CVE-2015-1276 – chromium-browser: Use-after-free in IndexedDB.
https://notcve.org/view.php?id=CVE-2015-1276
Use-after-free vulnerability in content/browser/indexed_db/indexed_db_backing_store.cc in the IndexedDB implementation in Google Chrome before 44.0.2403.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging an abort action before a certain write operation. Vulnerabilidad de uso después de liberación de memoria en content/browser/indexed_db/indexed_db_backing_store.cc, en la implementación de IndexedDB en Google Chrome en versiones anteriores a la 44.0.2403.89. Permite a atacantes remotos causar una denegación de servicio, o la posibilidad de tener otro impacto no especificado a través del aprovechamiento de una acción abortada antes de una cierta operación de escritura. • http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html http://rhn.redhat.com/errata/RHSA-2015-1499.html http://www.debian.org/security/2015/dsa-3315 http://www.securityfocus.com/bid/75973 http://www.securitytracker.com/id/1033031 https://code.google.com/p/chromium/issues/detail?id=472614 https://codereview.chromium.org/1060613002 https://security.gentoo.org/glsa/201603-09 https:// • CWE-416: Use After Free •
CVE-2015-1269 – chromium-browser: Normalization error in HSTS/HPKP preload list
https://notcve.org/view.php?id=CVE-2015-1269
The DecodeHSTSPreloadRaw function in net/http/transport_security_state.cc in Google Chrome before 43.0.2357.130 does not properly canonicalize DNS hostnames before making comparisons to HSTS or HPKP preload entries, which allows remote attackers to bypass intended access restrictions via a string that (1) ends in a . (dot) character or (2) is not entirely lowercase. La función DecodeHSTSPreloadRaw en net/http/transport_security_state.cc en Google Chrome anterior a 43.0.2357.130 no canonicaliza correctamente los nombres de anfitriones DNS antes de hacer comparaciones con las entradas de precarga HSTS o HPKP, lo que permite a atacantes remotos evadir las restricciones de acceso a través de una cadena que (1) acaba en un caracter . (punto) o (2) no está completamente en minúsculas. • http://googlechromereleases.blogspot.com/2015/06/chrome-stable-update.html http://lists.opensuse.org/opensuse-updates/2015-06/msg00057.html http://lists.opensuse.org/opensuse-updates/2015-11/msg00012.html http://rhn.redhat.com/errata/RHSA-2015-1188.html http://www.debian.org/security/2015/dsa-3315 http://www.securityfocus.com/bid/75336 http://www.securitytracker.com/id/1032731 http://www.ubuntu.com/usn/USN-2652-1 https://code.google.com/p/chromium/issues/detail?id=461481 ht • CWE-254: 7PK - Security Features •
CVE-2015-1268 – chromium-browser: Cross-origin bypass in Blink
https://notcve.org/view.php?id=CVE-2015-1268
bindings/scripts/v8_types.py in Blink, as used in Google Chrome before 43.0.2357.130, does not properly select a creation context for a return value's DOM wrapper, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code, as demonstrated by use of a data: URL. bindings/scripts/v8_types.py en Blink, utilizado en Google Chrome anterior a 43.0.2357.130, no selecciona correctamente un contexto de la creación para el envoltorio DOM de un valor de retorno, lo que permite a atacantes remotos evadir Same Origin Policy a través de código JavaScript manipulado, tal y como fue demostrado mediante el uso de una URL data:. • http://googlechromereleases.blogspot.com/2015/06/chrome-stable-update.html http://lists.opensuse.org/opensuse-updates/2015-06/msg00057.html http://lists.opensuse.org/opensuse-updates/2015-11/msg00012.html http://rhn.redhat.com/errata/RHSA-2015-1188.html http://www.debian.org/security/2015/dsa-3315 http://www.securityfocus.com/bid/75332 http://www.securitytracker.com/id/1032731 http://www.ubuntu.com/usn/USN-2652-1 https://code.google.com/p/chromium/issues/detail?id=494640 ht • CWE-254: 7PK - Security Features •
CVE-2015-1266 – chromium-browser: Scheme validation error in WebUI
https://notcve.org/view.php?id=CVE-2015-1266
content/browser/webui/content_web_ui_controller_factory.cc in Google Chrome before 43.0.2357.130 does not properly consider the scheme in determining whether a URL is associated with a WebUI SiteInstance, which allows remote attackers to bypass intended access restrictions via a similar URL, as demonstrated by use of http://gpu when there is a WebUI class for handling chrome://gpu requests. content/browser/webui/content_web_ui_controller_factory.cc en Google Chrome anterior a 43.0.2357.130 no considera correctamente la esquema al determinar si una URL está asociada con una interfaz de usuario web SiteInstance, lo que permite a atacantes remotos evadir las restricciones de acceso a través de una URL similar, tal y como fue demostrado mediante el uso de http://gpu cuando existe una clase de interfaz de usuario web para el manejo de solicitudes chrome://gpu. • http://googlechromereleases.blogspot.com/2015/06/chrome-stable-update.html http://lists.opensuse.org/opensuse-updates/2015-06/msg00057.html http://lists.opensuse.org/opensuse-updates/2015-11/msg00012.html http://rhn.redhat.com/errata/RHSA-2015-1188.html http://www.debian.org/security/2015/dsa-3315 http://www.securityfocus.com/bid/75333 http://www.securitytracker.com/id/1032731 http://www.ubuntu.com/usn/USN-2652-1 https://code.google.com/p/chromium/issues/detail?id=464922 ht • CWE-254: 7PK - Security Features •
CVE-2015-1267 – chromium-browser: Cross-origin bypass in Blink
https://notcve.org/view.php?id=CVE-2015-1267
Blink, as used in Google Chrome before 43.0.2357.130, does not properly restrict the creation context during creation of a DOM wrapper, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code that uses a Blink public API, related to WebArrayBufferConverter.cpp, WebBlob.cpp, WebDOMError.cpp, and WebDOMFileSystem.cpp. Blink, utilizado en Google Chrome anterior a 43.0.2357.130, no restringe correctamente el contexto de la creación durante la creación de un envoltorio DOM, lo que permite a atacantes remotos evadir Same Origin Policy a través de código JavaScript manipulado que utiliza una API pública de Blink, relacionado con WebArrayBufferConverter.cpp, WebBlob.cpp, WebDOMError.cpp, y WebDOMFileSystem.cpp. • http://googlechromereleases.blogspot.com/2015/06/chrome-stable-update.html http://lists.opensuse.org/opensuse-updates/2015-06/msg00057.html http://lists.opensuse.org/opensuse-updates/2015-11/msg00012.html http://rhn.redhat.com/errata/RHSA-2015-1188.html http://www.debian.org/security/2015/dsa-3315 http://www.securityfocus.com/bid/75334 http://www.securitytracker.com/id/1032731 http://www.ubuntu.com/usn/USN-2652-1 https://code.google.com/p/chromium/issues/detail?id=497507 ht • CWE-254: 7PK - Security Features •