CVE-2015-1271 – chromium-browser: Heap-buffer-overflow in pdfium
https://notcve.org/view.php?id=CVE-2015-1271
PDFium, as used in Google Chrome before 44.0.2403.89, does not properly handle certain out-of-memory conditions, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted PDF document that triggers a large memory allocation. Vulnerabilidad en PDFium implementado en Google Chrome en versiones anteriores a la 44.0.2403.89, no maneja correctamente ciertas condiciones de out-of-memory, lo cual permite a atacantes remotos causar una denegación de servicio mediante un desbordamiento de buffer basado en memoria dinámica o posiblemente tener otro impacto no especificado a través un documento PDF manipulado que desencadena una asignación de memoria de gran tamaño. • http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html http://rhn.redhat.com/errata/RHSA-2015-1499.html http://www.debian.org/security/2015/dsa-3315 http://www.securityfocus.com/bid/75973 http://www.securitytracker.com/id/1033031 https://code.google.com/p/chromium/issues/detail?id=446032 https://codereview.chromium.org/1226403008 https://security.gentoo.org/glsa/201603-09 https:// • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •
CVE-2015-1272 – chromium-browser: Use-after-free related to unexpected GPU process termination in unspecified
https://notcve.org/view.php?id=CVE-2015-1272
Use-after-free vulnerability in the GPU process implementation in Google Chrome before 44.0.2403.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging the continued availability of a GPUChannelHost data structure during Blink shutdown, related to content/browser/gpu/browser_gpu_channel_host_factory.cc and content/renderer/render_thread_impl.cc. Vulnerabilidad de uso después de liberación de memoria en la implementación de procesos de la GPU en Google Chrome en versiones anteriores a la 44.0.2403.89, permitiendo a atacantes remotos causar una denegación de servicio, o posiblemente tener otro impacto no especificado mediante el aprovechamiento de la disponibilidad permanente de la estructura de datos GPUChannelHost durante el Blink shutdown. Error relacionado con content/browser/gpu/browser_gpu_channel_host_factory.cc y content/renderer/render_thread_impl.cc. • http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html http://rhn.redhat.com/errata/RHSA-2015-1499.html http://www.debian.org/security/2015/dsa-3315 http://www.securityfocus.com/bid/75973 http://www.securitytracker.com/id/1033031 https://code.google.com/p/chromium/issues/detail?id=451456 https://codereview.chromium.org/1128233004 https://codereview.chromium.org/867553003 https://security • CWE-416: Use After Free •
CVE-2015-1266 – chromium-browser: Scheme validation error in WebUI
https://notcve.org/view.php?id=CVE-2015-1266
content/browser/webui/content_web_ui_controller_factory.cc in Google Chrome before 43.0.2357.130 does not properly consider the scheme in determining whether a URL is associated with a WebUI SiteInstance, which allows remote attackers to bypass intended access restrictions via a similar URL, as demonstrated by use of http://gpu when there is a WebUI class for handling chrome://gpu requests. content/browser/webui/content_web_ui_controller_factory.cc en Google Chrome anterior a 43.0.2357.130 no considera correctamente la esquema al determinar si una URL está asociada con una interfaz de usuario web SiteInstance, lo que permite a atacantes remotos evadir las restricciones de acceso a través de una URL similar, tal y como fue demostrado mediante el uso de http://gpu cuando existe una clase de interfaz de usuario web para el manejo de solicitudes chrome://gpu. • http://googlechromereleases.blogspot.com/2015/06/chrome-stable-update.html http://lists.opensuse.org/opensuse-updates/2015-06/msg00057.html http://lists.opensuse.org/opensuse-updates/2015-11/msg00012.html http://rhn.redhat.com/errata/RHSA-2015-1188.html http://www.debian.org/security/2015/dsa-3315 http://www.securityfocus.com/bid/75333 http://www.securitytracker.com/id/1032731 http://www.ubuntu.com/usn/USN-2652-1 https://code.google.com/p/chromium/issues/detail?id=464922 ht • CWE-254: 7PK - Security Features •
CVE-2015-1267 – chromium-browser: Cross-origin bypass in Blink
https://notcve.org/view.php?id=CVE-2015-1267
Blink, as used in Google Chrome before 43.0.2357.130, does not properly restrict the creation context during creation of a DOM wrapper, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code that uses a Blink public API, related to WebArrayBufferConverter.cpp, WebBlob.cpp, WebDOMError.cpp, and WebDOMFileSystem.cpp. Blink, utilizado en Google Chrome anterior a 43.0.2357.130, no restringe correctamente el contexto de la creación durante la creación de un envoltorio DOM, lo que permite a atacantes remotos evadir Same Origin Policy a través de código JavaScript manipulado que utiliza una API pública de Blink, relacionado con WebArrayBufferConverter.cpp, WebBlob.cpp, WebDOMError.cpp, y WebDOMFileSystem.cpp. • http://googlechromereleases.blogspot.com/2015/06/chrome-stable-update.html http://lists.opensuse.org/opensuse-updates/2015-06/msg00057.html http://lists.opensuse.org/opensuse-updates/2015-11/msg00012.html http://rhn.redhat.com/errata/RHSA-2015-1188.html http://www.debian.org/security/2015/dsa-3315 http://www.securityfocus.com/bid/75334 http://www.securitytracker.com/id/1032731 http://www.ubuntu.com/usn/USN-2652-1 https://code.google.com/p/chromium/issues/detail?id=497507 ht • CWE-254: 7PK - Security Features •
CVE-2015-1269 – chromium-browser: Normalization error in HSTS/HPKP preload list
https://notcve.org/view.php?id=CVE-2015-1269
The DecodeHSTSPreloadRaw function in net/http/transport_security_state.cc in Google Chrome before 43.0.2357.130 does not properly canonicalize DNS hostnames before making comparisons to HSTS or HPKP preload entries, which allows remote attackers to bypass intended access restrictions via a string that (1) ends in a . (dot) character or (2) is not entirely lowercase. La función DecodeHSTSPreloadRaw en net/http/transport_security_state.cc en Google Chrome anterior a 43.0.2357.130 no canonicaliza correctamente los nombres de anfitriones DNS antes de hacer comparaciones con las entradas de precarga HSTS o HPKP, lo que permite a atacantes remotos evadir las restricciones de acceso a través de una cadena que (1) acaba en un caracter . (punto) o (2) no está completamente en minúsculas. • http://googlechromereleases.blogspot.com/2015/06/chrome-stable-update.html http://lists.opensuse.org/opensuse-updates/2015-06/msg00057.html http://lists.opensuse.org/opensuse-updates/2015-11/msg00012.html http://rhn.redhat.com/errata/RHSA-2015-1188.html http://www.debian.org/security/2015/dsa-3315 http://www.securityfocus.com/bid/75336 http://www.securitytracker.com/id/1032731 http://www.ubuntu.com/usn/USN-2652-1 https://code.google.com/p/chromium/issues/detail?id=461481 ht • CWE-254: 7PK - Security Features •