Lucene search

K
nessusThis script is Copyright (C) 2019-2024 and is owned by Tenable, Inc. or an Affiliate thereof.DEBIAN_DSA-4421.NASL
HistoryApr 01, 2019 - 12:00 a.m.

Debian DSA-4421-1 : chromium - security update

2019-04-0100:00:00
This script is Copyright (C) 2019-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
23

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.331 Low

EPSS

Percentile

97.1%

Several vulnerabilities have been discovered in the chromium web browser.

  • CVE-2019-5787 Zhe Jin discovered a use-after-free issue.

  • CVE-2019-5788 Mark Brand discovered a use-after-free issue in the FileAPI implementation.

  • CVE-2019-5789 Mark Brand discovered a use-after-free issue in the WebMIDI implementation.

  • CVE-2019-5790 Dimitri Fourny discovered a buffer overflow issue in the v8 JavaScript library.

  • CVE-2019-5791 Choongwoo Han discovered a type confusion issue in the v8 JavaScript library.

  • CVE-2019-5792 pdknsk discovered an integer overflow issue in the pdfium library.

  • CVE-2019-5793 Jun Kokatsu discovered a permissions issue in the Extensions implementation.

  • CVE-2019-5794 Juno Im of Theori discovered a user interface spoofing issue.

  • CVE-2019-5795 pdknsk discovered an integer overflow issue in the pdfium library.

  • CVE-2019-5796 Mark Brand discovered a race condition in the Extensions implementation.

  • CVE-2019-5797 Mark Brand discovered a race condition in the DOMStorage implementation.

  • CVE-2019-5798 Tran Tien Hung discovered an out-of-bounds read issue in the skia library.

  • CVE-2019-5799 sohalt discovered a way to bypass the Content Security Policy.

  • CVE-2019-5800 Jun Kokatsu discovered a way to bypass the Content Security Policy.

  • CVE-2019-5802 Ronni Skansing discovered a user interface spoofing issue.

  • CVE-2019-5803 Andrew Comminos discovered a way to bypass the Content Security Policy.

#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were  
# extracted from Debian Security Advisory DSA-4421. The text 
# itself is copyright (C) Software in the Public Interest, Inc.
#

include('compat.inc');

if (description)
{
  script_id(123533);
  script_version("1.6");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/06/07");

  script_cve_id(
    "CVE-2019-5787",
    "CVE-2019-5788",
    "CVE-2019-5789",
    "CVE-2019-5790",
    "CVE-2019-5791",
    "CVE-2019-5792",
    "CVE-2019-5793",
    "CVE-2019-5794",
    "CVE-2019-5795",
    "CVE-2019-5796",
    "CVE-2019-5797",
    "CVE-2019-5798",
    "CVE-2019-5799",
    "CVE-2019-5800",
    "CVE-2019-5802",
    "CVE-2019-5803"
  );
  script_xref(name:"DSA", value:"4421");

  script_name(english:"Debian DSA-4421-1 : chromium - security update");

  script_set_attribute(attribute:"synopsis", value:
"The remote Debian host is missing a security-related update.");
  script_set_attribute(attribute:"description", value:
"Several vulnerabilities have been discovered in the chromium web
browser.

  - CVE-2019-5787
    Zhe Jin discovered a use-after-free issue.

  - CVE-2019-5788
    Mark Brand discovered a use-after-free issue in the
    FileAPI implementation.

  - CVE-2019-5789
    Mark Brand discovered a use-after-free issue in the
    WebMIDI implementation.

  - CVE-2019-5790
    Dimitri Fourny discovered a buffer overflow issue in the
    v8 JavaScript library.

  - CVE-2019-5791
    Choongwoo Han discovered a type confusion issue in the
    v8 JavaScript library.

  - CVE-2019-5792
    pdknsk discovered an integer overflow issue in the
    pdfium library.

  - CVE-2019-5793
    Jun Kokatsu discovered a permissions issue in the
    Extensions implementation.

  - CVE-2019-5794
    Juno Im of Theori discovered a user interface spoofing
    issue.

  - CVE-2019-5795
    pdknsk discovered an integer overflow issue in the
    pdfium library.

  - CVE-2019-5796
    Mark Brand discovered a race condition in the Extensions
    implementation.

  - CVE-2019-5797
    Mark Brand discovered a race condition in the DOMStorage
    implementation.

  - CVE-2019-5798
    Tran Tien Hung discovered an out-of-bounds read issue in
    the skia library.

  - CVE-2019-5799
    sohalt discovered a way to bypass the Content Security
    Policy.

  - CVE-2019-5800
    Jun Kokatsu discovered a way to bypass the Content
    Security Policy.

  - CVE-2019-5802
    Ronni Skansing discovered a user interface spoofing
    issue.

  - CVE-2019-5803
    Andrew Comminos discovered a way to bypass the Content
    Security Policy.");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2019-5787");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2019-5788");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2019-5789");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2019-5790");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2019-5791");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2019-5792");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2019-5793");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2019-5794");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2019-5795");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2019-5796");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2019-5797");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2019-5798");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2019-5799");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2019-5800");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2019-5802");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2019-5803");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/source-package/chromium");
  script_set_attribute(attribute:"see_also", value:"https://packages.debian.org/source/stretch/chromium");
  script_set_attribute(attribute:"see_also", value:"https://www.debian.org/security/2019/dsa-4421");
  script_set_attribute(attribute:"solution", value:
"Upgrade the chromium packages.

For the stable distribution (stretch), these problems have been fixed
in version 73.0.3683.75-1~deb9u1.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-5789");
  script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2019-5795");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2019/05/23");
  script_set_attribute(attribute:"patch_publication_date", value:"2019/03/31");
  script_set_attribute(attribute:"plugin_publication_date", value:"2019/04/01");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:chromium");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:9.0");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Debian Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2019-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");

  exit(0);
}


include("audit.inc");
include("debian_package.inc");


if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);


flag = 0;
if (deb_check(release:"9.0", prefix:"chromedriver", reference:"73.0.3683.75-1~deb9u1")) flag++;
if (deb_check(release:"9.0", prefix:"chromium", reference:"73.0.3683.75-1~deb9u1")) flag++;
if (deb_check(release:"9.0", prefix:"chromium-driver", reference:"73.0.3683.75-1~deb9u1")) flag++;
if (deb_check(release:"9.0", prefix:"chromium-l10n", reference:"73.0.3683.75-1~deb9u1")) flag++;
if (deb_check(release:"9.0", prefix:"chromium-shell", reference:"73.0.3683.75-1~deb9u1")) flag++;
if (deb_check(release:"9.0", prefix:"chromium-widevine", reference:"73.0.3683.75-1~deb9u1")) flag++;

if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
  else security_hole(0);
  exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
VendorProductVersionCPE
debiandebian_linuxchromiump-cpe:/a:debian:debian_linux:chromium
debiandebian_linux9.0cpe:/o:debian:debian_linux:9.0

References

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.331 Low

EPSS

Percentile

97.1%