Vulnerabilities > CVE-2015-1250
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Multiple unspecified vulnerabilities in Google Chrome before 42.0.2311.135 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Vulnerable Configurations
Nessus
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-201506-04.NASL description The remote host is affected by the vulnerability described in GLSA-201506-04 (Chromium: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Chromium. Please review the CVE identifiers referenced below for details. Impact : A remote attacker can cause arbitrary remote code execution, Denial of Service or bypass of security mechanisms. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 84332 published 2015-06-23 reporter This script is Copyright (C) 2015 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/84332 title GLSA-201506-04 : Chromium: Multiple vulnerabilities code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Gentoo Linux Security Advisory GLSA 201506-04. # # The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc. # and licensed under the Creative Commons - Attribution / Share Alike # license. See http://creativecommons.org/licenses/by-sa/3.0/ # include("compat.inc"); if (description) { script_id(84332); script_version("$Revision: 2.5 $"); script_cvs_date("$Date: 2015/06/28 04:36:42 $"); script_cve_id("CVE-2015-1233", "CVE-2015-1234", "CVE-2015-1235", "CVE-2015-1236", "CVE-2015-1237", "CVE-2015-1238", "CVE-2015-1240", "CVE-2015-1241", "CVE-2015-1242", "CVE-2015-1243", "CVE-2015-1244", "CVE-2015-1245", "CVE-2015-1246", "CVE-2015-1247", "CVE-2015-1248", "CVE-2015-1250", "CVE-2015-1251", "CVE-2015-1252", "CVE-2015-1253", "CVE-2015-1254", "CVE-2015-1255", "CVE-2015-1256", "CVE-2015-1257", "CVE-2015-1258", "CVE-2015-1259", "CVE-2015-1260", "CVE-2015-1262", "CVE-2015-1263", "CVE-2015-1264", "CVE-2015-1265"); script_bugtraq_id(73484, 73486, 74165, 74389, 74723, 74727); script_xref(name:"GLSA", value:"201506-04"); script_name(english:"GLSA-201506-04 : Chromium: Multiple vulnerabilities"); script_summary(english:"Checks for updated package(s) in /var/db/pkg"); script_set_attribute( attribute:"synopsis", value: "The remote Gentoo host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "The remote host is affected by the vulnerability described in GLSA-201506-04 (Chromium: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Chromium. Please review the CVE identifiers referenced below for details. Impact : A remote attacker can cause arbitrary remote code execution, Denial of Service or bypass of security mechanisms. Workaround : There is no known workaround at this time." ); script_set_attribute( attribute:"see_also", value:"https://security.gentoo.org/glsa/201506-04" ); script_set_attribute( attribute:"solution", value: "All Chromium users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose '>=www-client/chromium-43.0.2357.65'" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:chromium"); script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux"); script_set_attribute(attribute:"patch_publication_date", value:"2015/06/23"); script_set_attribute(attribute:"plugin_publication_date", value:"2015/06/23"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2015 Tenable Network Security, Inc."); script_family(english:"Gentoo Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("qpkg.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo"); if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (qpkg_check(package:"www-client/chromium", unaffected:make_list("ge 43.0.2357.65"), vulnerable:make_list("lt 43.0.2357.65"))) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get()); else security_hole(0); exit(0); } else { tested = qpkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Chromium"); }
NASL family Debian Local Security Checks NASL id DEBIAN_DSA-3242.NASL description Several vulnerabilities were discovered in the chromium web browser : - CVE-2015-1243 Saif El-Sherei discovered a use-after-free issue. - CVE-2015-1250 The chrome 42 team found and fixed multiple issues during internal auditing. last seen 2020-06-01 modified 2020-06-02 plugin id 83191 published 2015-05-04 reporter This script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/83191 title Debian DSA-3242-1 : chromium-browser - security update code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Debian Security Advisory DSA-3242. The text # itself is copyright (C) Software in the Public Interest, Inc. # include("compat.inc"); if (description) { script_id(83191); script_version("2.6"); script_cvs_date("Date: 2018/11/10 11:49:37"); script_cve_id("CVE-2015-1243", "CVE-2015-1250"); script_bugtraq_id(74389); script_xref(name:"DSA", value:"3242"); script_name(english:"Debian DSA-3242-1 : chromium-browser - security update"); script_summary(english:"Checks dpkg output for the updated package"); script_set_attribute( attribute:"synopsis", value:"The remote Debian host is missing a security-related update." ); script_set_attribute( attribute:"description", value: "Several vulnerabilities were discovered in the chromium web browser : - CVE-2015-1243 Saif El-Sherei discovered a use-after-free issue. - CVE-2015-1250 The chrome 42 team found and fixed multiple issues during internal auditing." ); script_set_attribute( attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2015-1243" ); script_set_attribute( attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2015-1250" ); script_set_attribute( attribute:"see_also", value:"https://packages.debian.org/source/jessie/chromium-browser" ); script_set_attribute( attribute:"see_also", value:"https://www.debian.org/security/2015/dsa-3242" ); script_set_attribute( attribute:"solution", value: "Upgrade the chromium-browser packages. For the stable distribution (jessie), these problems have been fixed in version 42.0.2311.135-1~deb8u1." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:chromium-browser"); script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:8.0"); script_set_attribute(attribute:"patch_publication_date", value:"2015/04/30"); script_set_attribute(attribute:"plugin_publication_date", value:"2015/05/04"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Debian Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("debian_package.