6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.6 High
AI Score
Confidence
Low
0.9 High
EPSS
Percentile
98.8%
The remote host is missing an update for the Debian
# SPDX-FileCopyrightText: 2018 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.704352");
script_cve_id("CVE-2018-17480", "CVE-2018-17481", "CVE-2018-18335", "CVE-2018-18336", "CVE-2018-18337", "CVE-2018-18338", "CVE-2018-18339", "CVE-2018-18340", "CVE-2018-18341", "CVE-2018-18342", "CVE-2018-18343", "CVE-2018-18344", "CVE-2018-18345", "CVE-2018-18346", "CVE-2018-18347", "CVE-2018-18348", "CVE-2018-18349", "CVE-2018-18350", "CVE-2018-18351", "CVE-2018-18352", "CVE-2018-18353", "CVE-2018-18354", "CVE-2018-18355", "CVE-2018-18356", "CVE-2018-18357", "CVE-2018-18358", "CVE-2018-18359", "CVE-2018-20065", "CVE-2018-20066", "CVE-2018-20067", "CVE-2018-20068", "CVE-2018-20070", "CVE-2018-20346");
script_tag(name:"creation_date", value:"2018-12-06 23:00:00 +0000 (Thu, 06 Dec 2018)");
script_version("2024-02-02T05:06:06+0000");
script_tag(name:"last_modification", value:"2024-02-02 05:06:06 +0000 (Fri, 02 Feb 2024)");
script_tag(name:"cvss_base", value:"6.8");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2019-02-14 18:17:46 +0000 (Thu, 14 Feb 2019)");
script_name("Debian: Security Advisory (DSA-4352-1)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2018 Greenbone AG");
script_family("Debian Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/debian_linux", "ssh/login/packages", re:"ssh/login/release=DEB9");
script_xref(name:"Advisory-ID", value:"DSA-4352-1");
script_xref(name:"URL", value:"https://www.debian.org/security/2018/DSA-4352-1");
script_xref(name:"URL", value:"https://security-tracker.debian.org/tracker/DSA-4352");
script_xref(name:"URL", value:"https://security-tracker.debian.org/tracker/chromium-browser");
script_tag(name:"summary", value:"The remote host is missing an update for the Debian 'chromium-browser' package(s) announced via the DSA-4352-1 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"Several vulnerabilities have been discovered in the chromium web browser.
CVE-2018-17480
Guang Gong discovered an out-of-bounds write issue in the v8 javascript library.
CVE-2018-17481
Several use-after-free issues were discovered in the pdfium library.
CVE-2018-18335
A buffer overflow issue was discovered in the skia library.
CVE-2018-18336
Huyna discovered a use-after-free issue in the pdfium library.
CVE-2018-18337
cloudfuzzer discovered a use-after-free issue in blink/webkit.
CVE-2018-18338
Zhe Jin discovered a buffer overflow issue in the canvas renderer.
CVE-2018-18339
cloudfuzzer discovered a use-after-free issue in the WebAudio implementation.
CVE-2018-18340
A use-after-free issue was discovered in the MediaRecorder implementation.
CVE-2018-18341
cloudfuzzer discovered a buffer overflow issue in blink/webkit.
CVE-2018-18342
Guang Gong discovered an out-of-bounds write issue in the v8 javascript library.
CVE-2018-18343
Tran Tien Hung discovered a use-after-free issue in the skia library.
CVE-2018-18344
Jann Horn discovered an error in the Extensions implementation.
CVE-2018-18345
Masato Kinugawa and Jun Kokatsu discovered an error in the Site Isolation feature.
CVE-2018-18346
Luan Herrera discovered an error in the user interface.
CVE-2018-18347
Luan Herrera discovered an error in the Navigation implementation.
CVE-2018-18348
Ahmed Elsobky discovered an error in the omnibox implementation.
CVE-2018-18349
David Erceg discovered a policy enforcement error.
CVE-2018-18350
Jun Kokatsu discovered a policy enforcement error.
CVE-2018-18351
Jun Kokatsu discovered a policy enforcement error.
CVE-2018-18352
Jun Kokatsu discovered an error in Media handling.
CVE-2018-18353
Wenxu Wu discovered an error in the network authentication implementation.
CVE-2018-18354
Wenxu Wu discovered an error related to integration with GNOME Shell.
CVE-2018-18355
evil1m0 discovered a policy enforcement error.
CVE-2018-18356
Tran Tien Hung discovered a use-after-free issue in the skia library.
CVE-2018-18357
evil1m0 discovered a policy enforcement error.
CVE-2018-18358
Jann Horn discovered a policy enforcement error.
CVE-2018-18359
cyrilliu discovered an out-of-bounds read issue in the v8 javascript library.
Several additional security relevant issues are also fixed in this update that have not yet received CVE identifiers.
For the stable distribution (stretch), these problems have been fixed in version 71.0.3578.80-1~deb9u1.
We recommend that you upgrade your chromium-browser packages.
For the detailed security status of chromium-browser please refer to its security tracker page at: [link moved to references]");
script_tag(name:"affected", value:"'chromium-browser' package(s) on Debian 9.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-deb.inc");
release = dpkg_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "DEB9") {
if(!isnull(res = isdpkgvuln(pkg:"chromedriver", ver:"71.0.3578.80-1~deb9u1", rls:"DEB9"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"chromium", ver:"71.0.3578.80-1~deb9u1", rls:"DEB9"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"chromium-driver", ver:"71.0.3578.80-1~deb9u1", rls:"DEB9"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"chromium-l10n", ver:"71.0.3578.80-1~deb9u1", rls:"DEB9"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"chromium-shell", ver:"71.0.3578.80-1~deb9u1", rls:"DEB9"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"chromium-widevine", ver:"71.0.3578.80-1~deb9u1", rls:"DEB9"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.6 High
AI Score
Confidence
Low
0.9 High
EPSS
Percentile
98.8%