Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title chromium-browser security update
Informations
Name DSA-3315 First vendor Publication 2015-07-23
Vendor Debian Last vendor Modification 2015-07-23
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Several vulnerabilities were discovered in the chromium web browser.

CVE-2015-1266

Intended access restrictions could be bypassed for certain URLs like chrome://gpu.

CVE-2015-1267

A way to bypass the Same Origin Policy was discovered.

CVE-2015-1268

Mariusz Mlynski also discovered a way to bypass the Same Origin Policy.

CVE-2015-1269

Mike Rudy discovered that hostnames were not properly compared in the HTTP Strict Transport Policy and HTTP Public Key Pinning features, which could allow those access restrictions to be bypassed.

CVE-2015-1270

Atte Kettunen discovered an uninitialized memory read in the ICU library.

CVE-2015-1271

cloudfuzzer discovered a buffer overflow in the pdfium library.

CVE-2015-1272

Chamal de Silva discovered race conditions in the GPU process implementation.

CVE-2015-1273

makosoft discovered a buffer overflow in openjpeg, which is used by the pdfium library embedded in chromium.

CVE-2015-1274

andrewm.bpi discovered that the auto-open list allowed certain file types to be executed immediately after download.

CVE-2015-1276

Colin Payne discovered a use-after-free issue in the IndexedDB implementation.

CVE-2015-1277

SkyLined discovered a use-after-free issue in chromium's accessibility implementation.

CVE-2015-1278

Chamal de Silva discovered a way to use PDF documents to spoof a URL.

CVE-2015-1279

mlafon discovered a buffer overflow in the pdfium library.

CVE-2015-1280

cloudfuzzer discovered a memory corruption issue in the SKIA library.

CVE-2015-1281

Masato Knugawa discovered a way to bypass the Content Security Policy.

CVE-2015-1282

Chamal de Silva discovered multiple use-after-free issues in the pdfium library.

CVE-2015-1283

Huzaifa Sidhpurwala discovered a buffer overflow in the expat library.

CVE-2015-1284

Atte Kettunen discovered that the maximum number of page frames was not correctly checked.

CVE-2015-1285

gazheyes discovered an information leak in the XSS auditor, which normally helps to prevent certain classes of cross-site scripting problems.

CVE-2015-1286

A cross-site scripting issue was discovered in the interface to the v8 javascript library.

CVE-2015-1287

filedescriptor discovered a way to bypass the Same Origin Policy.

CVE-2015-1288

Mike Ruddy discovered that the spellchecking dictionaries could still be downloaded over plain HTTP (related to CVE-2015-1263).

CVE-2015-1289

The chrome 44 development team found and fixed various issues during internal auditing.

In addition to the above issues, Google disabled the hotword extension by default in this version, which if enabled downloads files without the user's intervention.

For the stable distribution (jessie), these problems have been fixed in version 44.0.2403.89-1~deb8u1.

For the testing distribution (stretch), these problems will be fixed soon.

For the unstable distribution (sid), these problems have been fixed in version 44.0.2403.89-1.

We recommend that you upgrade your chromium-browser packages.

Original Source

Url : http://www.debian.org/security/2015/dsa-3315

CWE : Common Weakness Enumeration

% Id Name
37 % CWE-254 Security Features
16 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
16 % CWE-17 Code
5 % CWE-200 Information Exposure
5 % CWE-190 Integer Overflow or Wraparound (CWE/SANS Top 25)
5 % CWE-189 Numeric Errors (CWE/SANS Top 25)
5 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)
5 % CWE-20 Improper Input Validation
5 % CWE-19 Data Handling

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 3925
Application 10
Application 225
Application 1
Application 1
Os 3
Os 3
Os 3
Os 1
Os 2
Os 2
Os 1
Os 2
Os 1
Os 1
Os 2
Os 3
Os 3

