovered object lifecycle issues.\n\n - CVE-2018-6069\n Wanglu and Yangkang discovered a stack overflow issue in\n the skia library.\n\n - CVE-2018-6070\n Rob Wu discovered a way to bypass the Content Security\n Policy.\n\n - CVE-2018-6071\n A heap overflow issue was discovered in the skia\n library.\n\n - CVE-2018-6072\n Atte Kettunen discovered an integer overflow issue in\n the pdfium library.\n\n - CVE-2018-6073\n Omair discover a heap overflow issue in the WebGL\n implementation.\n\n - CVE-2018-6074\n Abdulrahman Alqabandi discovered a way to cause a\n downloaded web page to not contain a Mark of the Web.\n\n - CVE-2018-6075\n Inti De Ceukelaire discovered a way to bypass the Same\n Origin Policy.\n\n - CVE-2018-6076\n Mateusz Krzeszowiec discovered that URL fragment\n identifiers could be handled incorrectly.\n\n - CVE-2018-6077\n Khalil Zhani discovered a timing issue.\n\n - CVE-2018-6078\n Khalil Zhani discovered a URL spoofing issue.\n\n - CVE-2018-6079\n Ivars discovered an information disclosure issue.\n\n - CVE-2018-6080\n Gal Beniamini discovered an information disclosure\n issue.\n\n - CVE-2018-6081\n Rob Wu discovered a cross-site scripting issue.\n\n - CVE-2018-6082\n WenXu Wu discovered a way to bypass blocked ports.\n\n - CVE-2018-6083\n Jun Kokatsu discovered that AppManifests could be\n handled incorrectly.\n\n - CVE-2018-6085\n Ned Williamson discovered a use-after-free issue.\n\n - CVE-2018-6086\n Ned Williamson discovered a use-after-free issue.\n\n - CVE-2018-6087\n A use-after-free issue was discovered in the WebAssembly\n implementation.\n\n - CVE-2018-6088\n A use-after-free issue was discovered in the pdfium\n library.\n\n - CVE-2018-6089\n Rob Wu discovered a way to bypass the Same Origin\n Policy.\n\n - CVE-2018-6090\n ZhanJia Song discovered a heap overflow issue in the\n skia library.\n\n - CVE-2018-6091\n Jun Kokatsu discovered that plugins could be handled\n incorrectly.\n\n - CVE-2018-6092\n Natalie Silvanovich discovered an integer overflow issue\n in the WebAssembly implementation.\n\n - CVE-2018-6093\n Jun Kokatsu discovered a way to bypass the Same Origin\n Policy.\n\n - CVE-2018-6094\n Chris Rohlf discovered a regression in garbage\n collection hardening.\n\n - CVE-2018-6095\n Abdulrahman Alqabandi discovered files could be uploaded\n without user interaction.\n\n - CVE-2018-6096\n WenXu Wu discovered a user interface spoofing issue.\n\n - CVE-2018-6097\n xisigr discovered a user interface spoofing issue.\n\n - CVE-2018-6098\n Khalil Zhani discovered a URL spoofing issue.\n\n - CVE-2018-6099\n Jun Kokatsu discovered a way to bypass the Cross Origin\n Resource Sharing mechanism.\n\n - CVE-2018-6100\n Lnyas Zhang discovered a URL spoofing issue.\n\n - CVE-2018-6101\n Rob Wu discovered an issue in the developer tools remote\n debugging protocol.\n\n - CVE-2018-6102\n Khalil Zhani discovered a URL spoofing issue.\n\n - CVE-2018-6103\n Khalil Zhani discovered a user interface spoofing issue.\n\n - CVE-2018-6104\n Khalil Zhani discovered a URL spoofing issue.\n\n - CVE-2018-6105\n Khalil Zhani discovered a URL spoofing issue.\n\n - CVE-2018-6106\n lokihardt discovered that v8 promises could be handled\n incorrectly.\n\n - CVE-2018-6107\n Khalil Zhani discovered a URL spoofing issue.\n\n - CVE-2018-6108\n Khalil Zhani discovered a URL spoofing issue.\n\n - CVE-2018-6109\n Dominik Weber discovered a way to misuse the FileAPI\n feature.\n\n - CVE-2018-6110\n Wenxiang Qian discovered that local plain text files\n could be handled incorrectly.\n\n - CVE-2018-6111\n Khalil Zhani discovered a use-after-free issue in the\n developer tools.\n\n - CVE-2018-6112\n Khalil Zhani discovered incorrect handling of URLs in\n the developer tools.\n\n - CVE-2018-6113\n Khalil Zhani discovered a URL spoofing issue.\n\n - CVE-2018-6114\n Lnyas Zhang discovered a way to bypass the Content\n Security Policy.\n\n - CVE-2018-6116\n Chengdu Security Response Center discovered an error\n when memory is low.\n\n - CVE-2018-6117\n Spencer Dailey discovered an error in form autofill\n settings.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6056\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6057\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6060\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6061\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6062\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6063\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6064\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6065\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6066\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6067\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6068\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6069\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6070\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6071\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6072\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6073\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6074\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6075\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6076\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6077\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6078\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6079\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6080\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6081\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6082\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6083\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6085\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6086\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6087\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6088\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6089\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6090\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6091\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6092\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6093\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6094\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6095\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6096\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6097\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6098\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6099\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6100\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6101\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6102\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6103\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6104\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6105\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6106\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6107\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6108\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6109\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6110\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6111\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6112\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6113\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6114\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6116\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2018-6117\"\n );\n # https://security-tracker.debian.org/tracker/source-package/chromium-browser\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?e33901a2\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/stretch/chromium-browser\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2018/dsa-4182\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the chromium-browser packages.\n\nFor the oldstable distribution (jessie), security support for chromium\nhas been discontinued.\n\nFor the stable distribution (stretch), these problems have been fixed\nin version 66.0.3359.117-1~deb9u1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:chromium-browser\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:9.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/11/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/04/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/04/30\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"9.0\", prefix:\"chromedriver\", reference:\"66.0.3359.117-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"chromium\", reference:\"66.0.3359.117-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"chromium-driver\", reference:\"66.0.3359.117-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"chromium-l10n\", reference:\"66.0.3359.117-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"chromium-shell\", reference:\"66.0.3359.117-1~deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"chromium-widevine\", reference:\"66.0.3359.117-1~deb9u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-20T12:37:03", "description": "This update for Chromium to version 66.0.3359.117 fixes the following\nissues :\n\nSecurity issues fixed (boo#1090000) :\n\n - CVE-2018-6085: Use after free in Disk Cache\n\n - CVE-2018-6086: Use after free in Disk Cache\n\n - CVE-2018-6087: Use after free in WebAssembly\n\n - CVE-2018-6088: Use after free in PDFium\n\n - CVE-2018-6089: Same origin policy bypass in Service\n Worker\n\n - CVE-2018-6090: Heap buffer overflow in Skia\n\n - CVE-2018-6091: Incorrect handling of plug-ins by Service\n Worker\n\n - CVE-2018-6092: Integer overflow in WebAssembly\n\n - CVE-2018-6093: Same origin bypass in Service Worker\n\n - CVE-2018-6094: Exploit hardening regression in Oilpan\n\n - CVE-2018-6095: Lack of meaningful user interaction\n requirement before file upload\n\n - CVE-2018-6096: Fullscreen UI spoof\n\n - CVE-2018-6097: Fullscreen UI spoof\n\n - CVE-2018-6098: URL spoof in Omnibox\n\n - CVE-2018-6099: CORS bypass in ServiceWorker\n\n - CVE-2018-6100: URL spoof in Omnibox\n\n - CVE-2018-6101: Insufficient protection of remote\n debugging prototol in DevTools \n\n - CVE-2018-6102: URL spoof in Omnibox\n\n - CVE-2018-6103: UI spoof in Permissions\n\n - CVE-2018-6104: URL spoof in Omnibox\n\n - CVE-2018-6105: URL spoof in Omnibox\n\n - CVE-2018-6106: Incorrect handling of promises in V8\n\n - CVE-2018-6107: URL spoof in Omnibox\n\n - CVE-2018-6108: URL spoof in Omnibox\n\n - CVE-2018-6109: Incorrect handling of files by FileAPI\n\n - CVE-2018-6110: Incorrect handling of plaintext files via\n file:// \n\n - CVE-2018-6111: Heap-use-after-free in DevTools\n\n - CVE-2018-6112: Incorrect URL handling in DevTools\n\n - CVE-2018-6113: URL spoof in Navigation\n\n - CVE-2018-6114: CSP bypass\n\n - CVE-2018-6115: SmartScreen bypass in downloads\n\n - CVE-2018-6116: Incorrect low memory handling in\n WebAssembly\n\n - CVE-2018-6117: Confusing autofill settings\n\n - Various fixes from internal audits, fuzzing and other\n initiatives This update also supports mitigation against\n the Spectre vulnerabilities: 'Strict site isolation' is\n disabled for most users and can be turned on via:\n chrome://flags/#enable-site-per-process This feature is\n undergoing a small percentage trial. Out out of the\n trial is possible via:\n chrome://flags/#site-isolation-trial-opt-out\n\nThe following other changes are included :\n\n - distrust certificates issued by Symantec before\n 2016-06-01\n\n - add option to export saved passwords\n\n - Reduce videos that auto-play with sound\n\n - boo#1086199: Fix UI freezing when loading/scaling down\n large images\n\nThis update also contains a number of upstream bug fixes and\nimprovements.", "edition": 19, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2018-04-23T00:00:00", "title": "openSUSE Security Update : chromium (openSUSE-2018-381)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-6097", "CVE-2018-6103", "CVE-2018-6099", "CVE-2018-6113", "CVE-2018-6091", "CVE-2018-6104", "CVE-2018-6096", "CVE-2018-6100", "CVE-2018-6098", "CVE-2018-6112", "CVE-2018-6110", "CVE-2018-6108", "CVE-2018-6102", "CVE-2018-6114", "CVE-2018-6117", "CVE-2018-6109", "CVE-2018-6115", "CVE-2018-6095", "CVE-2018-6105", "CVE-2018-6093", "CVE-2018-6087", "CVE-2018-6116", "CVE-2018-6106", "CVE-2018-6090", "CVE-2018-6088", "CVE-2018-6094", "CVE-2018-6089", "CVE-2018-6101", "CVE-2018-6107", "CVE-2018-6086", "CVE-2018-6092", "CVE-2018-6111", "CVE-2018-6085"], "modified": "2018-04-23T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:chromedriver-debuginfo", "p-cpe:/a:novell:opensuse:chromium", "p-cpe:/a:novell:opensuse:chromium-debugsource", "p-cpe:/a:novell:opensuse:chromedriver", "cpe:/o:novell:opensuse:42.3", "p-cpe:/a:novell:opensuse:chromium-debuginfo"], "id": "OPENSUSE-2018-381.NASL", "href": "https://www.tenable.com/plugins/nessus/109236", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2018-381.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(109236);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2018-6085\", \"CVE-2018-6086\", \"CVE-2018-6087\", \"CVE-2018-6088\", \"CVE-2018-6089\", \"CVE-2018-6090\", \"CVE-2018-6091\", \"CVE-2018-6092\", \"CVE-2018-6093\", \"CVE-2018-6094\", \"CVE-2018-6095\", \"CVE-2018-6096\", \"CVE-2018-6097\", \"CVE-2018-6098\", \"CVE-2018-6099\", \"CVE-2018-6100\", \"CVE-2018-6101\", \"CVE-2018-6102\", \"CVE-2018-6103\", \"CVE-2018-6104\", \"CVE-2018-6105\", \"CVE-2018-6106\", \"CVE-2018-6107\", \"CVE-2018-6108\", \"CVE-2018-6109\", \"CVE-2018-6110\", \"CVE-2018-6111\", \"CVE-2018-6112\", \"CVE-2018-6113\", \"CVE-2018-6114\", \"CVE-2018-6115\", \"CVE-2018-6116\", \"CVE-2018-6117\");\n\n script_name(english:\"openSUSE Security Update : chromium (openSUSE-2018-381)\");\n script_summary(english:\"Check for the openSUSE-2018-381 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for Chromium to version 66.0.3359.117 fixes the following\nissues :\n\nSecurity issues fixed (boo#1090000) :\n\n - CVE-2018-6085: Use after free in Disk Cache\n\n - CVE-2018-6086: Use after free in Disk Cache\n\n - CVE-2018-6087: Use after free in WebAssembly\n\n - CVE-2018-6088: Use after free in PDFium\n\n - CVE-2018-6089: Same origin policy bypass in Service\n Worker\n\n - CVE-2018-6090: Heap buffer overflow in Skia\n\n - CVE-2018-6091: Incorrect handling of plug-ins by Service\n Worker\n\n - CVE-2018-6092: Integer overflow in WebAssembly\n\n - CVE-2018-6093: Same origin bypass in Service Worker\n\n - CVE-2018-6094: Exploit hardening regression in Oilpan\n\n - CVE-2018-6095: Lack of meaningful user interaction\n requirement before file upload\n\n - CVE-2018-6096: Fullscreen UI spoof\n\n - CVE-2018-6097: Fullscreen UI spoof\n\n - CVE-2018-6098: URL spoof in Omnibox\n\n - CVE-2018-6099: CORS bypass in ServiceWorker\n\n - CVE-2018-6100: URL spoof in Omnibox\n\n - CVE-2018-6101: Insufficient protection of remote\n debugging prototol in DevTools \n\n - CVE-2018-6102: URL spoof in Omnibox\n\n - CVE-2018-6103: UI spoof in Permissions\n\n - CVE-2018-6104: URL spoof in Omnibox\n\n - CVE-2018-6105: URL spoof in Omnibox\n\n - CVE-2018-6106: Incorrect handling of promises in V8\n\n - CVE-2018-6107: URL spoof in Omnibox\n\n - CVE-2018-6108: URL spoof in Omnibox\n\n - CVE-2018-6109: Incorrect handling of files by FileAPI\n\n - CVE-2018-6110: Incorrect handling of plaintext files via\n file:// \n\n - CVE-2018-6111: Heap-use-after-free in DevTools\n\n - CVE-2018-6112: Incorrect URL handling in DevTools\n\n - CVE-2018-6113: URL spoof in Navigation\n\n - CVE-2018-6114: CSP bypass\n\n - CVE-2018-6115: SmartScreen bypass in downloads\n\n - CVE-2018-6116: Incorrect low memory handling in\n WebAssembly\n\n - CVE-2018-6117: Confusing autofill settings\n\n - Various fixes from internal audits, fuzzing and other\n initiatives This update also supports mitigation against\n the Spectre vulnerabilities: 'Strict site isolation' is\n disabled for most users and can be turned on via:\n chrome://flags/#enable-site-per-process This feature is\n undergoing a small percentage trial. Out out of the\n trial is possible via:\n chrome://flags/#site-isolation-trial-opt-out\n\nThe following other changes are included :\n\n - distrust certificates issued by Symantec before\n 2016-06-01\n\n - add option to export saved passwords\n\n - Reduce videos that auto-play with sound\n\n - boo#1086199: Fix UI freezing when loading/scaling down\n large images\n\nThis update also contains a number of upstream bug fixes and\nimprovements.