CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
92.0%
The version of Google Chrome installed on the remote Mac OS X host is prior to 44.0.2403.89. It is, therefore, affected by multiple vulnerabilities :
An uninitialized memory read flaw exists in ICU that an attacker can exploit to have unspecified impact.
(CVE-2015-1270)
A heap buffer overflow condition exists in PDFium due to improper validation of user-supplied input. An attacker can exploit this to execute arbitrary code or cause a denial of service. (CVE-2015-1271, CVE-2015-1273)
A use-after-free memory error exists when the GPU process is unexpectedly terminated. An attacker can exploit this to have an unspecified impact.
(CVE-2015-1272)
The settings for automatic downloading of files allows EXE files to be auto-opened, which can result in the execution of malicious code. (CVE-2015-1274)
A universal cross-site scripting (UXSS) vulnerability exists in Google Chrome for Android due to improper validation of ‘intent://’ URLs. An attacker, using a specially crafted request, can exploit this to execute arbitrary script code. (CVE-2015-1275)
A use-after-free memory error exists in IndexedDB that can allow an attacker to execute arbitrary code.
(CVE-2015-1276)
A denial of service vulnerability exists due to a use-after-free memory error in the method ui::AXTree::Unserialize. An attacker can exploit this to cause a crash. (CVE-2015-1277)
An unspecified flaw exists when handling PDF files that allows an attacker to spoof URLs. (CVE-2015-1278)
An integer overflow condition exists in the method CJBig2_Image::expand() in file JBig2_Image.cpp due to improper validation of user-supplied input. An attacker can exploit this to cause a heap-based buffer overflow, resulting in a denial of service or the execution of arbitrary code. (CVE-2015-1279)
A flaw exists in Google Skia due to improper validation of user-supplied input, which an attacker can exploit to corrupt memory or execute arbitrary code.
(CVE-2015-1280)
An unspecified flaw exists that allows an attacker to bypass the Content Security Policy. (CVE-2015-1281)
A use-after-free memory error exists in PDFium in the file javascript/Document.cpp. An attacker, using a crafted file, can exploit this to execute arbitrary code. (CVE-2015-1282)
A heap buffer overflow condition exists in ‘expat’.
No other information is available. (CVE-2015-1283)
A use-after-free memory error exists in Blink that can allow an attacker to execute arbitrary code.
(CVE-2015-1284)
An unspecified flaw exists in the XSS auditor that allows an attacker to gain access to sensitive information. (CVE-2015-1285)
A universal cross-site scripting (UXSS) vulnerability exists in Blink due to improper validation of unspecified input. An attacker, using a crafted request, can exploit this to execute arbitrary script code.
(CVE-2015-1286)
A flaw exists in WebKit related to the handling of the quirks-mode exception for CSS MIME types, which allows an attacker to bypass the cross-origin policy.
(CVE-2015-1287)
A flaw exists in file spellcheck_hunspell_dictionary.cc, related to the downloading of spellchecker dictionaries over HTTP, which allows a man-in-the-middle to corrupt the downloaded dictionaries. (CVE-2015-1288)
Multiple vulnerabilities exist that were disclosed by internal auditing, fuzzing, and other initiatives, which can result in a denial of service, execution of arbitrary code, or other moderate to severe impact.
(CVE-2015-1289)
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(84922);
script_version("1.9");
script_cvs_date("Date: 2019/11/22");
script_cve_id(
"CVE-2015-1270",
"CVE-2015-1271",
"CVE-2015-1272",
"CVE-2015-1273",
"CVE-2015-1274",
"CVE-2015-1275",
"CVE-2015-1276",
"CVE-2015-1277",
"CVE-2015-1278",
"CVE-2015-1279",
"CVE-2015-1280",
"CVE-2015-1281",
"CVE-2015-1282",
"CVE-2015-1283",
"CVE-2015-1284",
"CVE-2015-1285",
"CVE-2015-1286",
"CVE-2015-1287",
"CVE-2015-1288",
"CVE-2015-1289"
);
script_bugtraq_id(75973);
script_name(english:"Google Chrome < 44.0.2403.89 Multiple Vulnerabilities (Mac OS X)");
script_summary(english:"Checks the version number of Google Chrome.");
script_set_attribute(attribute:"synopsis", value:
"The remote Mac OS X host contains a web browser that is affected by
multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The version of Google Chrome installed on the remote Mac OS X host is
prior to 44.0.2403.89. It is, therefore, affected by multiple
vulnerabilities :
- An uninitialized memory read flaw exists in ICU that an
attacker can exploit to have unspecified impact.