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian"); if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (deb_check(release:"8.0", prefix:"chromedriver", reference:"42.0.2311.135-1~deb8u1")) flag++; if (deb_check(release:"8.0", prefix:"chromium", reference:"42.0.2311.135-1~deb8u1")) flag++; if (deb_check(release:"8.0", prefix:"chromium-dbg", reference:"42.0.2311.135-1~deb8u1")) flag++; if (deb_check(release:"8.0", prefix:"chromium-inspector", reference:"42.0.2311.135-1~deb8u1")) flag++; if (deb_check(release:"8.0", prefix:"chromium-l10n", reference:"42.0.2311.135-1~deb8u1")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2015-0921.NASL description Updated chromium-browser packages that fix multiple security issues and one bug are now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Chromium is an open source web browser, powered by WebKit (Blink). Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash or, potentially, execute arbitrary code with the privileges of the user running Chromium. (CVE-2015-1243, CVE-2015-1250) This update also fixes the following bug : * Prior to this update, Chromium did not accept GNOME last seen 2020-05-31 modified 2015-05-01 plugin id 83173 published 2015-05-01 reporter This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/83173 title RHEL 6 : chromium-browser (RHSA-2015:0921) NASL family MacOS X Local Security Checks NASL id MACOSX_GOOGLE_CHROME_42_0_2311_135.NASL description The version of Google Chrome installed on the remote Mac OS X host is prior to 42.0.2311.135. It is, therefore, affected by multiple vulnerabilities : - An unspecified user-after-free memory error exists in DOM. (CVE-2015-1243) - Other unspecified errors exists. No other details are available. (CVE-2015-1250) Note that Nessus has not tested for these issues but has instead relied only on the application last seen 2020-06-01 modified 2020-06-02 plugin id 83137 published 2015-04-29 reporter This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/83137 title Google Chrome < 42.0.2311.135 Multiple Vulnerabilities (Mac OS X) NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_210F80B9EDE411E481C400262D5ED8EE.NASL description Google Chrome Releases reports : 5 security fixes in this release, including : - [453279] High CVE-2015-1243: Use-after-free in DOM. Credit to Saif El-Sherei. - [481777] CVE-2015-1250: Various fixes from internal audits, fuzzing and other initiatives. last seen 2020-06-01 modified 2020-06-02 plugin id 83130 published 2015-04-29 reporter This script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/83130 title FreeBSD : chromium -- multiple vulnerabilities (210f80b9-ede4-11e4-81c4-00262d5ed8ee) NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-2582-1.NASL description A use-after-free was discovered in the DOM implementation in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash, or execute arbitrary code with the privileges of the sandboxed render process. (CVE-2015-1243) Multiple security issues were discovered in Chromium. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to read uninitialized memory, cause a denial of service via application crash or execute arbitrary code with the privileges of the user invoking the program. (CVE-2015-1250). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 83277 published 2015-05-07 reporter Ubuntu Security Notice (C) 2015-2019 Canonical, Inc. / NASL script (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/83277 title Ubuntu 14.04 LTS / 14.10 / 15.04 : oxide-qt vulnerabilities (USN-2582-1) NASL family Windows NASL id GOOGLE_CHROME_42_0_2311_135.NASL description The version of Google Chrome installed on the remote Windows host is prior to 42.0.2311.135. It is, therefore, affected by multiple vulnerabilities : - An unspecified user-after-free memory error exists in DOM. (CVE-2015-1243) - Other unspecified errors exists. No other details are available. (CVE-2015-1250) Note that Nessus has not tested for these issues but has instead relied only on the application last seen 2020-06-01 modified 2020-06-02 plugin id 83136 published 2015-04-29 reporter This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/83136 title Google Chrome < 42.0.2311.135 Multiple Vulnerabilities NASL family SuSE Local Security Checks NASL id OPENSUSE-2015-354.NASL description Chromium was updated to 42.0.2311.135 to fix security issues and bugs. The following vulnerabilities were fixed : - CVE-2015-1243: Use-after-free in DOM - CVE-2015-1250: Various fixes from internal audits, fuzzing and other initiatives. last seen 2020-06-05 modified 2015-05-13 plugin id 83393 published 2015-05-13 reporter This script is Copyright (C) 2015-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/83393 title openSUSE Security Update : Chromium (openSUSE-2015-354)
Redhat
advisories |
| ||||
rpms |
|
References
- http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_28.html
- http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_28.html
- http://lists.opensuse.org/opensuse-updates/2015-05/msg00009.html
- http://lists.opensuse.org/opensuse-updates/2015-05/msg00009.html
- http://rhn.redhat.com/errata/RHSA-2015-0921.html
- http://rhn.redhat.com/errata/RHSA-2015-0921.html
- http://www.debian.org/security/2015/dsa-3242
- http://www.debian.org/security/2015/dsa-3242
- http://www.securityfocus.com/bid/74389
- http://www.securityfocus.com/bid/74389
- http://www.securitytracker.com/id/1032234
- http://www.securitytracker.com/id/1032234
- http://www.ubuntu.com/usn/USN-2582-1
- http://www.ubuntu.com/usn/USN-2582-1
- https://code.google.com/p/chromium/issues/detail?id=453553
- https://code.google.com/p/chromium/issues/detail?id=453553
- https://code.google.com/p/chromium/issues/detail?id=458191
- https://code.google.com/p/chromium/issues/detail?id=458191
- https://code.google.com/p/chromium/issues/detail?id=473688
- https://code.google.com/p/chromium/issues/detail?id=473688
- https://code.google.com/p/chromium/issues/detail?id=475749
- https://code.google.com/p/chromium/issues/detail?id=475749
- https://code.google.com/p/chromium/issues/detail?id=481777
- https://code.google.com/p/chromium/issues/detail?id=481777
- https://security.gentoo.org/glsa/201506-04
- https://security.gentoo.org/glsa/201506-04