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1086199\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1090000\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected chromium packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/04/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/04/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE42\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"42.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE42.3\", reference:\"chromedriver-66.0.3359.117-152.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"chromedriver-debuginfo-66.0.3359.117-152.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"chromium-66.0.3359.117-152.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"chromium-debuginfo-66.0.3359.117-152.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"chromium-debugsource-66.0.3359.117-152.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromedriver / chromedriver-debuginfo / chromium / etc\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-03-01T03:10:54", "description": "The remote host is affected by the vulnerability described in GLSA-201804-22\n(Chromium, Google Chrome: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Chromium and Google\n Chrome. Please review the referenced CVE identifiers and Google Chrome\n Releases for details.\n \nImpact :\n\n A remote attacker could possibly execute arbitrary code with the\n privileges of the process, cause a Denial of Service condition, bypass\n content security controls, or conduct URL spoofing.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 24, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2018-04-24T00:00:00", "title": "GLSA-201804-22 : Chromium, Google Chrome: Multiple vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-6097", "CVE-2018-6103", "CVE-2018-6099", "CVE-2018-6113", "CVE-2018-6091", "CVE-2018-6104", "CVE-2018-6096", "CVE-2018-6100", "CVE-2018-6098", "CVE-2018-6112", "CVE-2018-6110", "CVE-2018-6108", "CVE-2018-6102", "CVE-2018-6114", "CVE-2018-6117", "CVE-2018-6109", "CVE-2018-6115", "CVE-2018-6095", "CVE-2018-6105", "CVE-2018-6093", "CVE-2018-6087", "CVE-2018-6116", "CVE-2018-6106", "CVE-2018-6090", "CVE-2018-6088", "CVE-2018-6094", "CVE-2018-6089", "CVE-2018-6101", "CVE-2018-6107", "CVE-2018-6086", "CVE-2018-6092", "CVE-2018-6111", "CVE-2018-6085"], "modified": "2021-03-02T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:google-chrome", "p-cpe:/a:gentoo:linux:chromium"], "id": "GENTOO_GLSA-201804-22.NASL", "href": "https://www.tenable.com/plugins/nessus/109290", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201804-22.\n#\n# The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(109290);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2019/04/05 23:25:06\");\n\n script_cve_id(\"CVE-2018-6085\", \"CVE-2018-6086\", \"CVE-2018-6087\", \"CVE-2018-6088\", \"CVE-2018-6089\", \"CVE-2018-6090\", \"CVE-2018-6091\", \"CVE-2018-6092\", \"CVE-2018-6093\", \"CVE-2018-6094\", \"CVE-2018-6095\", \"CVE-2018-6096\", \"CVE-2018-6097\", \"CVE-2018-6098\", \"CVE-2018-6099\", \"CVE-2018-6100\", \"CVE-2018-6101\", \"CVE-2018-6102\", \"CVE-2018-6103\", \"CVE-2018-6104\", \"CVE-2018-6105\", \"CVE-2018-6106\", \"CVE-2018-6107\", \"CVE-2018-6108\", \"CVE-2018-6109\", \"CVE-2018-6110\", \"CVE-2018-6111\", \"CVE-2018-6112\", \"CVE-2018-6113\", \"CVE-2018-6114\", \"CVE-2018-6115\", \"CVE-2018-6116\", \"CVE-2018-6117\");\n script_xref(name:\"GLSA\", value:\"201804-22\");\n\n script_name(english:\"GLSA-201804-22 : Chromium, Google Chrome: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201804-22\n(Chromium, Google Chrome: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Chromium and Google\n Chrome. Please review the referenced CVE identifiers and Google Chrome\n Releases for details.\n \nImpact :\n\n A remote attacker could possibly execute arbitrary code with the\n privileges of the process, cause a Denial of Service condition, bypass\n content security controls, or conduct URL spoofing.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n # https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?db76b488\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201804-22\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Chromium users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose\n '>=www-client/chromium-66.0.3359.117'\n All Google Chrome users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose\n '>=www-client/google-chrome-66.0.3359.117'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:google-chrome\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/04/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/04/24\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"www-client/chromium\", unaffected:make_list(\"ge 66.0.3359.117\"), vulnerable:make_list(\"lt 66.0.3359.117\"))) flag++;\nif (qpkg_check(package:\"www-client/google-chrome\", unaffected:make_list(\"ge 66.0.3359.117\"), vulnerable:make_list(\"lt 66.0.3359.117\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Chromium / Google Chrome\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-03-01T02:50:08", "description": "Google Chrome Releases reports :\n\n62 security fixes in this release :\n\n- [826626] Critical CVE-2018-6085: Use after free in Disk Cache.\nReported by Ned Williamson on 2018-03-28\n\n- [827492] Critical CVE-2018-6086: Use after free in Disk Cache.\nReported by Ned Williamson on 2018-03-30\n\n- [813876] High CVE-2018-6087: Use after free in WebAssembly. Reported\nby Anonymous on 2018-02-20\n\n- [822091] High CVE-2018-6088: Use after free in PDFium. Reported by\nAnonymous on 2018-03-15\n\n- [808838] High CVE-2018-6089: Same origin policy bypass in Service\nWorker. Reported by Rob Wu on 2018-02-04\n\n- [820913] High CVE-2018-6090: Heap buffer overflow in Skia. Reported\nby ZhanJia Song on 2018-03-12\n\n- [771933] High CVE-2018-6091: Incorrect handling of plug-ins by\nService Worker. Reported by Jun Kokatsu (@shhnjk) on 2017-10-05\n\n- [819869] High CVE-2018-6092: Integer overflow in WebAssembly.\nReported by Natalie Silvanovich of Google Project Zero on 2018-03-08\n\n- [780435] Medium CVE-2018-6093: Same origin bypass in Service Worker.\nReported by Jun Kokatsu (@shhnjk) on 2017-11-01\n\n- [633030] Medium CVE-2018-6094: Exploit hardening regression in\nOilpan. Reported by Chris Rohlf on 2016-08-01\n\n- [637098] Medium CVE-2018-6095: Lack of meaningful user interaction\nrequirement before file upload. Reported by Abdulrahman Alqabandi\n(@qab) on 2016-08-11\n\n- [776418] Medium CVE-2018-6096: Fullscreen UI spoof. Reported by\nWenXu Wu of Tencent's Xuanwu Lab on 2017-10-19\n\n- [806162] Medium CVE-2018-6097: Fullscreen UI spoof. Reported by\nxisigr of Tencent's Xuanwu Lab on 2018-01-26\n\n- [798892] Medium CVE-2018-6098: URL spoof in Omnibox. Reported by\nKhalil Zhani on 2018-01-03\n\n- [808825] Medium CVE-2018-6099: CORS bypass in ServiceWorker.\nReported by Jun Kokatsu (@shhnjk) on 2018-02-03\n\n- [811117] Medium CVE-2018-6100: URL spoof in Omnibox. Reported by\nLnyas Zhang on 2018-02-11\n\n- [813540] Medium CVE-2018-6101: Insufficient protection of remote\ndebugging prototol in DevTools . Reported by Rob Wu on 2018-02-19\n\n- [813814] Medium CVE-2018-6102: URL spoof in Omnibox. Reported by\nKhalil Zhani on 2018-02-20\n\n- [816033] Medium CVE-2018-6103: UI spoof in Permissions. Reported by\nKhalil Zhani on 2018-02-24\n\n- [820068] Medium CVE-2018-6104: URL spoof in Omnibox. Reported by\nKhalil Zhani on 2018-03-08\n\n- [803571] Medium CVE-2018-6105: URL spoof in Omnibox. Reported by\nKhalil Zhani on 2018-01-18\n\n- [805729] Medium CVE-2018-6106: Incorrect handling of promises in V8.\nReported by lokihardt of Google Project Zero on 2018-01-25\n\n- [808316] Medium CVE-2018-6107: URL spoof in Omnibox. Reported by\nKhalil Zhani on 2018-02-02\n\n- [816769] Medium CVE-2018-6108: URL spoof in Omnibox. Reported by\nKhalil Zhani on 2018-02-27\n\n- [710190] Low CVE-2018-6109: Incorrect handling of files by FileAPI.\nReported by Dominik Weber (@DoWeb_) on 2017-04-10\n\n- [777737] Low CVE-2018-6110: Incorrect handling of plaintext files\nvia file:// . Reported by Wenxiang Qian (aka blastxiang) on 2017-10-24\n\n- [780694] Low CVE-2018-6111: Heap-use-after-free in DevTools.\nReported by Khalil Zhani on 2017-11-02\n\n- [798096] Low CVE-2018-6112: Incorrect URL handling in DevTools.\nReported by Rob Wu on 2017-12-29\n\n- [805900] Low CVE-2018-6113: URL spoof in Navigation. Reported by\nKhalil Zhani on 2018-01-25\n\n- [811691] Low CVE-2018-6114: CSP bypass. Reported by Lnyas Zhang on\n2018-02-13\n\n- [819809] Low CVE-2018-6115: SmartScreen bypass in downloads.\nReported by James Feher on 2018-03-07\n\n- [822266] Low CVE-2018-6116: Incorrect low memory handling in\nWebAssembly. Reported by Jin from Chengdu Security Response Center of\nQihoo 360 Technology Co. Ltd. on 2018-03-15\n\n- [822465] Low CVE-2018-6117: Confusing autofill settings. Reported by\nSpencer Dailey on 2018-03-15\n\n- [822424] Low CVE-2018-6084: Incorrect use of Distributed Objects in\nGoogle Software Updater on MacOS. Reported by Ian Beer of Google\nProject Zero on 2018-03-15", "edition": 29, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2018-04-25T00:00:00", "title": "FreeBSD : chromium -- vulnerability (36ff7a74-47b1-11e8-a7d6-54e1ad544088)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-6084", "CVE-2018-6097", "CVE-2018-6103", "CVE-2018-6099", "CVE-2018-6113", "CVE-2018-6091", "CVE-2018-6104", "CVE-2018-6096", "CVE-2018-6100", "CVE-2018-6098", "CVE-2018-6112", "CVE-2018-6110", "CVE-2018-6108", "CVE-2018-6102", "CVE-2018-6114", "CVE-2018-6117", "CVE-2018-6109", "CVE-2018-6115", "CVE-2018-6095", "CVE-2018-6105", "CVE-2018-6093", "CVE-2018-6087", "CVE-2018-6116", "CVE-2018-6106", "CVE-2018-6090", "CVE-2018-6088", "CVE-2018-6094", "CVE-2018-6089", "CVE-2018-6101", "CVE-2018-6107", "CVE-2018-6086", "CVE-2018-6092", "CVE-2018-6111", "CVE-2018-6085"], "modified": "2021-03-02T00:00:00", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:chromium"], "id": "FREEBSD_PKG_36FF7A7447B111E8A7D654E1AD544088.NASL", "href": "https://www.tenable.com/plugins/nessus/109330", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2019 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(109330);\n script_version(\"1.8\");\n script_cvs_date(\"Date: 2019/07/10 16:04:13\");\n\n script_cve_id(\"CVE-2018-6084\", \"CVE-2018-6085\", \"CVE-2018-6086\", \"CVE-2018-6087\", \"CVE-2018-6088\", \"CVE-2018-6089\", \"CVE-2018-6090\", \"CVE-2018-6091\", \"CVE-2018-6092\", \"CVE-2018-6093\", \"CVE-2018-6094\", \"CVE-2018-6095\", \"CVE-2018-6096\", \"CVE-2018-6097\", \"CVE-2018-6098\", \"CVE-2018-6099\", \"CVE-2018-6100\", \"CVE-2018-6101\", \"CVE-2018-6102\", \"CVE-2018-6103\", \"CVE-2018-6104\", \"CVE-2018-6105\", \"CVE-2018-6106\", \"CVE-2018-6107\", \"CVE-2018-6108\", \"CVE-2018-6109\", \"CVE-2018-6110\", \"CVE-2018-6111\", \"CVE-2018-6112\", \"CVE-2018-6113\", \"CVE-2018-6114\", \"CVE-2018-6115\", \"CVE-2018-6116\", \"CVE-2018-6117\");\n\n script_name(english:\"FreeBSD : chromium -- vulnerability (36ff7a74-47b1-11e8-a7d6-54e1ad544088)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Google Chrome Releases reports :\n\n62 security fixes in this release :\n\n- [826626] Critical CVE-2018-6085: Use after free in Disk Cache.\nReported by Ned Williamson on 2018-03-28\n\n- [827492] Critical CVE-2018-6086: Use after free in Disk Cache.\nReported by Ned Williamson on 2018-03-30\n\n- [813876] High CVE-2018-6087: Use after free in WebAssembly. Reported\nby Anonymous on 2018-02-20\n\n- [822091] High CVE-2018-6088: Use after free in PDFium. Reported by\nAnonymous on 2018-03-15\n\n- [808838] High CVE-2018-6089: Same origin policy bypass in Service\nWorker. Reported by Rob Wu on 2018-02-04\n\n- [820913] High CVE-2018-6090: Heap buffer overflow in Skia. Reported\nby ZhanJia Song on 2018-03-12\n\n- [771933] High CVE-2018-6091: Incorrect handling of plug-ins by\nService Worker. Reported by Jun Kokatsu (@shhnjk) on 2017-10-05\n\n- [819869] High CVE-2018-6092: Integer overflow in WebAssembly.\nReported by Natalie Silvanovich of Google Project Zero on 2018-03-08\n\n- [780435] Medium CVE-2018-6093: Same origin bypass in Service Worker.\nReported by Jun Kokatsu (@shhnjk) on 2017-11-01\n\n- [633030] Medium CVE-2018-6094: Exploit hardening regression in\nOilpan. Reported by Chris Rohlf on 2016-08-01\n\n- [637098] Medium CVE-2018-6095: Lack of meaningful user interaction\nrequirement before file upload. Reported by Abdulrahman Alqabandi\n(@qab) on 2016-08-11\n\n- [776418] Medium CVE-2018-6096: Fullscreen UI spoof. Reported by\nWenXu Wu of Tencent's Xuanwu Lab on 2017-10-19\n\n- [806162] Medium CVE-2018-6097: Fullscreen UI spoof. Reported by\nxisigr of Tencent's Xuanwu Lab on 2018-01-26\n\n- [798892] Medium CVE-2018-6098: URL spoof in Omnibox. Reported by\nKhalil Zhani on 2018-01-03\n\n- [808825] Medium CVE-2018-6099: CORS bypass in ServiceWorker.