Nessus® Vulnerability Scanner

Date Description
2017-05-08 Name : The remote host contains an application that is affected by multiple vulnerab...
File : macos_itunes_12_6.nasl - Type : ACT_GATHER_INFO
2017-05-08 Name : An application running on the remote host is affected by multiple vulnerabili...
File : itunes_12_6_banner.nasl - Type : ACT_GATHER_INFO
2017-05-08 Name : An application installed on the remote host is affected by multiple vulnerabi...
File : itunes_12_6.nasl - Type : ACT_GATHER_INFO
2017-03-01 Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL50459349.nasl - Type : ACT_GATHER_INFO
2017-01-12 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201701-21.nasl - Type : ACT_GATHER_INFO
2017-01-06 Name : A vulnerability scanner installed on the remote host is affected by multiple ...
File : pvs_5_2_0.nasl - Type : ACT_GATHER_INFO
2016-12-27 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2016-359-01.nasl - Type : ACT_GATHER_INFO
2016-10-12 Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL15104541.nasl - Type : ACT_GATHER_INFO
2016-08-12 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_0da8a68e600a11e6a6c314dae9d210b8.nasl - Type : ACT_GATHER_INFO
2016-07-01 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_ff76f0e03f1111e6b3c814dae9d210b8.nasl - Type : ACT_GATHER_INFO
2016-06-21 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-3013-1.nasl - Type : ACT_GATHER_INFO
2016-06-17 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2016-1508-1.nasl - Type : ACT_GATHER_INFO
2016-06-10 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2016-1512-1.nasl - Type : ACT_GATHER_INFO
2016-06-09 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2016-695.nasl - Type : ACT_GATHER_INFO
2016-06-01 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2016-660.nasl - Type : ACT_GATHER_INFO
2016-05-18 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3582.nasl - Type : ACT_GATHER_INFO
2016-03-14 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201603-09.nasl - Type : ACT_GATHER_INFO
2015-12-29 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2015-953.nasl - Type : ACT_GATHER_INFO
2015-09-23 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201507-18.nasl - Type : ACT_GATHER_INFO
2015-09-18 Name : The remote IBM HTTP Server is affected by multiple vulnerabilities.
File : websphere_8_5_5_7.nasl - Type : ACT_GATHER_INFO
2015-09-17 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-2740-1.nasl - Type : ACT_GATHER_INFO
2015-09-16 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3360.nasl - Type : ACT_GATHER_INFO
2015-09-01 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-2726-1.nasl - Type : ACT_GATHER_INFO
2015-08-05 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2677-1.nasl - Type : ACT_GATHER_INFO
2015-07-28 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2015-1499.nasl - Type : ACT_GATHER_INFO
2015-07-28 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3318.nasl - Type : ACT_GATHER_INFO
2015-07-27 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2015-513.nasl - Type : ACT_GATHER_INFO
2015-07-27 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_9d73207832c711e5b26300262d5ed8ee.nasl - Type : ACT_GATHER_INFO
2015-07-27 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3315.nasl - Type : ACT_GATHER_INFO
2015-07-27 Name : The remote Debian host is missing a security update.
File : debian_DLA-281.nasl - Type : ACT_GATHER_INFO
2015-07-22 Name : The remote Mac OS X host contains a web browser that is affected by multiple ...
File : macosx_google_chrome_44_0_2403_89.nasl - Type : ACT_GATHER_INFO
2015-07-22 Name : The remote Windows host contains a web browser that is affected by multiple v...
File : google_chrome_44_0_2403_89.nasl - Type : ACT_GATHER_INFO
2015-07-01 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2652-1.nasl - Type : ACT_GATHER_INFO
2015-06-26 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2015-1188.nasl - Type : ACT_GATHER_INFO
2015-06-26 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2015-449.nasl - Type : ACT_GATHER_INFO
2015-06-23 Name : The remote Mac OS X host contains a web browser that is affected by multiple ...
File : macosx_google_chrome_43_0_2357_130.nasl - Type : ACT_GATHER_INFO
2015-06-23 Name : The remote Windows host contains a web browser that is affected by multiple v...
File : google_chrome_43_0_2357_130.nasl - Type : ACT_GATHER_INFO
2015-06-23 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201506-04.nasl - Type : ACT_GATHER_INFO
2015-06-23 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_d46ed7b8191211e59fdf00262d5ed8ee.nasl - Type : ACT_GATHER_INFO
2015-06-01 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2015-390.nasl - Type : ACT_GATHER_INFO
2015-05-26 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2015-1023.nasl - Type : ACT_GATHER_INFO
2015-05-26 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3267.nasl - Type : ACT_GATHER_INFO
2015-05-21 Name : The remote Mac OS X host contains a web browser that is affected by multiple ...
File : macosx_google_chrome_43_0_2357_65.nasl - Type : ACT_GATHER_INFO
2015-05-21 Name : The remote Windows host contains a web browser that is affected by multiple v...
File : google_chrome_43_0_2357_65.nasl - Type : ACT_GATHER_INFO
2015-05-20 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_a9d456b4fe4c11e4ad1500262d5ed8ee.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2015-07-28 13:32:28
  • Multiple Updates
2015-07-24 17:22:36
  • First insertion