Mandrake Linux Security Advisory : chromium (MDKSA-2006:213)

Critical Nessus Plugin ID 24598


The remote Mandrake Linux host is missing one or more security updates.


Chromium is an OpenGL-based shoot them up game with fine graphics. It is built with a private copy of libpng, and as such could be susceptible to some of the same vulnerabilities :

Buffer overflow in the png_decompress_chunk function in pngrutil.c in libpng before 1.2.12 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors related to 'chunk error processing,' possibly involving the 'chunk_name'. (CVE-2006-3334)

It is questionable whether this issue is actually exploitable, but the patch to correct the issue has been included in versions < 1.2.12.

In addition, an patch to address several old vulnerabilities has been applied to this build. (CVE-2002-1363, CVE-2004-0421, CVE-2004-0597, CVE-2004-0598, CVE-2004-0599)

Packages have been patched to correct these issues.


Update the affected chromium and / or chromium-setup packages.

Plugin Details

Severity: Critical

ID: 24598

File Name: mandrake_MDKSA-2006-213.nasl

Version: $Revision: 1.17 $

Type: local

Published: 2007/02/18

Modified: 2016/05/20

Dependencies: 12634

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:chromium, p-cpe:/a:mandriva:linux:chromium-setup, cpe:/o:mandriva:linux:2007

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2006/11/16

Reference Information

CVE: CVE-2002-1363, CVE-2004-0421, CVE-2004-0597, CVE-2004-0598, CVE-2004-0599, CVE-2006-3334

BID: 10244, 18698, 21078

OSVDB: 5726, 7191, 8312, 8314, 8315, 8316, 8326, 28160, 73493

MDKSA: 2006:213