\nReported by Jun Kokatsu (@shhnjk) on 2018-02-03\n\n- [811117] Medium CVE-2018-6100: URL spoof in Omnibox. Reported by\nLnyas Zhang on 2018-02-11\n\n- [813540] Medium CVE-2018-6101: Insufficient protection of remote\ndebugging prototol in DevTools . Reported by Rob Wu on 2018-02-19\n\n- [813814] Medium CVE-2018-6102: URL spoof in Omnibox. Reported by\nKhalil Zhani on 2018-02-20\n\n- [816033] Medium CVE-2018-6103: UI spoof in Permissions. Reported by\nKhalil Zhani on 2018-02-24\n\n- [820068] Medium CVE-2018-6104: URL spoof in Omnibox. Reported by\nKhalil Zhani on 2018-03-08\n\n- [803571] Medium CVE-2018-6105: URL spoof in Omnibox. Reported by\nKhalil Zhani on 2018-01-18\n\n- [805729] Medium CVE-2018-6106: Incorrect handling of promises in V8.\nReported by lokihardt of Google Project Zero on 2018-01-25\n\n- [808316] Medium CVE-2018-6107: URL spoof in Omnibox. Reported by\nKhalil Zhani on 2018-02-02\n\n- [816769] Medium CVE-2018-6108: URL spoof in Omnibox. Reported by\nKhalil Zhani on 2018-02-27\n\n- [710190] Low CVE-2018-6109: Incorrect handling of files by FileAPI.\nReported by Dominik Weber (@DoWeb_) on 2017-04-10\n\n- [777737] Low CVE-2018-6110: Incorrect handling of plaintext files\nvia file:// . Reported by Wenxiang Qian (aka blastxiang) on 2017-10-24\n\n- [780694] Low CVE-2018-6111: Heap-use-after-free in DevTools.\nReported by Khalil Zhani on 2017-11-02\n\n- [798096] Low CVE-2018-6112: Incorrect URL handling in DevTools.\nReported by Rob Wu on 2017-12-29\n\n- [805900] Low CVE-2018-6113: URL spoof in Navigation. Reported by\nKhalil Zhani on 2018-01-25\n\n- [811691] Low CVE-2018-6114: CSP bypass. Reported by Lnyas Zhang on\n2018-02-13\n\n- [819809] Low CVE-2018-6115: SmartScreen bypass in downloads.\nReported by James Feher on 2018-03-07\n\n- [822266] Low CVE-2018-6116: Incorrect low memory handling in\nWebAssembly. Reported by Jin from Chengdu Security Response Center of\nQihoo 360 Technology Co. Ltd. on 2018-03-15\n\n- [822465] Low CVE-2018-6117: Confusing autofill settings. Reported by\nSpencer Dailey on 2018-03-15\n\n- [822424] Low CVE-2018-6084: Incorrect use of Distributed Objects in\nGoogle Software Updater on MacOS. Reported by Ian Beer of Google\nProject Zero on 2018-03-15\"\n );\n # https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?db76b488\"\n );\n # https://vuxml.freebsd.org/freebsd/36ff7a74-47b1-11e8-a7d6-54e1ad544088.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?288bbd0c\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/04/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/04/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/04/25\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"chromium<66.0.3359.117\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-03-01T03:22:51", "description": "The version of Google Chrome installed on the remote Windows host is\nprior to 66.0.3359.117. It is, therefore, affected by a multiple\nunspecified vulnerabilities as noted in Chrome stable channel update\nrelease notes for April 17th, 2018. Please refer to the release notes\nfor additional information.\n\nNote that Nessus has not attempted to exploit these issues but has\ninstead relied only on the application's self-reported version number.", "edition": 27, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-04-27T00:00:00", "title": "Google Chrome < 66.0.3359.117 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-6084", "CVE-2018-6097", "CVE-2018-6103", "CVE-2018-6099", "CVE-2018-6113", "CVE-2018-6091", "CVE-2018-6104", "CVE-2018-6096", "CVE-2018-6100", "CVE-2018-6098", "CVE-2018-6112", "CVE-2018-6110", "CVE-2018-6108", "CVE-2018-6102", "CVE-2018-6114", "CVE-2018-6117", "CVE-2018-6109", "CVE-2018-6115", "CVE-2018-6095", "CVE-2018-6105", "CVE-2018-6093", "CVE-2018-6087", "CVE-2018-6116", "CVE-2018-6106", "CVE-2018-6090", "CVE-2018-6088", "CVE-2018-6094", "CVE-2018-6089", "CVE-2018-6101", "CVE-2018-6107", "CVE-2018-6086", "CVE-2018-6092", "CVE-2018-6111", "CVE-2018-6085"], "modified": "2021-03-02T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "GOOGLE_CHROME_66_0_3359_117.NASL", "href": "https://www.tenable.com/plugins/nessus/109395", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(109395);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/11/08\");\n\n script_cve_id(\n \"CVE-2018-6084\",\n \"CVE-2018-6085\",\n \"CVE-2018-6086\",\n \"CVE-2018-6087\",\n \"CVE-2018-6088\",\n \"CVE-2018-6089\",\n \"CVE-2018-6090\",\n \"CVE-2018-6091\",\n \"CVE-2018-6092\",\n \"CVE-2018-6093\",\n \"CVE-2018-6094\",\n \"CVE-2018-6095\",\n \"CVE-2018-6096\",\n \"CVE-2018-6097\",\n \"CVE-2018-6098\",\n \"CVE-2018-6099\",\n \"CVE-2018-6100\",\n \"CVE-2018-6101\",\n \"CVE-2018-6102\",\n \"CVE-2018-6103\",\n \"CVE-2018-6104\",\n \"CVE-2018-6105\",\n \"CVE-2018-6106\",\n \"CVE-2018-6107\",\n \"CVE-2018-6108\",\n \"CVE-2018-6109\",\n \"CVE-2018-6110\",\n \"CVE-2018-6111\",\n \"CVE-2018-6112\",\n \"CVE-2018-6113\",\n \"CVE-2018-6114\",\n \"CVE-2018-6115\",\n \"CVE-2018-6116\",\n \"CVE-2018-6117\"\n );\n script_bugtraq_id(103917);\n\n script_name(english:\"Google Chrome < 66.0.3359.117 Multiple Vulnerabilities\");\n script_summary(english:\"Checks the version of Google Chrome.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A web browser installed on the remote Windows host is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote Windows host is\nprior to 66.0.3359.117. It is, therefore, affected by a multiple\nunspecified vulnerabilities as noted in Chrome stable channel update\nrelease notes for April 17th, 2018. Please refer to the release notes\nfor additional information.\n\nNote that Nessus has not attempted to exploit these issues but has\ninstead relied only on the application's self-reported version number.\");\n # https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?db76b488\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome version 66.0.3359.117 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-6084\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/04/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/04/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/04/27\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"google_chrome_installed.nasl\");\n script_require_keys(\"SMB/Google_Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"SMB/Google_Chrome/Installed\");\ninstalls = get_kb_list(\"SMB/Google_Chrome/*\");\n\ngoogle_chrome_check_version(installs:installs, fix:'66.0.3359.117', severity:SECURITY_HOLE);\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-03-01T03:49:47", "description": "The version of Google Chrome installed on the remote host is prior\nto 66.0.3359.117. It is, therefore, affected by multiple unspecified\nvulnerabilities as noted in Chrome stable channel update release notes\nfor April 17th, 2018. Please refer to the release notes for additional\ninformation.\n\nNote that Nessus has not attempted to exploit these issues but has\ninstead relied only on the application's self-reported version number.", "edition": 27, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-04-27T00:00:00", "title": "Google Chrome < 66.0.3359.117 Multiple Vulnerabilities (macOS)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-6084", "CVE-2018-6097", "CVE-2018-6103", "CVE-2018-6099", "CVE-2018-6113", "CVE-2018-6091", "CVE-2018-6104", "CVE-2018-6096", "CVE-2018-6100", "CVE-2018-6098", "CVE-2018-6112", "CVE-2018-6110", "CVE-2018-6108", "CVE-2018-6102", "CVE-2018-6114", "CVE-2018-6117", "CVE-2018-6109", "CVE-2018-6115", "CVE-2018-6095", "CVE-2018-6105", "CVE-2018-6093", "CVE-2018-6087", "CVE-2018-6116", "CVE-2018-6106", "CVE-2018-6090", "CVE-2018-6088", "CVE-2018-6094", "CVE-2018-6089", "CVE-2018-6101", "CVE-2018-6107", "CVE-2018-6086", "CVE-2018-6092", "CVE-2018-6111", "CVE-2018-6085"], "modified": "2021-03-02T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "MACOSX_GOOGLE_CHROME_66_0_3359_117.NASL", "href": "https://www.tenable.com/plugins/nessus/109396", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(109396);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/11/08\");\n\n script_cve_id(\n \"CVE-2018-6084\",\n \"CVE-2018-6085\",\n \"CVE-2018-6086\",\n \"CVE-2018-6087\",\n \"CVE-2018-6088\",\n \"CVE-2018-6089\",\n \"CVE-2018-6090\",\n \"CVE-2018-6091\",\n \"CVE-2018-6092\",\n \"CVE-2018-6093\",\n \"CVE-2018-6094\",\n \"CVE-2018-6095\",\n \"CVE-2018-6096\",\n \"CVE-2018-6097\",\n \"CVE-2018-6098\",\n \"CVE-2018-6099\",\n \"CVE-2018-6100\",\n \"CVE-2018-6101\",\n \"CVE-2018-6102\",\n \"CVE-2018-6103\",\n \"CVE-2018-6104\",\n \"CVE-2018-6105\",\n \"CVE-2018-6106\",\n \"CVE-2018-6107\",\n \"CVE-2018-6108\",\n \"CVE-2018-6109\",\n \"CVE-2018-6110\",\n \"CVE-2018-6111\",\n \"CVE-2018-6112\",\n \"CVE-2018-6113\",\n \"CVE-2018-6114\",\n \"CVE-2018-6115\",\n \"CVE-2018-6116\",\n \"CVE-2018-6117\"\n );\n script_bugtraq_id(103917);\n\n script_name(english:\"Google Chrome < 66.0.3359.117 Multiple Vulnerabilities (macOS)\");\n script_summary(english:\"Checks the version of Google Chrome.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A web browser installed on the remote host is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote host is prior\nto 66.0.3359.117. It is, therefore, affected by multiple unspecified\nvulnerabilities as noted in Chrome stable channel update release notes\nfor April 17th, 2018. Please refer to the release notes for additional\ninformation.\n\nNote that Nessus has not attempted to exploit these issues but has\ninstead relied only on the application's self-reported version number.\");\n # https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?db76b488\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome version 66.0.3359.117 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-6084\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/04/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/04/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/04/27\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_google_chrome_installed.nbin\");\n script_require_keys(\"MacOSX/Google Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"MacOSX/Google Chrome/Installed\");\n\ngoogle_chrome_check_version(fix:'66.0.3359.117', severity:SECURITY_HOLE);\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-05-31T20:14:42", "description": "An update for chromium-browser is now available for Red Hat Enterprise\nLinux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Critical. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nChromium is an open source web browser, powered by WebKit (Blink).\n\nThis update upgrades Chromium to version 66.0.3359.117.\n\nSecurity Fix(es) :\n\n* chromium-browser: Use after free in Disk Cache (CVE-2018-6085)\n\n* chromium-browser: Use after free in Disk Cache (CVE-2018-6086)\n\n* chromium-browser: Use after free in WebAssembly (CVE-2018-6087)\n\n* chromium-browser: Use after free in PDFium (CVE-2018-6088)\n\n* chromium-browser: Same origin policy bypass in Service Worker\n(CVE-2018-6089)\n\n* chromium-browser: Heap buffer overflow in Skia (CVE-2018-6090)\n\n* chromium-browser: Incorrect handling of plug-ins by Service Worker\n(CVE-2018-6091)\n\n* chromium-browser: Integer overflow in WebAssembly (CVE-2018-6092)\n\n* chromium-browser: Same origin bypass in Service Worker\n(CVE-2018-6093)\n\n* chromium-browser: Exploit hardening regression in Oilpan\n(CVE-2018-6094)\n\n* chromium-browser: Lack of meaningful user interaction requirement\nbefore file upload (CVE-2018-6095)\n\n* chromium-browser: Fullscreen UI spoof (CVE-2018-6096)\n\n* chromium-browser: Fullscreen UI spoof (CVE-2018-6097)\n\n* chromium-browser: URL spoof in Omnibox (CVE-2018-6098)\n\n* chromium-browser: CORS bypass in ServiceWorker (CVE-2018-6099)\n\n* chromium-browser: URL spoof in Omnibox (CVE-2018-6100)\n\n* chromium-browser: Insufficient protection of remote debugging\nprototol in DevTools (CVE-2018-6101)\n\n* chromium-browser: URL spoof in Omnibox (CVE-2018-6102)\n\n* chromium-browser: UI spoof in Permissions (CVE-2018-6103)\n\n* chromium-browser: URL spoof in Omnibox (CVE-2018-6104)\n\n* chromium-browser: URL spoof in Omnibox (CVE-2018-6105)\n\n* chromium-browser: Incorrect handling of promises in V8\n(CVE-2018-6106)\n\n* chromium-browser: URL spoof in Omnibox (CVE-2018-6107)\n\n* chromium-browser: URL spoof in Omnibox (CVE-2018-6108)\n\n* chromium-browser: Incorrect handling of files by FileAPI\n(CVE-2018-6109)\n\n* chromium-browser: Incorrect handling of plaintext files via file://\n(CVE-2018-6110)\n\n* chromium-browser: Heap-use-after-free in DevTools (CVE-2018-6111)\n\n* chromium-browser: Incorrect URL handling in DevTools (CVE-2018-6112)\n\n* chromium-browser: URL spoof in Navigation (CVE-2018-6113)\n\n* chromium-browser: CSP bypass (CVE-2018-6114)\n\n* chromium-browser: Incorrect low memory handling in WebAssembly\n(CVE-2018-6116)\n\n* chromium-browser: Confusing autofill settings (CVE-2018-6117)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, and other related information, refer to the CVE page(s)\nlisted in the References section.", "edition": 18, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2018-04-24T00:00:00", "title": "RHEL 6 : chromium-browser (RHSA-2018:1195)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-6097", "CVE-2018-6103", "CVE-2018-6099", "CVE-2018-6113", "CVE-2018-6091", "CVE-2018-6104", "CVE-2018-6096", "CVE-2018-6100", "CVE-2018-6098", "CVE-2018-6112", "CVE-2018-6110", "CVE-2018-6108", "CVE-2018-6102", "CVE-2018-6114", "CVE-2018-6117", "CVE-2018-6109", "CVE-2018-6095", "CVE-2018-6105", "CVE-2018-6093", "CVE-2018-6087", "CVE-2018-6116", "CVE-2018-6106", "CVE-2018-6090", "CVE-2018-6088", "CVE-2018-6094", "CVE-2018-6089", "CVE-2018-6101", "CVE-2018-6107", "CVE-2018-6086", "CVE-2018-6092", "CVE-2018-6111", "CVE-2018-6085"], "modified": "2018-04-24T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:chromium-browser-debuginfo", "p-cpe:/a:redhat:enterprise_linux:chromium-browser", "cpe:/o:redhat:enterprise_linux:6"], "id": "REDHAT-RHSA-2018-1195.NASL", "href": "https://www.tenable.com/plugins/nessus/109299", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2018:1195. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(109299);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/05/29\");\n\n script_cve_id(\"CVE-2018-6085\", \"CVE-2018-6086\", \"CVE-2018-6087\", \"CVE-2018-6088\", \"CVE-2018-6089\", \"CVE-2018-6090\", \"CVE-2018-6091\", \"CVE-2018-6092\", \"CVE-2018-6093\", \"CVE-2018-6094\", \"CVE-2018-6095\", \"CVE-2018-6096\", \"CVE-2018-6097\", \"CVE-2018-6098\", \"CVE-2018-6099\", \"CVE-2018-6100\", \"CVE-2018-6101\", \"CVE-2018-6102\", \"CVE-2018-6103\", \"CVE-2018-6104\", \"CVE-2018-6105\", \"CVE-2018-6106\", \"CVE-2018-6107\", \"CVE-2018-6108\", \"CVE-2018-6109\", \"CVE-2018-6110\", \"CVE-2018-6111\", \"CVE-2018-6112\", \"CVE-2018-6113\", \"CVE-2018-6114\", \"CVE-2018-6116\", \"CVE-2018-6117\");\n script_xref(name:\"RHSA\", value:\"2018:1195\");\n\n script_name(english:\"RHEL 6 : chromium-browser (RHSA-2018:1195)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"An update for chromium-browser is now available for Red Hat Enterprise\nLinux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Critical. