Debian DSA-2724-1 : chromium-browser - several vulnerabilities

High Nessus Plugin ID 68970

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 6.7

Synopsis

The remote Debian host is missing a security-related update.

Description

Several vulnerabilities have been discovered in the Chromium web browser.

- CVE-2013-2853 The HTTPS implementation does not ensure that headers are terminated by \r\n\r\n (carriage return, newline, carriage return, newline).

- CVE-2013-2867 Chrome does not properly prevent pop-under windows.

- CVE-2013-2868 common/extensions/sync_helper.cc proceeds with sync operations for NPAPI extensions without checking for a certain plugin permission setting.

- CVE-2013-2869 Denial of service (out-of-bounds read) via a crafted JPEG2000 image.

- CVE-2013-2870 Use-after-free vulnerability in network sockets.

- CVE-2013-2871 Use-after-free vulnerability in input handling.

- CVE-2013-2873 Use-after-free vulnerability in resource loading.

- CVE-2013-2875 Out-of-bounds read in SVG file handling.

- CVE-2013-2876 Chromium does not properly enforce restrictions on the capture of screenshots by extensions, which could lead to information disclosure from previous page visits.

- CVE-2013-2877 Out-of-bounds read in XML file handling.

- CVE-2013-2878 Out-of-bounds read in text handling.

- CVE-2013-2879 The circumstances in which a renderer process can be considered a trusted process for sign-in and subsequent sync operations were not propertly checked.

- CVE-2013-2880 The Chromium 28 development team found various issues from internal fuzzing, audits, and other studies.

Solution

Upgrade the chromium-browser packages.

For the stable distribution (wheezy), these problems have been fixed in version 28.0.1500.71-1~deb7u1.

See Also

https://security-tracker.debian.org/tracker/CVE-2013-2853

https://security-tracker.debian.org/tracker/CVE-2013-2867

https://security-tracker.debian.org/tracker/CVE-2013-2868

https://security-tracker.debian.org/tracker/CVE-2013-2869

https://security-tracker.debian.org/tracker/CVE-2013-2870

https://security-tracker.debian.org/tracker/CVE-2013-2871

https://security-tracker.debian.org/tracker/CVE-2013-2873

https://security-tracker.debian.org/tracker/CVE-2013-2875

https://security-tracker.debian.org/tracker/CVE-2013-2876

https://security-tracker.debian.org/tracker/CVE-2013-2877

https://security-tracker.debian.org/tracker/CVE-2013-2878

https://security-tracker.debian.org/tracker/CVE-2013-2879

https://security-tracker.debian.org/tracker/CVE-2013-2880

https://packages.debian.org/source/wheezy/chromium-browser

https://www.debian.org/security/2013/dsa-2724

Plugin Details

Severity: High

ID: 68970

File Name: debian_DSA-2724.nasl

Version: 1.21

Type: local

Agent: unix

Published: 2013/07/19

Updated: 2020/03/12

Dependencies: 12634

Risk Information

Risk Factor: High

VPR Score: 6.7

CVSS v2.0

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:chromium-browser, cpe:/o:debian:debian_linux:7.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2013/07/17

Vulnerability Publication Date: 2013/07/10

Reference Information

CVE: CVE-2013-2853, CVE-2013-2867, CVE-2013-2868, CVE-2013-2869, CVE-2013-2870, CVE-2013-2871, CVE-2013-2873, CVE-2013-2875, CVE-2013-2876, CVE-2013-2877, CVE-2013-2878, CVE-2013-2879, CVE-2013-2880

BID: 61046, 61047, 61049, 61050, 61051, 61052, 61054, 61055, 61056, 61057, 61059, 61060, 61061

DSA: 2724