Lucene search

K
archlinuxArchLinuxASA-202011-2
HistoryNov 03, 2020 - 12:00 a.m.

[ASA-202011-2] chromium: multiple issues

2020-11-0300:00:00
security.archlinux.org
16

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.805 High

EPSS

Percentile

98.3%

Arch Linux Security Advisory ASA-202011-2

Severity: Critical
Date : 2020-11-03
CVE-ID : CVE-2020-16004 CVE-2020-16005 CVE-2020-16006 CVE-2020-16007
CVE-2020-16008 CVE-2020-16009
Package : chromium
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-1261

Summary

The package chromium before version 86.0.4240.183-1 is vulnerable to
multiple issues including arbitrary code execution and privilege
escalation.

Resolution

Upgrade to 86.0.4240.183-1.

pacman -Syu β€œchromium>=86.0.4240.183-1”

The problems have been fixed upstream in version 86.0.4240.183.

Workaround

None.

Description

  • CVE-2020-16004 (arbitrary code execution)

A use after free security issue has been found in the user interface
component of the chromium browser before 86.0.4240.75.

  • CVE-2020-16005 (arbitrary code execution)

An insufficient policy enforcement security issue has been found in the
ANGLE component of the chromium browser before 86.0.4240.75, allowing a
remote attacker to potentially exploit heap corruption via a crafted
HTML page.

  • CVE-2020-16006 (arbitrary code execution)

An inappropriate implementation security issue has been found in the V8
component of the chromium browser before 86.0.4240.75, allowing a
remote attacker to potentially exploit heap corruption via a crafted
HTML page.

  • CVE-2020-16007 (privilege escalation)

An insufficient data validation security issue has been found in the
installer component of the chromium browser before 86.0.4240.75,
allowing a local attacker to potentially elevate privilege via a
crafted filesystem.

  • CVE-2020-16008 (arbitrary code execution)

A stack-based buffer overflow security issue has been found in the
WebRTC component of the chromium browser before 86.0.4240.75

  • CVE-2020-16009 (arbitrary code execution)

An inappropriate implementation security issue has been found in the V8
component of the chromium browser before 86.0.4240.75. Google is aware
of reports that an exploit for this issue exists in the wild.

Impact

A remote attacker can bypass security measures and execute arbitrary
code.

References

https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html
https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
https://crbug.com/1138911
https://crbug.com/1139398
https://crbug.com/1133527
https://crbug.com/1125018
https://crbug.com/1134107
https://crbug.com/1143772
https://security.archlinux.org/CVE-2020-16004
https://security.archlinux.org/CVE-2020-16005
https://security.archlinux.org/CVE-2020-16006
https://security.archlinux.org/CVE-2020-16007
https://security.archlinux.org/CVE-2020-16008
https://security.archlinux.org/CVE-2020-16009

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanychromium<Β 86.0.4240.183-1UNKNOWN

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.805 High

EPSS

Percentile

98.3%