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nChromium is an open source web browser, powered by WebKit (Blink).\n\nThis update upgrades Chromium to version 66.0.3359.117.\n\nSecurity Fix(es) :\n\n* chromium-browser: Use after free in Disk Cache (CVE-2018-6085)\n\n* chromium-browser: Use after free in Disk Cache (CVE-2018-6086)\n\n* chromium-browser: Use after free in WebAssembly (CVE-2018-6087)\n\n* chromium-browser: Use after free in PDFium (CVE-2018-6088)\n\n* chromium-browser: Same origin policy bypass in Service Worker\n(CVE-2018-6089)\n\n* chromium-browser: Heap buffer overflow in Skia (CVE-2018-6090)\n\n* chromium-browser: Incorrect handling of plug-ins by Service Worker\n(CVE-2018-6091)\n\n* chromium-browser: Integer overflow in WebAssembly (CVE-2018-6092)\n\n* chromium-browser: Same origin bypass in Service Worker\n(CVE-2018-6093)\n\n* chromium-browser: Exploit hardening regression in Oilpan\n(CVE-2018-6094)\n\n* chromium-browser: Lack of meaningful user interaction requirement\nbefore file upload (CVE-2018-6095)\n\n* chromium-browser: Fullscreen UI spoof (CVE-2018-6096)\n\n* chromium-browser: Fullscreen UI spoof (CVE-2018-6097)\n\n* chromium-browser: URL spoof in Omnibox (CVE-2018-6098)\n\n* chromium-browser: CORS bypass in ServiceWorker (CVE-2018-6099)\n\n* chromium-browser: URL spoof in Omnibox (CVE-2018-6100)\n\n* chromium-browser: Insufficient protection of remote debugging\nprototol in DevTools (CVE-2018-6101)\n\n* chromium-browser: URL spoof in Omnibox (CVE-2018-6102)\n\n* chromium-browser: UI spoof in Permissions (CVE-2018-6103)\n\n* chromium-browser: URL spoof in Omnibox (CVE-2018-6104)\n\n* chromium-browser: URL spoof in Omnibox (CVE-2018-6105)\n\n* chromium-browser: Incorrect handling of promises in V8\n(CVE-2018-6106)\n\n* chromium-browser: URL spoof in Omnibox (CVE-2018-6107)\n\n* chromium-browser: URL spoof in Omnibox (CVE-2018-6108)\n\n* chromium-browser: Incorrect handling of files by FileAPI\n(CVE-2018-6109)\n\n* chromium-browser: Incorrect handling of plaintext files via file://\n(CVE-2018-6110)\n\n* chromium-browser: Heap-use-after-free in DevTools (CVE-2018-6111)\n\n* chromium-browser: Incorrect URL handling in DevTools (CVE-2018-6112)\n\n* chromium-browser: URL spoof in Navigation (CVE-2018-6113)\n\n* chromium-browser: CSP bypass (CVE-2018-6114)\n\n* chromium-browser: Incorrect low memory handling in WebAssembly\n(CVE-2018-6116)\n\n* chromium-browser: Confusing autofill settings (CVE-2018-6117)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, and other related information, refer to the CVE page(s)\nlisted in the References section.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2018:1195\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6085\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6086\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6087\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6088\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6089\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6090\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6091\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6092\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6093\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6094\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6095\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6096\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6097\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6098\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6099\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6100\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6101\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6102\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6103\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6104\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6105\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6106\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6107\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6108\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6109\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6110\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6111\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6112\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6113\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6114\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6116\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6117\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"Update the affected chromium-browser and / or\nchromium-browser-debuginfo packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:chromium-browser\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:chromium-browser-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/12/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/04/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/04/24\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2018:1195\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"chromium-browser-66.0.3359.117-1.el6_9\", allowmaj:TRUE)) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"chromium-browser-66.0.3359.117-1.el6_9\", allowmaj:TRUE)) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"chromium-browser-debuginfo-66.0.3359.117-1.el6_9\", allowmaj:TRUE)) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"chromium-browser-debuginfo-66.0.3359.117-1.el6_9\", allowmaj:TRUE)) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromium-browser / chromium-browser-debuginfo\");\n }\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-03-01T02:52:20", "description": "Google Chrome Releases reports :\n\n45 security fixes in this release :\n\n- [758848] High CVE-2017-11215: Use after free in Flash. Reported by\nJieZeng of Tencent Zhanlu Lab on 2017-08-25\n\n- [758863] High CVE-2017-11225: Use after free in Flash. Reported by\nJieZeng of Tencent Zhanlu Lab on 2017-08-25\n\n- [780919] High CVE-2018-6060: Use after free in Blink. Reported by\nOmair on 2017-11-02\n\n- [794091] High CVE-2018-6061: Race condition in V8. Reported by Guang\nGong of Alpha Team, Qihoo 360 on 2017-12-12\n\n- [780104] High CVE-2018-6062: Heap buffer overflow in Skia. Reported\nby Anonymous on 2017-10-31\n\n- [789959] High CVE-2018-6057: Incorrect permissions on shared memory.\nReported by Gal Beniamini of Google Project Zero on 2017-11-30\n\n- [792900] High CVE-2018-6063: Incorrect permissions on shared memory.\nReported by Gal Beniamini of Google Project Zero on 2017-12-07\n\n- [798644] High CVE-2018-6064: Type confusion in V8. Reported by\nlokihardt of Google Project Zero on 2018-01-03\n\n- [808192] High CVE-2018-6065: Integer overflow in V8. Reported by\nMark Brand of Google Project Zero on 2018-02-01\n\n- [799477] Medium CVE-2018-6066: Same Origin Bypass via canvas.\nReported by Masato Kinugawa on 2018-01-05\n\n- [779428] Medium CVE-2018-6067: Buffer overflow in Skia. Reported by\nNed Williamson on 2017-10-30\n\n- [779428] Medium CVE-2018-6067: Buffer overflow in Skia. Reported by\nNed Williamson on 2017-10-30\n\n- [799918] Medium CVE-2018-6069: Stack buffer overflow in Skia.\nReported by Wanglu and Yangkang(@dnpushme) of Qihoo360 Qex Team on\n2018-01-08\n\n- [668645] Medium CVE-2018-6070: CSP bypass through extensions.\nReported by Rob Wu on 2016-11-25\n\n- [777318] Medium CVE-2018-6071: Heap bufffer overflow in Skia.\nReported by Anonymous on 2017-10-23\n\n- [791048] Medium CVE-2018-6072: Integer overflow in PDFium. Reported\nby Atte Kettunen of OUSPG on 2017-12-01\n\n- [804118] Medium CVE-2018-6073: Heap bufffer overflow in WebGL.\nReported by Omair on 2018-01-20\n\n- [809759] Medium CVE-2018-6074: Mark-of-the-Web bypass. Reported by\nAbdulrahman Alqabandi (@qab) on 2018-02-06\n\n- [608669] Medium CVE-2018-6075: Overly permissive cross origin\ndownloads. Reported by Inti De Ceukelaire (intigriti.com) on\n2016-05-03\n\n- [758523] Medium CVE-2018-6076: Incorrect handling of URL fragment\nidentifiers in Blink. Reported by Mateusz Krzeszowiec on 2017-08-24\n\n- [778506] Medium CVE-2018-6077: Timing attack using SVG filters.\nReported by Khalil Zhani on 2017-10-26\n\n- [793628] Medium CVE-2018-6078: URL Spoof in OmniBox. Reported by\nKhalil Zhani on 2017-12-10\n\n- [788448] Medium CVE-2018-6079: Information disclosure via texture\ndata in WebGL. Reported by Ivars Atteka on 2017-11-24\n\n- [792028] Medium CVE-2018-6080: Information disclosure in IPC call.\nReported by Gal Beniamini of Google Project Zero on 2017-12-05\n\n- [797525] Low CVE-2018-6081: XSS in interstitials. Reported by Rob Wu\non 2017-12-24\n\n- [767354] Low CVE-2018-6082: Circumvention of port blocking. Reported\nby WenXu Wu of Tencent's Xuanwu Lab on 2017-09-21\n\n- [771709] Low CVE-2018-6083: Incorrect processing of AppManifests.\nReported by Jun Kokatsu (@shhnjk) on 2017-10-04", "edition": 27, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-03-09T00:00:00", "title": "FreeBSD : chromium -- vulnerability (555af074-22b9-11e8-9799-54ee754af08e)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-6069", "CVE-2018-6078", "CVE-2018-6081", "CVE-2017-11215", "CVE-2018-6080", "CVE-2018-6083", "CVE-2018-6082", "CVE-2018-6057", "CVE-2018-6070", "CVE-2018-6074", "CVE-2018-6073", "CVE-2018-6061", "CVE-2018-6072", "CVE-2018-6065", "CVE-2017-11225", "CVE-2018-6062", "CVE-2018-6067", "CVE-2018-6071", "CVE-2018-6066", "CVE-2018-6075", "CVE-2018-6064", "CVE-2018-6077", "CVE-2018-6076", "CVE-2018-6079", "CVE-2018-6060", "CVE-2018-6063"], "modified": "2021-03-02T00:00:00", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:chromium"], "id": "FREEBSD_PKG_555AF07422B911E8979954EE754AF08E.NASL", "href": "https://www.tenable.com/plugins/nessus/107243", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2019 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(107243);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2019/07/10 16:04:13\");\n\n script_cve_id(\"CVE-2017-11215\", \"CVE-2017-11225\", \"CVE-2018-6057\", \"CVE-2018-6060\", \"CVE-2018-6061\", \"CVE-2018-6062\", \"CVE-2018-6063\", \"CVE-2018-6064\", \"CVE-2018-6065\", \"CVE-2018-6066\", \"CVE-2018-6067\", \"CVE-2018-6069\", \"CVE-2018-6070\", \"CVE-2018-6071\", \"CVE-2018-6072\", \"CVE-2018-6073\", \"CVE-2018-6074\", \"CVE-2018-6075\", \"CVE-2018-6076\", \"CVE-2018-6077\", \"CVE-2018-6078\", \"CVE-2018-6079\", \"CVE-2018-6080\", \"CVE-2018-6081\", \"CVE-2018-6082\", \"CVE-2018-6083\");\n\n script_name(english:\"FreeBSD : chromium -- vulnerability (555af074-22b9-11e8-9799-54ee754af08e)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Google Chrome Releases reports :\n\n45 security fixes in this release :\n\n- [758848] High CVE-2017-11215: Use after free in Flash. Reported by\nJieZeng of Tencent Zhanlu Lab on 2017-08-25\n\n- [758863] High CVE-2017-11225: Use after free in Flash. Reported by\nJieZeng of Tencent Zhanlu Lab on 2017-08-25\n\n- [780919] High CVE-2018-6060: Use after free in Blink. Reported by\nOmair on 2017-11-02\n\n- [794091] High CVE-2018-6061: Race condition in V8. Reported by Guang\nGong of Alpha Team, Qihoo 360 on 2017-12-12\n\n- [780104] High CVE-2018-6062: Heap buffer overflow in Skia. Reported\nby Anonymous on 2017-10-31\n\n- [789959] High CVE-2018-6057: Incorrect permissions on shared memory.\nReported by Gal Beniamini of Google Project Zero on 2017-11-30\n\n- [792900] High CVE-2018-6063: Incorrect permissions on shared memory.\nReported by Gal Beniamini of Google Project Zero on 2017-12-07\n\n- [798644] High CVE-2018-6064: Type confusion in V8. Reported by\nlokihardt of Google Project Zero on 2018-01-03\n\n- [808192] High CVE-2018-6065: Integer overflow in V8. Reported by\nMark Brand of Google Project Zero on 2018-02-01\n\n- [799477] Medium CVE-2018-6066: Same Origin Bypass via canvas.\nReported by Masato Kinugawa on 2018-01-05\n\n- [779428] Medium CVE-2018-6067: Buffer overflow in Skia. Reported by\nNed Williamson on 2017-10-30\n\n- [779428] Medium CVE-2018-6067: Buffer overflow in Skia. Reported by\nNed Williamson on 2017-10-30\n\n- [799918] Medium CVE-2018-6069: Stack buffer overflow in Skia.\nReported by Wanglu and Yangkang(@dnpushme) of Qihoo360 Qex Team on\n2018-01-08\n\n- [668645] Medium CVE-2018-6070: CSP bypass through extensions.\nReported by Rob Wu on 2016-11-25\n\n- [777318] Medium CVE-2018-6071: Heap bufffer overflow in Skia.\nReported by Anonymous on 2017-10-23\n\n- [791048] Medium CVE-2018-6072: Integer overflow in PDFium. Reported\nby Atte Kettunen of OUSPG on 2017-12-01\n\n- [804118] Medium CVE-2018-6073: Heap bufffer overflow in WebGL.\nReported by Omair on 2018-01-20\n\n- [809759] Medium CVE-2018-6074: Mark-of-the-Web bypass. Reported by\nAbdulrahman Alqabandi (@qab) on 2018-02-06\n\n- [608669] Medium CVE-2018-6075: Overly permissive cross origin\ndownloads. Reported by Inti De Ceukelaire (intigriti.com) on\n2016-05-03\n\n- [758523] Medium CVE-2018-6076: Incorrect handling of URL fragment\nidentifiers in Blink. Reported by Mateusz Krzeszowiec on 2017-08-24\n\n- [778506] Medium CVE-2018-6077: Timing attack using SVG filters.\nReported by Khalil Zhani on 2017-10-26\n\n- [793628] Medium CVE-2018-6078: URL Spoof in OmniBox. Reported by\nKhalil Zhani on 2017-12-10\n\n- [788448] Medium CVE-2018-6079: Information disclosure via texture\ndata in WebGL. Reported by Ivars Atteka on 2017-11-24\n\n- [792028] Medium CVE-2018-6080: Information disclosure in IPC call.\nReported by Gal Beniamini of Google Project Zero on 2017-12-05\n\n- [797525] Low CVE-2018-6081: XSS in interstitials. Reported by Rob Wu\non 2017-12-24\n\n- [767354] Low CVE-2018-6082: Circumvention of port blocking. Reported\nby WenXu Wu of Tencent's Xuanwu Lab on 2017-09-21\n\n- [771709] Low CVE-2018-6083: Incorrect processing of AppManifests.\nReported by Jun Kokatsu (@shhnjk) on 2017-10-04\"\n );\n # https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?68129919\"\n );\n # https://vuxml.freebsd.org/freebsd/555af074-22b9-11e8-9799-54ee754af08e.