Debian DSA-3415-1 : chromium-browser - security update

Critical Nessus Plugin ID 87289

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 5.9

Synopsis

The remote Debian host is missing a security-related update.

Description

Several vulnerabilities have been discovered in the chromium web browser.

- CVE-2015-1302 Rub Wu discovered an information leak in the pdfium library.

- CVE-2015-6764 Guang Gong discovered an out-of-bounds read issue in the v8 JavaScript library.

- CVE-2015-6765 A use-after-free issue was discovered in AppCache.

- CVE-2015-6766 A use-after-free issue was discovered in AppCache.

- CVE-2015-6767 A use-after-free issue was discovered in AppCache.

- CVE-2015-6768 Mariusz Mlynski discovered a way to bypass the Same Origin Policy.

- CVE-2015-6769 Mariusz Mlynski discovered a way to bypass the Same Origin Policy.

- CVE-2015-6770 Mariusz Mlynski discovered a way to bypass the Same Origin Policy.

- CVE-2015-6771 An out-of-bounds read issue was discovered in the v8 JavaScript library.

- CVE-2015-6772 Mariusz Mlynski discovered a way to bypass the Same Origin Policy.

- CVE-2015-6773 cloudfuzzer discovered an out-of-bounds read issue in the skia library.

- CVE-2015-6774 A use-after-free issue was found in extensions binding.

- CVE-2015-6775 Atte Kettunen discovered a type confusion issue in the pdfium library.

- CVE-2015-6776 Hanno Bock dicovered an out-of-bounds access issue in the openjpeg library, which is used by pdfium.

- CVE-2015-6777 Long Liu found a use-after-free issue.

- CVE-2015-6778 Karl Skomski found an out-of-bounds read issue in the pdfium library.

- CVE-2015-6779 Til Jasper Ullrich discovered that the pdfium library does not sanitize 'chrome:' URLs.

- CVE-2015-6780 Khalil Zhani discovered a use-after-free issue.

- CVE-2015-6781 miaubiz discovered an integer overflow issue in the sfntly library.

- CVE-2015-6782 Luan Herrera discovered a URL spoofing issue.

- CVE-2015-6784 Inti De Ceukelaire discovered a way to inject HTML into serialized web pages.

- CVE-2015-6785 Michael Ficarra discovered a way to bypass the Content Security Policy.

- CVE-2015-6786 Michael Ficarra discovered another way to bypass the Content Security Policy.

Solution

Upgrade the chromium-browser packages.

For the stable distribution (jessie), these problems have been fixed in version 47.0.2526.73-1~deb8u1.

See Also

https://security-tracker.debian.org/tracker/CVE-2015-1302

https://security-tracker.debian.org/tracker/CVE-2015-6764

https://security-tracker.debian.org/tracker/CVE-2015-6765

https://security-tracker.debian.org/tracker/CVE-2015-6766

https://security-tracker.debian.org/tracker/CVE-2015-6767

https://security-tracker.debian.org/tracker/CVE-2015-6768

https://security-tracker.debian.org/tracker/CVE-2015-6769

https://security-tracker.debian.org/tracker/CVE-2015-6770

https://security-tracker.debian.org/tracker/CVE-2015-6771

https://security-tracker.debian.org/tracker/CVE-2015-6772

https://security-tracker.debian.org/tracker/CVE-2015-6773

https://security-tracker.debian.org/tracker/CVE-2015-6774

https://security-tracker.debian.org/tracker/CVE-2015-6775

https://security-tracker.debian.org/tracker/CVE-2015-6776

https://security-tracker.debian.org/tracker/CVE-2015-6777

https://security-tracker.debian.org/tracker/CVE-2015-6778

https://security-tracker.debian.org/tracker/CVE-2015-6779

https://security-tracker.debian.org/tracker/CVE-2015-6780

https://security-tracker.debian.org/tracker/CVE-2015-6781

https://security-tracker.debian.org/tracker/CVE-2015-6782

https://security-tracker.debian.org/tracker/CVE-2015-6784

https://security-tracker.debian.org/tracker/CVE-2015-6785

https://security-tracker.debian.org/tracker/CVE-2015-6786

https://packages.debian.org/source/jessie/chromium-browser

https://www.debian.org/security/2015/dsa-3415

Plugin Details

Severity: Critical

ID: 87289

File Name: debian_DSA-3415.nasl

Version: 1.10

Type: local

Agent: unix

Published: 2015/12/10

Updated: 2020/09/23

Dependencies: 12634

Risk Information

Risk Factor: Critical

VPR Score: 5.9

CVSS v2.0

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:chromium-browser, cpe:/o:debian:debian_linux:8.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2015/12/09

Vulnerability Publication Date: 2015/11/11

Reference Information

CVE: CVE-2015-1302, CVE-2015-6764, CVE-2015-6765, CVE-2015-6766, CVE-2015-6767, CVE-2015-6768, CVE-2015-6769, CVE-2015-6770, CVE-2015-6771, CVE-2015-6772, CVE-2015-6773, CVE-2015-6774, CVE-2015-6775, CVE-2015-6776, CVE-2015-6777, CVE-2015-6778, CVE-2015-6779, CVE-2015-6780, CVE-2015-6781, CVE-2015-6782, CVE-2015-6784, CVE-2015-6785, CVE-2015-6786

DSA: 3415