Vulnerabilities > CVE-2018-17479 - Use After Free vulnerability in Google Chrome
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
Incorrect object lifetime calculations in GPU code in Google Chrome prior to 70.0.3538.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family Debian Local Security Checks NASL id DEBIAN_DSA-4342.NASL description Description not provided by Debian for this vulnerability. For further details on the vulnerability, contact Debian. last seen 2020-03-17 modified 2020-03-09 plugin id 134332 published 2020-03-09 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/134332 title Debian DSA-4342-1 : chromium-browser - security update code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Debian Security Advisory DSA-4342. The text # itself is copyright (C) Software in the Public Interest, Inc. # include("compat.inc"); if (description) { script_id(134332); script_version("1.2"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/11"); script_cve_id("CVE-2018-17479"); script_xref(name:"DSA", value:"4342"); script_name(english:"Debian DSA-4342-1 : chromium-browser - security update"); script_summary(english:"Checks dpkg output for the updated package"); script_set_attribute( attribute:"synopsis", value:"The remote Debian host is missing a security-related update." ); script_set_attribute( attribute:"description", value: "Description not provided by Debian for this vulnerability. For further details on the vulnerability, contact Debian." ); # https://security-tracker.debian.org/tracker/source-package/chromium-browser script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?e33901a2" ); script_set_attribute( attribute:"see_also", value:"https://packages.debian.org/source/stretch/chromium-browser" ); script_set_attribute( attribute:"see_also", value:"https://www.debian.org/security/2018/dsa-4342" ); script_set_attribute( attribute:"solution", value: "Upgrade the chromium-browser packages. For the stable distribution (stretch), this problem has been fixed in version 70.0.3538.110-1~deb9u1." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:chromium-browser"); script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:9.0"); script_set_attribute(attribute:"vuln_publication_date", value:"2019/06/27"); script_set_attribute(attribute:"patch_publication_date", value:"2018/11/21"); script_set_attribute(attribute:"plugin_publication_date", value:"2020/03/09"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Debian Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("debian_package.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian"); if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (deb_check(release:"9.0", prefix:"chromedriver", reference:"70.0.3538.110-1~deb9u1")) flag++; if (deb_check(release:"9.0", prefix:"chromium", reference:"70.0.3538.110-1~deb9u1")) flag++; if (deb_check(release:"9.0", prefix:"chromium-driver", reference:"70.0.3538.110-1~deb9u1")) flag++; if (deb_check(release:"9.0", prefix:"chromium-l10n", reference:"70.0.3538.110-1~deb9u1")) flag++; if (deb_check(release:"9.0", prefix:"chromium-shell", reference:"70.0.3538.110-1~deb9u1")) flag++; if (deb_check(release:"9.0", prefix:"chromium-widevine", reference:"70.0.3538.110-1~deb9u1")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get()); else security_warning(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family SuSE Local Security Checks NASL id OPENSUSE-2019-945.NASL description This update for Chromium to version 70.0.3538.110 fixes the following security issue : - CVE-2018-17479: Use-after-free in GPU (boo#1116608) last seen 2020-05-31 modified 2019-03-27 plugin id 123384 published 2019-03-27 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/123384 title openSUSE Security Update : chromium (openSUSE-2019-945) NASL family Fedora Local Security Checks NASL id FEDORA_2018-FD194A1F14.NASL description Security fix for CVE-2018-17478 CVE-2018-17479. Update to 70.0.3538.110. ---- Update to chromium 70.0.3538.77. Fixes CVE-2018-16435 CVE-2018-17462 CVE-2018-17463 CVE-2018-17464 CVE-2018-17465 CVE-2018-17466 CVE-2018-17467 CVE-2018-17468 CVE-2018-17469 CVE-2018-17470 CVE-2018-17471 CVE-2018-17473 CVE-2018-17474 CVE-2018-17475 CVE-2018-17476 CVE-2018-5179 CVE-2018-17477 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-05 modified 2019-01-03 plugin id 120933 published 2019-01-03 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/120933 title Fedora 28 : chromium (2018-fd194a1f14) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-201903-23.NASL description The remote host is affected by the vulnerability described in GLSA-201903-23 (Chromium: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Chromium and Google Chrome. Please review the referenced CVE identifiers and Google Chrome Releases for details. Impact : Please review the referenced CVE identifiers and Google Chrome Releases for details. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 123429 published 2019-03-28 reporter This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/123429 title GLSA-201903-23 : Chromium: Multiple vulnerabilities NASL family Fedora Local Security Checks NASL id FEDORA_2018-8E866C5066.NASL description Security fix for CVE-2018-17478 CVE-2018-17479. Update to 70.0.3538.110. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-05 modified 2019-01-03 plugin id 120607 published 2019-01-03 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/120607 title Fedora 29 : chromium (2018-8e866c5066) NASL family Windows NASL id GOOGLE_CHROME_70_0_3538_110.NASL description The version of Google Chrome installed on the remote Windows host is prior to 70.0.3538.110. It is, therefore, affected by a vulnerability as noted in Google Chrome stable channel update release notes for 2018/11/19. Please refer to the release notes for additional information. Note that Nessus has not attempted to exploit these issues but has instead relied only on the application last seen 2020-06-01 modified 2020-06-02 plugin id 119097 published 2018-11-23 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/119097 title Google Chrome < 70.0.3538.110 Vulnerability NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2018-3648.NASL description An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Chromium is an open source web browser, powered by WebKit (Blink). This update upgrades Chromium to version 70.0.3538.110. Security Fix(es) : * chromium-browser: Use-after-free in GPU (CVE-2018-17479) * chromium-browser: Out of bounds memory access in V8 (CVE-2018-17478) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. last seen 2020-05-31 modified 2018-11-27 plugin id 119167 published 2018-11-27 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/119167 title RHEL 6 : chromium-browser (RHSA-2018:3648) NASL family SuSE Local Security Checks NASL id OPENSUSE-2018-1446.NASL description This update for Chromium to version 70.0.3538.110 fixes the following security issue : - CVE-2018-17479: Use-after-free in GPU (boo#1116608) last seen 2020-06-05 modified 2018-11-26 plugin id 119136 published 2018-11-26 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/119136 title openSUSE Security Update : chromium (openSUSE-2018-1446) NASL family MacOS X Local Security Checks NASL id MACOSX_GOOGLE_CHROME_70_0_3538_110.NASL description The version of Google Chrome installed on the remote macOS host is prior to 70.0.3538.110. It is, therefore, affected by a vulnerability as noted in Google Chrome stable channel update release notes for 2018/11/19. Please refer to the release notes for additional information. Note that Nessus has not attempted to exploit these issues but has instead relied only on the application last seen 2020-06-01 modified 2020-06-02 plugin id 119096 published 2018-11-23 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/119096 title Google Chrome < 70.0.3538.110 Vulnerability
Redhat
rpms |
|