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d451c55d\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/05/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/03/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/03/09\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"chromium<65.0.3325.146\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-07T10:19:43", "description": "Update to 66.0.3359.181. Security fix for CVE-2018-6085 CVE-2018-6086\nCVE-2018-6087 CVE-2018-6088 CVE-2018-6089 CVE-2018-6090 CVE-2018-6091\nCVE-2018-6092 CVE-2018-6093 CVE-2018-6094 CVE-2018-6095 CVE-2018-6096\nCVE-2018-6097 CVE-2018-6098 CVE-2018-6099 CVE-2018-6100 CVE-2018-6101\nCVE-2018-6102 CVE-2018-6103 CVE-2018-6104 CVE-2018-6105 CVE-2018-6106\nCVE-2018-6107 CVE-2018-6108 CVE-2018-6109 CVE-2018-6110 CVE-2018-6111\nCVE-2018-6112 CVE-2018-6113 CVE-2018-6114 CVE-2018-6116 CVE-2018-6117\nCVE-2018-6118 CVE-2018-6121 CVE-2018-6122 CVE-2018-6120\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 14, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-01-03T00:00:00", "title": "Fedora 28 : chromium (2018-94e1bc8c23)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-6097", "CVE-2018-6103", "CVE-2018-6099", "CVE-2018-6120", "CVE-2018-6113", "CVE-2018-6091", "CVE-2018-6104", "CVE-2018-6096", "CVE-2018-6100", "CVE-2018-6098", "CVE-2018-6112", "CVE-2018-6110", "CVE-2018-6108", "CVE-2018-6102", "CVE-2018-6114", "CVE-2018-6117", "CVE-2018-6118", "CVE-2018-6109", "CVE-2018-6115", "CVE-2018-6122", "CVE-2018-6095", "CVE-2018-6105", "CVE-2018-6093", "CVE-2018-6087", "CVE-2018-6116", "CVE-2018-6106", "CVE-2018-6090", "CVE-2018-6088", "CVE-2018-6094", "CVE-2018-6089", "CVE-2018-6101", "CVE-2018-6107", "CVE-2018-6086", "CVE-2018-6092", "CVE-2018-6121", "CVE-2018-6111", "CVE-2018-6085"], "modified": "2019-01-03T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:chromium", "cpe:/o:fedoraproject:fedora:28"], "id": "FEDORA_2018-94E1BC8C23.NASL", "href": "https://www.tenable.com/plugins/nessus/120630", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2018-94e1bc8c23.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(120630);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2018-6085\", \"CVE-2018-6086\", \"CVE-2018-6087\", \"CVE-2018-6088\", \"CVE-2018-6089\", \"CVE-2018-6090\", \"CVE-2018-6091\", \"CVE-2018-6092\", \"CVE-2018-6093\", \"CVE-2018-6094\", \"CVE-2018-6095\", \"CVE-2018-6096\", \"CVE-2018-6097\", \"CVE-2018-6098\", \"CVE-2018-6099\", \"CVE-2018-6100\", \"CVE-2018-6101\", \"CVE-2018-6102\", \"CVE-2018-6103\", \"CVE-2018-6104\", \"CVE-2018-6105\", \"CVE-2018-6106\", \"CVE-2018-6107\", \"CVE-2018-6108\", \"CVE-2018-6109\", \"CVE-2018-6110\", \"CVE-2018-6111\", \"CVE-2018-6112\", \"CVE-2018-6113\", \"CVE-2018-6114\", \"CVE-2018-6115\", \"CVE-2018-6116\", \"CVE-2018-6117\", \"CVE-2018-6118\", \"CVE-2018-6120\", \"CVE-2018-6121\", \"CVE-2018-6122\");\n script_xref(name:\"FEDORA\", value:\"2018-94e1bc8c23\");\n\n script_name(english:\"Fedora 28 : chromium (2018-94e1bc8c23)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Update to 66.0.3359.181. Security fix for CVE-2018-6085 CVE-2018-6086\nCVE-2018-6087 CVE-2018-6088 CVE-2018-6089 CVE-2018-6090 CVE-2018-6091\nCVE-2018-6092 CVE-2018-6093 CVE-2018-6094 CVE-2018-6095 CVE-2018-6096\nCVE-2018-6097 CVE-2018-6098 CVE-2018-6099 CVE-2018-6100 CVE-2018-6101\nCVE-2018-6102 CVE-2018-6103 CVE-2018-6104 CVE-2018-6105 CVE-2018-6106\nCVE-2018-6107 CVE-2018-6108 CVE-2018-6109 CVE-2018-6110 CVE-2018-6111\nCVE-2018-6112 CVE-2018-6113 CVE-2018-6114 CVE-2018-6116 CVE-2018-6117\nCVE-2018-6118 CVE-2018-6121 CVE-2018-6122 CVE-2018-6120\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2018-94e1bc8c23\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected chromium package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:28\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/12/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/05/31\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/01/03\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^28([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 28\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC28\", reference:\"chromium-66.0.3359.181-2.fc28\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromium\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T10:19:01", "description": "Update to 66.0.3359.181. Security fix for CVE-2018-6085 CVE-2018-6086\nCVE-2018-6087 CVE-2018-6088 CVE-2018-6089 CVE-2018-6090 CVE-2018-6091\nCVE-2018-6092 CVE-2018-6093 CVE-2018-6094 CVE-2018-6095 CVE-2018-6096\nCVE-2018-6097 CVE-2018-6098 CVE-2018-6099 CVE-2018-6100 CVE-2018-6101\nCVE-2018-6102 CVE-2018-6103 CVE-2018-6104 CVE-2018-6105 CVE-2018-6106\nCVE-2018-6107 CVE-2018-6108 CVE-2018-6109 CVE-2018-6110 CVE-2018-6111\nCVE-2018-6112 CVE-2018-6113 CVE-2018-6114 CVE-2018-6116 CVE-2018-6117\nCVE-2018-6118 CVE-2018-6121 CVE-2018-6122 CVE-2018-6120\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 16, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2018-06-06T00:00:00", "title": "Fedora 27 : chromium (2018-812b5d5a71)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-6097", "CVE-2018-6103", "CVE-2018-6099", "CVE-2018-6120", "CVE-2018-6113", "CVE-2018-6091", "CVE-2018-6104", "CVE-2018-6096", "CVE-2018-6100", "CVE-2018-6098", "CVE-2018-6112", "CVE-2018-6110", "CVE-2018-6108", "CVE-2018-6102", "CVE-2018-6114", "CVE-2018-6117", "CVE-2018-6118", "CVE-2018-6109", "CVE-2018-6115", "CVE-2018-6122", "CVE-2018-6095", "CVE-2018-6105", "CVE-2018-6093", "CVE-2018-6087", "CVE-2018-6116", "CVE-2018-6106", "CVE-2018-6090", "CVE-2018-6088", "CVE-2018-6094", "CVE-2018-6089", "CVE-2018-6101", "CVE-2018-6107", "CVE-2018-6086", "CVE-2018-6092", "CVE-2018-6121", "CVE-2018-6111", "CVE-2018-6085"], "modified": "2018-06-06T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:27", "p-cpe:/a:fedoraproject:fedora:chromium"], "id": "FEDORA_2018-812B5D5A71.NASL", "href": "https://www.tenable.com/plugins/nessus/110327", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2018-812b5d5a71.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(110327);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2018-6085\", \"CVE-2018-6086\", \"CVE-2018-6087\", \"CVE-2018-6088\", \"CVE-2018-6089\", \"CVE-2018-6090\", \"CVE-2018-6091\", \"CVE-2018-6092\", \"CVE-2018-6093\", \"CVE-2018-6094\", \"CVE-2018-6095\", \"CVE-2018-6096\", \"CVE-2018-6097\", \"CVE-2018-6098\", \"CVE-2018-6099\", \"CVE-2018-6100\", \"CVE-2018-6101\", \"CVE-2018-6102\", \"CVE-2018-6103\", \"CVE-2018-6104\", \"CVE-2018-6105\", \"CVE-2018-6106\", \"CVE-2018-6107\", \"CVE-2018-6108\", \"CVE-2018-6109\", \"CVE-2018-6110\", \"CVE-2018-6111\", \"CVE-2018-6112\", \"CVE-2018-6113\", \"CVE-2018-6114\", \"CVE-2018-6115\", \"CVE-2018-6116\", \"CVE-2018-6117\", \"CVE-2018-6118\", \"CVE-2018-6120\", \"CVE-2018-6121\", \"CVE-2018-6122\");\n script_xref(name:\"FEDORA\", value:\"2018-812b5d5a71\");\n\n script_name(english:\"Fedora 27 : chromium (2018-812b5d5a71)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Update to 66.0.3359.181. Security fix for CVE-2018-6085 CVE-2018-6086\nCVE-2018-6087 CVE-2018-6088 CVE-2018-6089 CVE-2018-6090 CVE-2018-6091\nCVE-2018-6092 CVE-2018-6093 CVE-2018-6094 CVE-2018-6095 CVE-2018-6096\nCVE-2018-6097 CVE-2018-6098 CVE-2018-6099 CVE-2018-6100 CVE-2018-6101\nCVE-2018-6102 CVE-2018-6103 CVE-2018-6104 CVE-2018-6105 CVE-2018-6106\nCVE-2018-6107 CVE-2018-6108 CVE-2018-6109 CVE-2018-6110 CVE-2018-6111\nCVE-2018-6112 CVE-2018-6113 CVE-2018-6114 CVE-2018-6116 CVE-2018-6117\nCVE-2018-6118 CVE-2018-6121 CVE-2018-6122 CVE-2018-6120\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2018-812b5d5a71\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected chromium package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:27\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/12/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/06/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/06/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^27([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 27\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC27\", reference:\"chromium-66.0.3359.181-2.fc27\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromium\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "suse": [{"lastseen": "2018-05-28T01:40:25", "bulletinFamily": "unix", "cvelist": ["CVE-2018-6069", "CVE-2018-6078", "CVE-2018-6097", "CVE-2018-6103", "CVE-2018-6081", "CVE-2018-6099", "CVE-2017-11215", "CVE-2018-6120", "CVE-2018-6113", "CVE-2018-6080", "CVE-2018-6091", "CVE-2018-6104", "CVE-2018-6096", "CVE-2018-6083", "CVE-2018-6100", "CVE-2018-6082", "CVE-2018-6057", "CVE-2018-6070", "CVE-2018-6074", "CVE-2018-6098", "CVE-2018-6112", "CVE-2018-6110", "CVE-2018-6108", "CVE-2018-6102", "CVE-2018-6114", "CVE-2018-6117", "CVE-2018-6118", "CVE-2018-6109", "CVE-2018-6073", "CVE-2018-6115", "CVE-2018-6122", "CVE-2018-6095", "CVE-2018-6105", "CVE-2018-6093", "CVE-2018-6087", "CVE-2018-6061", "CVE-2018-6116", "CVE-2018-6106", "CVE-2018-6090", "CVE-2018-6072", "CVE-2018-6068", "CVE-2018-6088", "CVE-2018-6094", "CVE-2018-6065", "CVE-2018-6089", "CVE-2017-11225", "CVE-2018-6062", "CVE-2018-6101", "CVE-2018-6107", "CVE-2018-6086", "CVE-2018-6067", "CVE-2018-6092", "CVE-2018-6071", "CVE-2018-6121", "CVE-2018-6066", "CVE-2018-6075", "CVE-2018-6064", "CVE-2018-6077", "CVE-2018-6076", "CVE-2018-6111", "CVE-2018-6085", "CVE-2018-6079", "CVE-2018-6060", "CVE-2018-6063"], "description": "This update for Chromium to version 66.0.3359.181 fixes the following\n issues:\n\n - CVE-2018-6118: Use after free in Media Cache (bsc#1091288)\n - CVE-2018-6085: Use after free in Disk Cache\n - CVE-2018-6086: Use after free in Disk Cache\n - CVE-2018-6087: Use after free in WebAssembly\n - CVE-2018-6088: Use after free in PDFium\n - CVE-2018-6089: Same origin policy bypass in Service Worker\n - CVE-2018-6090: Heap buffer overflow in Skia\n - CVE-2018-6091: Incorrect handling of plug-ins by Service Worker\n - CVE-2018-6092: Integer overflow in WebAssembly\n - CVE-2018-6093: Same origin bypass in Service Worker\n - CVE-2018-6094: Exploit hardening regression in Oilpan\n - CVE-2018-6095: Lack of meaningful user interaction requirement before\n file upload\n - CVE-2018-6096: Fullscreen UI spoof\n - CVE-2018-6097: Fullscreen UI spoof\n - CVE-2018-6098: URL spoof in Omnibox\n - CVE-2018-6099: CORS bypass in ServiceWorker\n - CVE-2018-6100: URL spoof in Omnibox\n - CVE-2018-6101: Insufficient protection of remote debugging prototol in\n DevTools\n - CVE-2018-6102: URL spoof in Omnibox\n - CVE-2018-6103: UI spoof in Permissions\n - CVE-2018-6104: URL spoof in Omnibox\n - CVE-2018-6105: URL spoof in Omnibox\n - CVE-2018-6106: Incorrect handling of promises in V8\n - CVE-2018-6107: URL spoof in Omnibox\n - CVE-2018-6108: URL spoof in Omnibox\n - CVE-2018-6109: Incorrect handling of files by FileAPI\n - CVE-2018-6110: Incorrect handling of plaintext files via file://\n - CVE-2018-6111: Heap-use-after-free in DevTools\n - CVE-2018-6112: Incorrect URL handling in DevTools\n - CVE-2018-6113: URL spoof in Navigation\n - CVE-2018-6114: CSP bypass\n - CVE-2018-6115: SmartScreen bypass in downloads\n - CVE-2018-6116: Incorrect low memory handling in WebAssembly\n - CVE-2018-6117: Confusing autofill settings\n - CVE-2017-11215: Use after free in Flash\n - CVE-2017-11225: Use after free in Flash\n - CVE-2018-6060: Use after free in Blink\n - CVE-2018-6061: Race condition in V8\n - CVE-2018-6062: Heap buffer overflow in Skia\n - CVE-2018-6057: Incorrect permissions on shared memory\n - CVE-2018-6063: Incorrect permissions on shared memory\n - CVE-2018-6064: Type confusion in V8\n - CVE-2018-6065: Integer overflow in V8\n - CVE-2018-6066: Same Origin Bypass via canvas\n - CVE-2018-6067: Buffer overflow in Skia\n - CVE-2018-6068: Object lifecycle issues in Chrome Custom Tab\n - CVE-2018-6069: Stack buffer overflow in Skia\n - CVE-2018-6070: CSP bypass through extensions\n - CVE-2018-6071: Heap bufffer overflow in Skia\n - CVE-2018-6072: Integer overflow in PDFium\n - CVE-2018-6073: Heap bufffer overflow in WebGL\n - CVE-2018-6074: Mark-of-the-Web bypass\n - CVE-2018-6075: Overly permissive cross origin downloads\n - CVE-2018-6076: Incorrect handling of URL fragment identifiers in Blink\n - CVE-2018-6077: Timing attack using SVG filters\n - CVE-2018-6078: URL Spoof in OmniBox\n - CVE-2018-6079: Information disclosure via texture data in WebGL\n - CVE-2018-6080: Information disclosure in IPC call\n - CVE-2018-6081: XSS in interstitials\n - CVE-2018-6082: Circumvention of port blocking\n - CVE-2018-6083: Incorrect processing of AppManifests\n - CVE-2018-6121: Privilege Escalation in extensions\n - CVE-2018-6122: Type confusion in V8\n - CVE-2018-6120: Heap buffer overflow in PDFium\n - bsc#1086124: Various fixes from internal audits, fuzzing and other\n initiatives\n\n This update also supports mitigation against the Spectre vulnerabilities:\n\n "Strict site isolation" is disabled for most users and can be turned on\n via: chrome://flags/#enable-site-per-process\n\n This feature is undergoing a small percentage trial. Out out of the trial\n is possible via: chrome://flags/#site-isolation-trial-opt-out\n\n\n The following tracked packaging bug were fixed:\n\n - Chromium could not be installed from SUSE PackageHub 12 without having\n the SDK enabled (bsc#1070421)\n - Chromium could not be installed when libminizip1 was not available\n (bsc#1093031)\n\n", "edition": 1, "modified": "2018-05-27T18:06:43", "published": "2018-05-27T18:06:43", "id": "OPENSUSE-SU-2018:1437-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2018-05/msg00105.html", "title": "Security update for Chromium (important)", "type": "suse", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-21T01:24:13", "bulletinFamily": "unix", "cvelist": ["CVE-2018-6097", "CVE-2018-6103", "CVE-2018-6099", "CVE-2018-6113", "CVE-2018-6091", "CVE-2018-6104", "CVE-2018-6096", "CVE-2018-6100", "CVE-2018-6098", "CVE-2018-6112", "CVE-2018-6110", "CVE-2018-6108", "CVE-2018-6102", "CVE-2018-6114", "CVE-2018-6117", "CVE-2018-6109", "CVE-2018-6115", "CVE-2018-6095", "CVE-2018-6105", "CVE-2018-6093", "CVE-2018-6087", "CVE-2018-6116", "CVE-2018-6106", "CVE-2018-6090", "CVE-2018-6088", "CVE-2018-6094", "CVE-2018-6089", "CVE-2018-6101", "CVE-2018-6107", "CVE-2018-6086", "CVE-2018-6092", "CVE-2018-6111", "CVE-2018-6085"], "edition": 1, "description": "This update for Chromium to version 66.0.3359.117 fixes the following\n issues:\n\n Security issues fixed (boo#1090000):\n\n - CVE-2018-6085: Use after free in Disk Cache\n - CVE-2018-6086: Use after free in Disk Cache\n - CVE-2018-6087: Use after free in WebAssembly\n - CVE-2018-6088: Use after free in PDFium\n - CVE-2018-6089: Same origin policy bypass in Service Worker\n - CVE-2018-6090: Heap buffer overflow in Skia\n - CVE-2018-6091: Incorrect handling of plug-ins by Service Worker\n - CVE-2018-6092: Integer overflow in WebAssembly\n - CVE-2018-6093: Same origin bypass in Service Worker\n - CVE-2018-6094: Exploit hardening regression in Oilpan\n - CVE-2018-6095: Lack of meaningful user interaction requirement before\n file upload\n - CVE-2018-6096: Fullscreen UI spoof\n - CVE-2018-6097: Fullscreen UI spoof\n - CVE-2018-6098: URL spoof in Omnibox\n - CVE-2018-6099: CORS bypass in ServiceWorker\n - CVE-2018-6100: URL spoof in Omnibox\n - CVE-2018-6101: Insufficient protection of remote debugging prototol in\n DevTools\n - CVE-2018-6102: URL spoof in Omnibox\n - CVE-2018-6103: UI spoof in Permissions\n - CVE-2018-6104: URL spoof in Omnibox\n - CVE-2018-6105: URL spoof in Omnibox\n - CVE-2018-6106: Incorrect handling of promises in V8\n - CVE-2018-6107: URL spoof in Omnibox\n - CVE-2018-6108: URL spoof in Omnibox\n - CVE-2018-6109: Incorrect handling of files by FileAPI\n - CVE-2018-6110: Incorrect handling of plaintext files via file://\n - CVE-2018-6111: Heap-use-after-free in DevTools\n - CVE-2018-6112: Incorrect URL handling in DevTools\n - CVE-2018-6113: URL spoof in Navigation\n - CVE-2018-6114: CSP bypass\n - CVE-2018-6115: SmartScreen bypass in downloads\n - CVE-2018-6116: Incorrect low memory handling in WebAssembly\n - CVE-2018-6117: Confusing autofill settings\n - Various fixes from internal audits, fuzzing and other initiatives\n\n This update also supports mitigation against the Spectre vulnerabilities:\n "Strict site isolation" is disabled for most users and can be turned on\n via: chrome://flags/#enable-site-per-process This feature is undergoing a\n small percentage trial. Out out of the trial is possible via:\n chrome://flags/#site-isolation-trial-opt-out\n\n The following other changes are included:\n\n - distrust certificates issued by Symantec before 2016-06-01\n - add option to export saved passwords\n - Reduce videos that auto-play with sound\n - boo#1086199: Fix UI freezing when loading/scaling down large images\n\n This update also contains a number of upstream bug fixes and improvements.