(CVE-2015-1270)
- A heap buffer overflow condition exists in PDFium due to
improper validation of user-supplied input. An attacker
can exploit this to execute arbitrary code or cause a
denial of service. (CVE-2015-1271, CVE-2015-1273)
- A use-after-free memory error exists when the GPU
process is unexpectedly terminated. An attacker can
exploit this to have an unspecified impact.
(CVE-2015-1272)
- The settings for automatic downloading of files allows
EXE files to be auto-opened, which can result in the
execution of malicious code. (CVE-2015-1274)
- A universal cross-site scripting (UXSS) vulnerability
exists in Google Chrome for Android due to improper
validation of 'intent://' URLs. An attacker, using a
specially crafted request, can exploit this to execute
arbitrary script code. (CVE-2015-1275)
- A use-after-free memory error exists in IndexedDB that
can allow an attacker to execute arbitrary code.
(CVE-2015-1276)
- A denial of service vulnerability exists due to a
use-after-free memory error in the method
ui::AXTree::Unserialize. An attacker can exploit this to
cause a crash. (CVE-2015-1277)
- An unspecified flaw exists when handling PDF files that
allows an attacker to spoof URLs. (CVE-2015-1278)
- An integer overflow condition exists in the method
CJBig2_Image::expand() in file JBig2_Image.cpp due to
improper validation of user-supplied input. An attacker
can exploit this to cause a heap-based buffer overflow,
resulting in a denial of service or the execution of
arbitrary code. (CVE-2015-1279)
- A flaw exists in Google Skia due to improper validation
of user-supplied input, which an attacker can exploit to
corrupt memory or execute arbitrary code.
(CVE-2015-1280)
- An unspecified flaw exists that allows an attacker to
bypass the Content Security Policy. (CVE-2015-1281)
- A use-after-free memory error exists in PDFium in the
file javascript/Document.cpp. An attacker, using a
crafted file, can exploit this to execute arbitrary
code. (CVE-2015-1282)
- A heap buffer overflow condition exists in 'expat'.
No other information is available. (CVE-2015-1283)
- A use-after-free memory error exists in Blink that can
allow an attacker to execute arbitrary code.
(CVE-2015-1284)
- An unspecified flaw exists in the XSS auditor that
allows an attacker to gain access to sensitive
information. (CVE-2015-1285)
- A universal cross-site scripting (UXSS) vulnerability
exists in Blink due to improper validation of
unspecified input. An attacker, using a crafted request,
can exploit this to execute arbitrary script code.
(CVE-2015-1286)
- A flaw exists in WebKit related to the handling of
the quirks-mode exception for CSS MIME types, which
allows an attacker to bypass the cross-origin policy.
(CVE-2015-1287)
- A flaw exists in file spellcheck_hunspell_dictionary.cc,
related to the downloading of spellchecker dictionaries
over HTTP, which allows a man-in-the-middle to corrupt
the downloaded dictionaries. (CVE-2015-1288)
- Multiple vulnerabilities exist that were disclosed by
internal auditing, fuzzing, and other initiatives,
which can result in a denial of service, execution of
arbitrary code, or other moderate to severe impact.
(CVE-2015-1289)");
# http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?50bc47d5");
script_set_attribute(attribute:"solution", value:
"Upgrade to Google Chrome 44.0.2403.89 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2015-1289");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2015/02/06");
script_set_attribute(attribute:"patch_publication_date", value:"2015/07/21");
script_set_attribute(attribute:"plugin_publication_date", value:"2015/07/22");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:google:chrome");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"MacOS X Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("macosx_google_chrome_installed.nbin");
script_require_keys("MacOSX/Google Chrome/Installed");
exit(0);
}
include("google_chrome_version.inc");
get_kb_item_or_exit("MacOSX/Google Chrome/Installed");
google_chrome_check_version(fix:'44.0.2403.89', severity:SECURITY_HOLE, xss:TRUE);
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1270
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1271
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1272
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1273
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1274
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1275
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1276
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1277
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1278
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1279
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1280
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1281
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1282
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1283
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1284
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1285
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1286
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1287
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1288
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1289
www.nessus.org/u?50bc47d5
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
92.0%