\n\n", "modified": "2018-04-21T00:08:20", "published": "2018-04-21T00:08:20", "href": "http://lists.opensuse.org/opensuse-security-announce/2018-04/msg00063.html", "id": "OPENSUSE-SU-2018:1042-1", "title": "Security update for chromium (important)", "type": "suse", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2018-03-16T14:35:52", "bulletinFamily": "unix", "cvelist": ["CVE-2018-6069", "CVE-2018-6078", "CVE-2018-6081", "CVE-2017-11215", "CVE-2018-6080", "CVE-2018-6083", "CVE-2018-6082", "CVE-2018-6057", "CVE-2018-6070", "CVE-2018-6074", "CVE-2018-6073", "CVE-2018-6061", "CVE-2018-6072", "CVE-2018-6068", "CVE-2018-6065", "CVE-2017-11225", "CVE-2018-6062", "CVE-2018-6067", "CVE-2018-6071", "CVE-2018-6066", "CVE-2018-6075", "CVE-2018-6064", "CVE-2018-6077", "CVE-2018-6076", "CVE-2018-6079", "CVE-2018-6060", "CVE-2018-6063"], "description": "This update for Chromium to version 65.0.3325.162 fixes the following\n issues:\n\n - CVE-2017-11215: Use after free in Flash\n - CVE-2017-11225: Use after free in Flash\n - CVE-2018-6060: Use after free in Blink\n - CVE-2018-6061: Race condition in V8\n - CVE-2018-6062: Heap buffer overflow in Skia\n - CVE-2018-6057: Incorrect permissions on shared memory\n - CVE-2018-6063: Incorrect permissions on shared memory\n - CVE-2018-6064: Type confusion in V8\n - CVE-2018-6065: Integer overflow in V8\n - CVE-2018-6066: Same Origin Bypass via canvas\n - CVE-2018-6067: Buffer overflow in Skia\n - CVE-2018-6068: Object lifecycle issues in Chrome Custom Tab\n - CVE-2018-6069: Stack buffer overflow in Skia\n - CVE-2018-6070: CSP bypass through extensions\n - CVE-2018-6071: Heap bufffer overflow in Skia\n - CVE-2018-6072: Integer overflow in PDFium\n - CVE-2018-6073: Heap bufffer overflow in WebGL\n - CVE-2018-6074: Mark-of-the-Web bypass\n - CVE-2018-6075: Overly permissive cross origin downloads\n - CVE-2018-6076: Incorrect handling of URL fragment identifiers in Blink\n - CVE-2018-6077: Timing attack using SVG filters\n - CVE-2018-6078: URL Spoof in OmniBox\n - CVE-2018-6079: Information disclosure via texture data in WebGL\n - CVE-2018-6080: Information disclosure in IPC call\n - CVE-2018-6081: XSS in interstitials\n - CVE-2018-6082: Circumvention of port blocking\n - CVE-2018-6083: Incorrect processing of AppManifests\n\n", "edition": 1, "modified": "2018-03-16T12:07:04", "published": "2018-03-16T12:07:04", "href": "http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00042.html", "id": "OPENSUSE-SU-2018:0704-1", "type": "suse", "title": "Security update for Chromium (important)", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "freebsd": [{"lastseen": "2019-05-29T18:31:56", "bulletinFamily": "unix", "cvelist": ["CVE-2018-6084", "CVE-2018-6097", "CVE-2018-6103", "CVE-2018-6099", "CVE-2018-6113", "CVE-2018-6091", "CVE-2018-6104", "CVE-2018-6096", "CVE-2018-6100", "CVE-2018-6098", "CVE-2018-6112", "CVE-2018-6110", "CVE-2018-6108", "CVE-2018-6102", "CVE-2018-6114", "CVE-2018-6117", "CVE-2018-6109", "CVE-2018-6115", "CVE-2018-6095", "CVE-2018-6105", "CVE-2018-6093", "CVE-2018-6087", "CVE-2018-6116", "CVE-2018-6106", "CVE-2018-6090", "CVE-2018-6088", "CVE-2018-6094", "CVE-2018-6089", "CVE-2018-6101", "CVE-2018-6107", "CVE-2018-6086", "CVE-2018-6092", "CVE-2018-6111", "CVE-2018-6085"], "description": "\nGoogle Chrome Releases reports:\n\n62 security fixes in this release:\n\n[826626] Critical CVE-2018-6085: Use after free in Disk Cache. Reported by Ned Williamson on 2018-03-28\n[827492] Critical CVE-2018-6086: Use after free in Disk Cache. Reported by Ned Williamson on 2018-03-30\n[813876] High CVE-2018-6087: Use after free in WebAssembly. Reported by Anonymous on 2018-02-20\n[822091] High CVE-2018-6088: Use after free in PDFium. Reported by Anonymous on 2018-03-15\n[808838] High CVE-2018-6089: Same origin policy bypass in Service Worker. Reported by Rob Wu on 2018-02-04\n[820913] High CVE-2018-6090: Heap buffer overflow in Skia. Reported by ZhanJia Song on 2018-03-12\n[771933] High CVE-2018-6091: Incorrect handling of plug-ins by Service Worker. Reported by Jun Kokatsu (@shhnjk) on 2017-10-05\n[819869] High CVE-2018-6092: Integer overflow in WebAssembly. Reported by Natalie Silvanovich of Google Project Zero on 2018-03-08\n[780435] Medium CVE-2018-6093: Same origin bypass in Service Worker. Reported by Jun Kokatsu (@shhnjk) on 2017-11-01\n[633030] Medium CVE-2018-6094: Exploit hardening regression in Oilpan. Reported by Chris Rohlf on 2016-08-01\n[637098] Medium CVE-2018-6095: Lack of meaningful user interaction requirement before file upload. Reported by Abdulrahman Alqabandi (@qab) on 2016-08-11\n[776418] Medium CVE-2018-6096: Fullscreen UI spoof. Reported by WenXu Wu of Tencent's Xuanwu Lab on 2017-10-19\n[806162] Medium CVE-2018-6097: Fullscreen UI spoof. Reported by xisigr of Tencent's Xuanwu Lab on 2018-01-26\n[798892] Medium CVE-2018-6098: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-01-03\n[808825] Medium CVE-2018-6099: CORS bypass in ServiceWorker. Reported by Jun Kokatsu (@shhnjk) on 2018-02-03\n[811117] Medium CVE-2018-6100: URL spoof in Omnibox. Reported by Lnyas Zhang on 2018-02-11\n[813540] Medium CVE-2018-6101: Insufficient protection of remote debugging prototol in DevTools . Reported by Rob Wu on 2018-02-19\n[813814] Medium CVE-2018-6102: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-02-20\n[816033] Medium CVE-2018-6103: UI spoof in Permissions. Reported by Khalil Zhani on 2018-02-24\n[820068] Medium CVE-2018-6104: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-03-08\n[803571] Medium CVE-2018-6105: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-01-18\n[805729] Medium CVE-2018-6106: Incorrect handling of promises in V8. Reported by lokihardt of Google Project Zero on 2018-01-25\n[808316] Medium CVE-2018-6107: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-02-02\n[816769] Medium CVE-2018-6108: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-02-27\n[710190] Low CVE-2018-6109: Incorrect handling of files by FileAPI. Reported by Dominik Weber (@DoWeb_) on 2017-04-10\n[777737] Low CVE-2018-6110: Incorrect handling of plaintext files via file:// . Reported by Wenxiang Qian (aka blastxiang) on 2017-10-24\n[780694] Low CVE-2018-6111: Heap-use-after-free in DevTools. Reported by Khalil Zhani on 2017-11-02\n[798096] Low CVE-2018-6112: Incorrect URL handling in DevTools. Reported by Rob Wu on 2017-12-29\n[805900] Low CVE-2018-6113: URL spoof in Navigation. Reported by Khalil Zhani on 2018-01-25\n[811691] Low CVE-2018-6114: CSP bypass. Reported by Lnyas Zhang on 2018-02-13\n[819809] Low CVE-2018-6115: SmartScreen bypass in downloads. Reported by James Feher on 2018-03-07\n[822266] Low CVE-2018-6116: Incorrect low memory handling in WebAssembly. Reported by Jin from Chengdu Security Response Center of Qihoo 360 Technology Co. Ltd. on 2018-03-15\n[822465] Low CVE-2018-6117: Confusing autofill settings. Reported by Spencer Dailey on 2018-03-15\n[822424] Low CVE-2018-6084: Incorrect use of Distributed Objects in Google Software Updater on MacOS. Reported by Ian Beer of Google Project Zero on 2018-03-15\n\n\n", "edition": 4, "modified": "2017-04-10T00:00:00", "published": "2017-04-10T00:00:00", "id": "36FF7A74-47B1-11E8-A7D6-54E1AD544088", "href": "https://vuxml.freebsd.org/freebsd/36ff7a74-47b1-11e8-a7d6-54e1ad544088.html", "title": "chromium -- vulnerability", "type": "freebsd", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:31:58", "bulletinFamily": "unix", "cvelist": ["CVE-2018-6069", "CVE-2018-6078", "CVE-2018-6081", "CVE-2017-11215", "CVE-2018-6080", "CVE-2018-6083", "CVE-2018-6082", "CVE-2018-6057", "CVE-2018-6070", "CVE-2018-6074", "CVE-2018-6073", "CVE-2018-6061", "CVE-2018-6072", "CVE-2018-6065", "CVE-2017-11225", "CVE-2018-6062", "CVE-2018-6067", "CVE-2018-6071", "CVE-2018-6066", "CVE-2018-6075", "CVE-2018-6064", "CVE-2018-6077", "CVE-2018-6076", "CVE-2018-6079", "CVE-2018-6060", "CVE-2018-6063"], "description": "\nGoogle Chrome Releases reports:\n\n45 security fixes in this release:\n\n[758848] High CVE-2017-11215: Use after free in Flash. Reported by JieZeng of Tencent Zhanlu Lab on 2017-08-25\n[758863] High CVE-2017-11225: Use after free in Flash. Reported by JieZeng of Tencent Zhanlu Lab on 2017-08-25\n[780919] High CVE-2018-6060: Use after free in Blink. Reported by Omair on 2017-11-02\n[794091] High CVE-2018-6061: Race condition in V8. Reported by Guang Gong of Alpha Team, Qihoo 360 on 2017-12-12\n[780104] High CVE-2018-6062: Heap buffer overflow in Skia. Reported by Anonymous on 2017-10-31\n[789959] High CVE-2018-6057: Incorrect permissions on shared memory. Reported by Gal Beniamini of Google Project Zero on 2017-11-30\n[792900] High CVE-2018-6063: Incorrect permissions on shared memory. Reported by Gal Beniamini of Google Project Zero on 2017-12-07\n[798644] High CVE-2018-6064: Type confusion in V8. Reported by lokihardt of Google Project Zero on 2018-01-03\n[808192] High CVE-2018-6065: Integer overflow in V8. Reported by Mark Brand of Google Project Zero on 2018-02-01\n[799477] Medium CVE-2018-6066: Same Origin Bypass via canvas. Reported by Masato Kinugawa on 2018-01-05\n[779428] Medium CVE-2018-6067: Buffer overflow in Skia. Reported by Ned Williamson on 2017-10-30\n[779428] Medium CVE-2018-6067: Buffer overflow in Skia. Reported by Ned Williamson on 2017-10-30\n[799918] Medium CVE-2018-6069: Stack buffer overflow in Skia. Reported by Wanglu and Yangkang(@dnpushme) of Qihoo360 Qex Team on 2018-01-08\n[668645] Medium CVE-2018-6070: CSP bypass through extensions. Reported by Rob Wu on 2016-11-25\n[777318] Medium CVE-2018-6071: Heap bufffer overflow in Skia. Reported by Anonymous on 2017-10-23\n[791048] Medium CVE-2018-6072: Integer overflow in PDFium. Reported by Atte Kettunen of OUSPG on 2017-12-01\n[804118] Medium CVE-2018-6073: Heap bufffer overflow in WebGL. Reported by Omair on 2018-01-20\n[809759] Medium CVE-2018-6074: Mark-of-the-Web bypass. Reported by Abdulrahman Alqabandi (@qab) on 2018-02-06\n[608669] Medium CVE-2018-6075: Overly permissive cross origin downloads. Reported by Inti De Ceukelaire (intigriti.com) on 2016-05-03\n[758523] Medium CVE-2018-6076: Incorrect handling of URL fragment identifiers in Blink. Reported by Mateusz Krzeszowiec on 2017-08-24\n[778506] Medium CVE-2018-6077: Timing attack using SVG filters. Reported by Khalil Zhani on 2017-10-26\n[793628] Medium CVE-2018-6078: URL Spoof in OmniBox. Reported by Khalil Zhani on 2017-12-10\n[788448] Medium CVE-2018-6079: Information disclosure via texture data in WebGL. Reported by Ivars Atteka on 2017-11-24\n[792028] Medium CVE-2018-6080: Information disclosure in IPC call. Reported by Gal Beniamini of Google Project Zero on 2017-12-05\n[797525] Low CVE-2018-6081: XSS in interstitials. Reported by Rob Wu on 2017-12-24\n[767354] Low CVE-2018-6082: Circumvention of port blocking. Reported by WenXu Wu of Tencent's Xuanwu Lab on 2017-09-21\n[771709] Low CVE-2018-6083: Incorrect processing of AppManifests. Reported by Jun Kokatsu (@shhnjk) on 2017-10-04\n\n\n", "edition": 4, "modified": "2016-05-03T00:00:00", "published": "2016-05-03T00:00:00", "id": "555AF074-22B9-11E8-9799-54EE754AF08E", "href": "https://vuxml.freebsd.org/freebsd/555af074-22b9-11e8-9799-54ee754af08e.html", "title": "chromium -- vulnerability", "type": "freebsd", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "kaspersky": [{"lastseen": "2020-09-02T11:47:06", "bulletinFamily": "info", "cvelist": ["CVE-2018-6084", "CVE-2018-6097", "CVE-2018-6103", "CVE-2018-6099", "CVE-2018-6113", "CVE-2018-6091", "CVE-2018-6104", "CVE-2018-6096", "CVE-2018-6100", "CVE-2018-6098", "CVE-2018-6112", "CVE-2018-6110", "CVE-2018-6108", "CVE-2018-6102", "CVE-2018-6114", "CVE-2018-6117", "CVE-2018-6109", "CVE-2018-6115", "CVE-2018-6095", "CVE-2018-6105", "CVE-2018-6093", "CVE-2018-6087", "CVE-2018-6116", "CVE-2018-6106", "CVE-2018-6090", "CVE-2018-6088", "CVE-2018-6094", "CVE-2018-6089", "CVE-2018-6101", "CVE-2018-6107", "CVE-2018-6086", "CVE-2018-6092", "CVE-2018-6111", "CVE-2018-6085"], "description": "### *Detect date*:\n04/17/2018\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to bypass security restrictions, obtain sensitive information, cause denial of service, spoof user interface, gain privileges, execute arbitrary code and perform unspecified attacks.\n\n### *Affected products*:\nGoogle Chrome earlier than 66.0.3359.117\n\n### *Solution*:\nUpdate to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk. \n[Google Chrome download page](<https://www.google.com/chrome/browser/desktop/>)\n\n### *Original advisories*:\n[Stable Channel Update for Desktop](<https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Google Chrome](<https://threats.kaspersky.com/en/product/Google-Chrome/>)\n\n### *CVE-IDS*:\n[CVE-2018-6085](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6085>)8.8Critical \n[CVE-2018-6086](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6086>)8.8Critical \n[CVE-2018-6087](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6087>)8.8Critical \n[CVE-2018-6088](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6088>)8.8Critical \n[CVE-2018-6089](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6089>)6.5High \n[CVE-2018-6090](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6090>)8.8Critical \n[CVE-2018-6091](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6091>)0.0Unknown \n[CVE-2018-6092](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6092>)8.8Critical \n[CVE-2018-6093](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6093>)0.0Unknown \n[CVE-2018-6094](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6094>)8.8Critical \n[CVE-2018-6095](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6095>)6.5High \n[CVE-2018-6096](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6096>)0.0Unknown \n[CVE-2018-6097](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6097>)0.0Unknown \n[CVE-2018-6098](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6098>)6.5High \n[CVE-2018-6099](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6099>)6.5High \n[CVE-2018-6100](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6100>)0.0Unknown \n[CVE-2018-6101](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6101>)7.5Critical \n[CVE-2018-6102](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6102>)4.3Warning \n[CVE-2018-6103](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6103>)6.5High \n[CVE-2018-6104](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6104>)6.5High \n[CVE-2018-6105](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6105>)6.5High \n[CVE-2018-6106](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6106>)0.0Unknown \n[CVE-2018-6107](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6107>)6.5High \n[CVE-2018-6108](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6108>)6.5High \n[CVE-2018-6109](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6109>)0.0Unknown \n[CVE-2018-6110](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6110>)0.0Unknown \n[CVE-2018-6111](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6111>)0.0Unknown \n[CVE-2018-6112](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6112>)0.0Unknown \n[CVE-2018-6113](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6113>)0.0Unknown \n[CVE-2018-6114](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6114>)0.0Unknown \n[CVE-2018-6115](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6115>)6.5High \n[CVE-2018-6116](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6116>)6.5High \n[CVE-2018-6117](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6117>)0.0Unknown \n[CVE-2018-6084](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6084>)0.0Unknown\n\n### *Exploitation*:\nThe following public exploits exists for this vulnerability:", "edition": 39, "modified": "2020-06-18T00:00:00", "published": "2018-04-17T00:00:00", "id": "KLA11232", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11232", "title": "\r KLA11232Multiple vulnerabilities in Google Chrome ", "type": "kaspersky", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-09-02T11:53:51", "bulletinFamily": "info", "cvelist": ["CVE-2018-6069", "CVE-2018-6078", "CVE-2018-6081", "CVE-2017-11215", "CVE-2018-6080", "CVE-2018-6083", "CVE-2018-6082", "CVE-2018-6057", "CVE-2018-6070", "CVE-2018-6074", "CVE-2018-6059", "CVE-2018-6073", "CVE-2018-6061", "CVE-2018-6072", "CVE-2018-6058", "CVE-2018-6068", "CVE-2018-6065", "CVE-2017-11225", "CVE-2018-6062", "CVE-2018-6067", "CVE-2018-6071", "CVE-2018-6066", "CVE-2018-6075", "CVE-2018-6064", "CVE-2018-6077", "CVE-2018-6076", "CVE-2018-6079", "CVE-2018-6060", "CVE-2018-6063"], "description": "### *Detect date*:\n03/06/2018\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities possibly to cause denial of service or spoof user interface.\n\n### *Affected products*:\nGoogle Chrome earlier than 65.0.3325.146\n\n### *Solution*:\nUpdate to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk. \n[Download Google Chrome](<https://www.google.com/chrome/browser/desktop/>)\n\n### *Original advisories*:\n[Stable Channel Update for Desktop](<https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Google Chrome](<https://threats.kaspersky.com/en/product/Google-Chrome/>)\n\n### *CVE-IDS*:\n[CVE-2017-11215](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11215>)10.0Critical \n[CVE-2017-11225](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11225>)10.0Critical \n[CVE-2018-6058](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6058>)0.0Unknown \n[CVE-2018-6059](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6059>)0.0Unknown \n[CVE-2018-6060](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6060>)8.8Critical \n[CVE-2018-6061](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6061>)7.5Critical \n[CVE-2018-6062](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6062>)8.8Critical \n[CVE-2018-6057](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6057>)8.8Critical \n[CVE-2018-6063](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6063>)8.8Critical \n[CVE-2018-6064](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6064>)8.8Critical \n[CVE-2018-6065](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6065>)8.8Critical \n[CVE-2018-6066](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6066>)6.5High \n[CVE-2018-6067](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6067>)8.8Critical \n[CVE-2018-6068](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6068>)4.3Warning \n[CVE-2018-6069](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6069>)6.5High \n[CVE-2018-6070](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6070>)6.1High \n[CVE-2018-6071](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6071>)8.8Critical \n[CVE-2018-6072](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6072>)8.8Critical \n[CVE-2018-6073](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6073>)8.8Critical \n[CVE-2018-6074](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6074>)8.8Critical \n[CVE-2018-6075](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6075>)6.5High \n[CVE-2018-6076](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6076>)6.1High \n[CVE-2018-6077](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6077>)6.5High \n[CVE-2018-6078](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6078>)4.3Warning \n[CVE-2018-6079](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6079>)6.5High \n[CVE-2018-6080](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6080>)6.5High \n[CVE-2018-6081](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6081>)6.1High \n[CVE-2018-6082](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6082>)4.7Warning \n[CVE-2018-6083](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6083>)8.8Critical\n\n### *Exploitation*:\nThe following public exploits exists for this vulnerability:", "edition": 41, "modified": "2020-06-18T00:00:00", "published": "2018-03-06T00:00:00", "id": "KLA11204", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11204", "title": "\r KLA11204Multiple vulnerabilities in Google Chrome ", "type": "kaspersky", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "gentoo": [{"lastseen": "2018-04-24T03:58:09", "bulletinFamily": "unix", "cvelist": ["CVE-2018-6097", "CVE-2018-6103", "CVE-2018-6099", "CVE-2018-6113", "CVE-2018-6091", "CVE-2018-6104", "CVE-2018-6096", "CVE-2018-6100", "CVE-2018-6098", "CVE-2018-6112", "CVE-2018-6110", "CVE-2018-6108", "CVE-2018-6102", "CVE-2018-6114", "CVE-2018-6117", "CVE-2018-6109", "CVE-2018-6115", "CVE-2018-6095", "CVE-2018-6105", "CVE-2018-6093", "CVE-2018-6087", "CVE-2018-6116", "CVE-2018-6106", "CVE-2018-6090", "CVE-2018-6088", "CVE-2018-6094", "CVE-2018-6089", "CVE-2018-6101", "CVE-2018-6107", "CVE-2018-6086", "CVE-2018-6092", "CVE-2018-6111", "CVE-2018-6085"], "description": "### Background\n\nChromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. \n\nGoogle Chrome is one fast, simple, and secure browser for all your devices. \n\n### Description\n\nMultiple vulnerabilities have been discovered in Chromium and Google Chrome. Please review the referenced CVE identifiers and Google Chrome Releases for details. \n\n### Impact\n\nA remote attacker could possibly execute arbitrary code with the privileges of the process, cause a Denial of Service condition, bypass content security controls, or conduct URL spoofing. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Chromium users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose\n \">=www-client/chromium-66.0.3359.117\"\n \n\nAll Google Chrome users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose\n \">=www-client/google-chrome-66.0.3359.117\"", "edition": 1, "modified": "2018-04-24T00:00:00", "published": "2018-04-24T00:00:00", "href": "https://security.gentoo.org/glsa/201804-22", "id": "GLSA-201804-22", "type": "gentoo", "title": "Chromium, Google Chrome: Multiple vulnerabilities", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2018-03-14T00:09:39", "bulletinFamily": "unix", "cvelist": ["CVE-2018-6069", "CVE-2018-6078", "CVE-2018-6081", "CVE-2018-6080", "CVE-2018-6083", "CVE-2018-6082", "CVE-2018-6057", "CVE-2018-6070", "CVE-2018-6074", "CVE-2018-6059", "CVE-2018-6073", "CVE-2018-6061", "CVE-2018-6072", "CVE-2018-6058", "CVE-2018-6068", "CVE-2018-6065", "CVE-2018-6062", "CVE-2018-6067", "CVE-2018-6071", "CVE-2018-6066", "CVE-2018-6075", "CVE-2018-6064", "CVE-2018-6077", "CVE-2018-6076", "CVE-2018-6079", "CVE-2018-6060", "CVE-2018-6063"], "description": "### Background\n\nChromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. \n\nGoogle Chrome is one fast, simple, and secure browser for all your devices. \n\n### Description\n\nMultiple vulnerabilities have been discovered in Chromium and Google Chrome. Please review the referenced CVE identifiers and Google Chrome Releases for details. \n\n### Impact\n\nA remote attacker could possibly execute arbitrary code with the privileges of the process, cause a Denial of Service condition, bypass content security controls, or conduct URL spoofing. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Chromium users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose\n \">=www-client/chromium-65.0.3325.146\"\n \n\nAll Google Chrome users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose\n \">=www-client/google-chrome-65.0.3325.146\"", "edition": 1, "modified": "2018-03-13T00:00:00", "published": "2018-03-13T00:00:00", "href": "https://security.gentoo.org/glsa/201803-05", "id": "GLSA-201803-05", "title": "Chromium, Google Chrome: Multiple vulnerabilities", "type": "gentoo", "cvss": {"score": 0.0, "vector": "NONE"}}], "redhat": [{"lastseen": "2019-08-13T18:46:04", "bulletinFamily": "unix", "cvelist": ["CVE-2018-6085", "CVE-2018-6086", "CVE-2018-6087", "CVE-2018-6088", "CVE-2018-6089", "CVE-2018-6090", "CVE-2018-6091", "CVE-2018-6092", "CVE-2018-6093", "CVE-2018-6094", "CVE-2018-6095", "CVE-2018-6096", "CVE-2018-6097", "CVE-2018-6098", "CVE-2018-6099", "CVE-2018-6100", "CVE-2018-6101", "CVE-2018-6102", "CVE-2018-6103", "CVE-2018-6104", "CVE-2018-6105", "CVE-2018-6106", "CVE-2018-6107", "CVE-2018-6108", "CVE-2018-6109", "CVE-2018-6110", "CVE-2018-6111", "CVE-2018-6112", "CVE-2018-6113", "CVE-2018-6114", "CVE-2018-6116", "CVE-2018-6117"], "description": "Chromium is an open-source web browser, powered by WebKit (Blink).\n\nThis update upgrades Chromium to version 66.0.3359.117.\n\nSecurity Fix(es):\n\n* chromium-browser: Use after free in Disk Cache (CVE-2018-6085)\n\n* chromium-browser: Use after free in Disk Cache (CVE-2018-6086)\n\n* chromium-browser: Use after free in WebAssembly (CVE-2018-6087)\n\n* chromium-browser: Use after free in PDFium (CVE-2018-6088)\n\n* chromium-browser: Same origin policy bypass in Service Worker (CVE-2018-6089)\n\n* chromium-browser: Heap buffer overflow in Skia (CVE-2018-6090)\n\n* chromium-browser: Incorrect handling of plug-ins by Service Worker (CVE-2018-6091)\n\n* chromium-browser: Integer overflow in WebAssembly (CVE-2018-6092)\n\n* chromium-browser: Same origin bypass in Service Worker (CVE-2018-6093)\n\n* chromium-browser: Exploit hardening regression in Oilpan (CVE-2018-6094)\n\n* chromium-browser: Lack of meaningful user interaction requirement before file upload (CVE-2018-6095)\n\n* chromium-browser: Fullscreen UI spoof (CVE-2018-6096)\n\n* chromium-browser: Fullscreen UI spoof (CVE-2018-6097)\n\n* chromium-browser: URL spoof in Omnibox (CVE-2018-6098)\n\n* chromium-browser: CORS bypass in ServiceWorker (CVE-2018-6099)\n\n* chromium-browser: URL spoof in Omnibox (CVE-2018-6100)\n\n* chromium-browser: Insufficient protection of remote debugging prototol in DevTools (CVE-2018-6101)\n\n* chromium-browser: URL spoof in Omnibox (CVE-2018-6102)\n\n* chromium-browser: UI spoof in Permissions (CVE-2018-6103)\n\n* chromium-browser: URL spoof in Omnibox (CVE-2018-6104)\n\n* chromium-browser: URL spoof in Omnibox (CVE-2018-6105)\n\n* chromium-browser: Incorrect handling of promises in V8 (CVE-2018-6106)\n\n* chromium-browser: URL spoof in Omnibox (CVE-2018-6107)\n\n* chromium-browser: URL spoof in Omnibox (CVE-2018-6108)\n\n* chromium-browser: Incorrect handling of files by FileAPI (CVE-2018-6109)\n\n* chromium-browser: Incorrect handling of plaintext files via file:// (CVE-2018-6110)\n\n* chromium-browser: Heap-use-after-free in DevTools (CVE-2018-6111)\n\n* chromium-browser: Incorrect URL handling in DevTools (CVE-2018-6112)\n\n* chromium-browser: URL spoof in Navigation (CVE-2018-6113)\n\n* chromium-browser: CSP bypass (CVE-2018-6114)\n\n* chromium-browser: Incorrect low memory handling in WebAssembly (CVE-2018-6116)\n\n* chromium-browser: Confusing autofill settings (CVE-2018-6117)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "modified": "2018-06-07T18:21:47", "published": "2018-04-23T16:24:32", "id": "RHSA-2018:1195", "href": "https://access.redhat.com/errata/RHSA-2018:1195", "type": "redhat", "title": "(RHSA-2018:1195) Critical: chromium-browser security update", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-08-13T18:45:37", "bulletinFamily": "unix", "cvelist": ["CVE-2018-6057", "CVE-2018-6060", "CVE-2018-6061", "CVE-2018-6062", "CVE-2018-6063", "CVE-2018-6064", "CVE-2018-6065", "CVE-2018-6066", "CVE-2018-6067", "CVE-2018-6069", "CVE-2018-6070", "CVE-2018-6071", "CVE-2018-6072", "CVE-2018-6073", "CVE-2018-6074", "CVE-2018-6075", "CVE-2018-6076", "CVE-2018-6077", "CVE-2018-6078", "CVE-2018-6079", "CVE-2018-6080", "CVE-2018-6081", "CVE-2018-6082", "CVE-2018-6083"], "description": "Chromium is an open-source web browser, powered by WebKit (Blink).\n\nThis update upgrades Chromium to version 65.0.3325.146.\n\nSecurity Fix(es):\n\n* chromium-browser: incorrect permissions on shared memory (CVE-2018-6057)\n\n* chromium-browser: use-after-free in blink (CVE-2018-6060)\n\n* chromium-browser: race condition in v8 (CVE-2018-6061)\n\n* chromium-browser: heap buffer overflow in skia (CVE-2018-6062)\n\n* chromium-browser: incorrect permissions on shared memory (CVE-2018-6063)\n\n* chromium-browser: type confusion in v8 (CVE-2018-6064)\n\n* chromium-browser: integer overflow in v8 (CVE-2018-6065)\n\n* chromium-browser: same origin bypass via canvas (CVE-2018-6066)\n\n* chromium-browser: buffer overflow in skia (CVE-2018-6067)\n\n* chromium-browser: stack buffer overflow in skia (CVE-2018-6069)\n\n* chromium-browser: csp bypass through extensions (CVE-2018-6070)\n\n* chromium-browser: heap bufffer overflow in skia (CVE-2018-6071)\n\n* chromium-browser: integer overflow in pdfium (CVE-2018-6072)\n\n* chromium-browser: heap bufffer overflow in webgl (CVE-2018-6073)\n\n* chromium-browser: mark-of-the-web bypass (CVE-2018-6074)\n\n* chromium-browser: overly permissive cross origin downloads (CVE-2018-6075)\n\n* chromium-browser: incorrect handling of url fragment identifiers in blink (CVE-2018-6076)\n\n* chromium-browser: timing attack using svg filters (CVE-2018-6077)\n\n* chromium-browser: url spoof in omnibox (CVE-2018-6078)\n\n* chromium-browser: information disclosure via texture data in webgl (CVE-2018-6079)\n\n* chromium-browser: information disclosure in ipc call (CVE-2018-6080)\n\n* chromium-browser: xss in interstitials (CVE-2018-6081)\n\n* chromium-browser: circumvention of port blocking (CVE-2018-6082)\n\n* chromium-browser: incorrect processing of appmanifests (CVE-2018-6083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "modified": "2018-06-07T18:21:53", "published": "2018-03-12T21:29:32", "id": "RHSA-2018:0484", "href": "https://access.redhat.com/errata/RHSA-2018:0484", "type": "redhat", "title": "(RHSA-2018:0484) Important: chromium-browser security update", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "fedora": [{"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2018-6085", "CVE-2018-6086", "CVE-2018-6087", "CVE-2018-6088", "CVE-2018-6089", "CVE-2018-6090", "CVE-2018-6091", "CVE-2018-6092", "CVE-2018-6093", "CVE-2018-6094", "CVE-2018-6095", "CVE-2018-6096", "CVE-2018-6097", "CVE-2018-6098", "CVE-2018-6099", "CVE-2018-6100", "CVE-2018-6101", "CVE-2018-6102", "CVE-2018-6103", "CVE-2018-6104", "CVE-2018-6105", "CVE-2018-6106", "CVE-2018-6107", "CVE-2018-6108", "CVE-2018-6109", "CVE-2018-6110", "CVE-2018-6111", "CVE-2018-6112", "CVE-2018-6113", "CVE-2018-6114", "CVE-2018-6115", "CVE-2018-6116", "CVE-2018-6117", "CVE-2018-6118", "CVE-2018-6120", "CVE-2018-6121", "CVE-2018-6122"], "description": "Chromium is an open-source web browser, powered by WebKit (Blink). ", "modified": "2018-05-31T14:42:50", "published": "2018-05-31T14:42:50", "id": "FEDORA:3A1D860C5983", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 28 Update: chromium-66.0.3359.181-2.fc28", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2018-6085", "CVE-2018-6086", "CVE-2018-6087", "CVE-2018-6088", "CVE-2018-6089", "CVE-2018-6090", "CVE-2018-6091", "CVE-2018-6092", "CVE-2018-6093", "CVE-2018-6094", "CVE-2018-6095", "CVE-2018-6096", "CVE-2018-6097", "CVE-2018-6098", "CVE-2018-6099", "CVE-2018-6100", "CVE-2018-6101", "CVE-2018-6102", "CVE-2018-6103", "CVE-2018-6104", "CVE-2018-6105", "CVE-2018-6106", "CVE-2018-6107", "CVE-2018-6108", "CVE-2018-6109", "CVE-2018-6110", "CVE-2018-6111", "CVE-2018-6112", "CVE-2018-6113", "CVE-2018-6114", "CVE-2018-6115", "CVE-2018-6116", "CVE-2018-6117", "CVE-2018-6118", "CVE-2018-6120", "CVE-2018-6121", "CVE-2018-6122"], "description": "Chromium is an open-source web browser, powered by WebKit (Blink). ", "modified": "2018-06-05T14:11:33", "published": "2018-06-05T14:11:33", "id": "FEDORA:D76706163D5A", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 27 Update: chromium-66.0.3359.181-2.fc27", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15429", "CVE-2018-6033", "CVE-2018-6060", "CVE-2018-6062", "CVE-2018-6064", "CVE-2018-6069", "CVE-2018-6073", "CVE-2018-6076", "CVE-2018-6079", "CVE-2018-6081"], "description": "Qt5 - QtWebEngine components. ", "modified": "2018-03-25T21:24:23", "published": "2018-03-25T21:24:23", "id": "FEDORA:BD8776075EF7", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 26 Update: qt5-qtwebengine-5.10.1-4.fc26", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15429", "CVE-2018-6033", "CVE-2018-6060", "CVE-2018-6062", "CVE-2018-6064", "CVE-2018-6069", "CVE-2018-6073", "CVE-2018-6076", "CVE-2018-6079", "CVE-2018-6081"], "description": "Qt5 - QtWebEngine components. ", "modified": "2018-03-26T22:32:32", "published": "2018-03-26T22:32:32", "id": "FEDORA:D5E9D604E466", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 28 Update: qt5-qtwebengine-5.10.1-4.fc28", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15429", "CVE-2018-6033", "CVE-2018-6060", "CVE-2018-6062", "CVE-2018-6064", "CVE-2018-6069", "CVE-2018-6073", "CVE-2018-6076", "CVE-2018-6079", "CVE-2018-6081"], "description": "Qt5 - QtWebEngine components. ", "modified": "2018-03-25T21:49:26", "published": "2018-03-25T21:49:26", "id": "FEDORA:CEA406042D4A", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 27 Update: qt5-qtwebengine-5.10.1-4.fc27", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15396", "CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427", "CVE-2018-6056", "CVE-2018-6057", "CVE-2018-6058", "CVE-2018-6059", "CVE-2018-6060", "CVE-2018-6061", "CVE-2018-6062", "CVE-2018-6063", "CVE-2018-6064", "CVE-2018-6065", "CVE-2018-6066", "CVE-2018-6067", "CVE-2018-6068", "CVE-2018-6069", "CVE-2018-6070", "CVE-2018-6071", "CVE-2018-6072", "CVE-2018-6073", "CVE-2018-6074", "CVE-2018-6075", "CVE-2018-6076", "CVE-2018-6077", "CVE-2018-6078", "CVE-2018-6079", "CVE-2018-6080", "CVE-2018-6081", "CVE-2018-6082", "CVE-2018-6083", "CVE-2018-6406"], "description": "Chromium is an open-source web browser, powered by WebKit (Blink). ", "modified": "2018-03-27T20:18:19", "published": "2018-03-27T20:18:19", "id": "FEDORA:0F54C60BE23D", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 27 Update: chromium-65.0.3325.181-1.fc27", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15396", "CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427", "CVE-2018-6056", "CVE-2018-6057", "CVE-2018-6058", "CVE-2018-6059", "CVE-2018-6060", "CVE-2018-6061", "CVE-2018-6062", "CVE-2018-6063", "CVE-2018-6064", "CVE-2018-6065", "CVE-2018-6066", "CVE-2018-6067", "CVE-2018-6068", "CVE-2018-6069", "CVE-2018-6070", "CVE-2018-6071", "CVE-2018-6072", "CVE-2018-6073", "CVE-2018-6074", "CVE-2018-6075", "CVE-2018-6076", "CVE-2018-6077", "CVE-2018-6078", "CVE-2018-6079", "CVE-2018-6080", "CVE-2018-6081", "CVE-2018-6082", "CVE-2018-6083", "CVE-2018-6406"], "description": "Chromium is an open-source web browser, powered by WebKit (Blink). ", "modified": "2018-03-30T13:40:00", "published": "2018-03-30T13:40:00", "id": "FEDORA:855A9625F2AD", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 28 Update: chromium-65.0.3325.181-1.fc28", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "cve": [{"lastseen": "2021-02-02T06:36:33", "description": "An issue was discovered in Adobe Flash Player 27.0.0.183 and earlier versions. This vulnerability is an instance of a use after free vulnerability in the Primetime SDK metadata functionality. The mismatch between an old and a new object can provide an attacker with unintended memory access -- potentially leading to code corruption, control-flow hijack, or an information leak attack. Successful exploitation could lead to arbitrary code execution.", "edition": 6, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2017-12-09T06:29:00", "title": "CVE-2017-11225", "type": "cve", "cwe": ["CWE-416"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-11225"], "modified": "2017-12-21T15:28:00", "cpe": ["cpe:/a:adobe:flash_player:27.0.0.183", "cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0"], "id": "CVE-2017-11225", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11225", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:adobe:flash_player:27.0.0.183:*:*:*:*:edge:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:27.0.0.183:*:*:*:*:intenet_explorer_11:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:27.0.0.183:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:27.0.0.183:*:*:*:*:chrome:*:*"]}, {"lastseen": "2021-02-02T06:36:32", "description": "An issue was discovered in Adobe Flash Player 27.0.0.183 and earlier versions. This vulnerability is an instance of a use after free vulnerability in the Primetime SDK. The mismatch between an old and a new object can provide an attacker with unintended memory access -- potentially leading to code corruption, control-flow hijack, or an information leak attack. Successful exploitation could lead to arbitrary code execution.", "edition": 6, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2017-12-09T06:29:00", "title": "CVE-2017-11215", "type": "cve", "cwe": ["CWE-416"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-11215"], "modified": "2017-12-21T15:28:00", "cpe": ["cpe:/a:adobe:flash_player:27.0.0.183", "cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0"], "id": "CVE-2017-11215", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11215", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:adobe:flash_player:27.0.0.183:*:*:*:*:edge:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:27.0.0.183:*:*:*:*:intenet_explorer_11:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:27.0.0.183:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:27.0.0.183:*:*:*:*:chrome:*:*"]}, {"lastseen": "2021-02-02T06:52:40", "description": "Incorrect handling of confusable characters in Omnibox in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.", "edition": 15, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "baseScore": 6.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-12-04T17:29:00", "title": "CVE-2018-6105", "type": "cve", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-6105"], "modified": "2019-10-03T00:03:00", "cpe": ["cpe:/o:redhat:linux_server:6.0", "cpe:/o:debian:debian_linux:8.0", "cpe:/o:redhat:linux_workstation:6.0", "cpe:/o:redhat:linux_desktop:6.0", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2018-6105", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6105", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:52:40", "description": "Lack of special casing of Android ashmem in Google Chrome prior to 65.0.3325.146 allowed a remote attacker who had compromised the renderer process to bypass inter-process read only guarantees via a crafted HTML page.", "edition": 15, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-11-14T15:29:00", "title": "CVE-2018-6057", "type": "cve", "cwe": ["CWE-732"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-6057"], "modified": "2019-10-03T00:03:00", "cpe": ["cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2018-6057", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6057", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:52:40", "description": "A lack of CORS checks in Blink in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to leak limited cross-origin data via a crafted HTML page.", "edition": 14, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 6.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-12-04T17:29:00", "title": "CVE-2018-6099", "type": "cve", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-6099"], "modified": "2019-03-01T20:36:00", "cpe": ["cpe:/o:redhat:linux_server:6.0", "cpe:/o:debian:debian_linux:8.0", "cpe:/o:redhat:linux_workstation:6.0", "cpe:/o:redhat:linux_desktop:6.0", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2018-6099", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6099", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:52:40", "description": "Stack buffer overflow in Skia in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.", "edition": 15, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 6.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-11-14T15:29:00", "title": "CVE-2018-6069", "type": "cve", "cwe": ["CWE-125", "CWE-787"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-6069"], "modified": "2020-08-24T17:37:00", "cpe": ["cpe:/o:redhat:linux_server:6.0", "cpe:/o:redhat:linux_workstation:6.0", "cpe:/o:redhat:linux_desktop:6.0", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2018-6069", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6069", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:52:40", "description": "Service Workers can intercept any request made by an <embed> or <object> tag in Fetch API in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to leak cross-origin data via a crafted HTML page.", "edition": 14, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 6.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 3.6}, "published": "2019-01-09T19:29:00", "title": "CVE-2018-6091", "type": "cve", "cwe": ["CWE-19"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-6091"], "modified": "2019-01-30T18:27:00", "cpe": ["cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:debian:debian_linux:8.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2018-6091", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6091", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:52:40", "description": "Type Confusion in the implementation of __defineGetter__ in V8 in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "edition": 14, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-11-14T15:29:00", "title": "CVE-2018-6064", "type": "cve", "cwe": ["CWE-704"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-6064"], "modified": "2019-05-02T15:50:00", "cpe": ["cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2018-6064", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6064", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:52:40", "description": "An iterator-invalidation bug in PDFium in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file.", "edition": 14, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-12-04T17:29:00", "title": "CVE-2018-6088", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-6088"], "modified": "2019-03-01T19:54:00", "cpe": ["cpe:/o:redhat:linux_server:6.0", "cpe:/o:debian:debian_linux:8.0", "cpe:/o:redhat:linux_workstation:6.0", "cpe:/o:redhat:linux_desktop:6.0", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2018-6088", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6088", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:52:40", "description": "Integer overflow in computing the required allocation size when instantiating a new javascript object in V8 in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "edition": 15, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-11-14T15:29:00", "title": "CVE-2018-6065", "type": "cve", "cwe": ["CWE-190", "CWE-787"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-6065"], "modified": "2020-08-24T17:37:00", "cpe": ["cpe:/a:mi:mi6_browser:-", "cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2018-6065", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6065", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:mi:mi6_browser:-:*:*:*:*:*:*:*"]}]}