CVE-2015-1248
chromium-browser: SafeBrowsing bypass
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The FileSystem API in Google Chrome before 40.0.2214.91 allows remote attackers to bypass the SafeBrowsing for Executable Files protection mechanism by creating a .exe file in a temporary filesystem and then referencing this file with a filesystem:http: URL.
La API FileSystem en Google Chrome anterior a 40.0.2214.91 permite a atacantes remotos evadir el mecanismo de protección de la navegación segura para ficheros ejecutables (SafeBrowsing for Executable Files) mediante la creación de un fichero .exe en un sistema de ficheros temporal y posteriormente hacer referencia a este fichero con una URL filesystem:http:.
Chromium is an open-source web browser, powered by WebKit. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash or, potentially, execute arbitrary code with the privileges of the user running Chromium. All Chromium users should upgrade to these updated packages, which contain Chromium version 42.0.2311.90, which corrects these issues. After installing the update, Chromium must be restarted for the changes to take effect.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-01-21 CVE Reserved
- 2015-04-17 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
- CWE-352: Cross-Site Request Forgery (CSRF)
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html | X_refsource_confirm | |
http://www.securitytracker.com/id/1032209 | Vdb Entry | |
https://code.google.com/p/chromium/issues/detail?id=380663 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html | 2023-11-07 | |
http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html | 2023-11-07 | |
http://rhn.redhat.com/errata/RHSA-2015-0816.html | 2023-11-07 | |
http://www.debian.org/security/2015/dsa-3238 | 2023-11-07 | |
https://security.gentoo.org/glsa/201506-04 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2015-1248 | 2015-04-16 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1211930 | 2015-04-16 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 7.0 Search vendor "Debian" for product "Debian Linux" and version "7.0" | - |
Affected
| ||||||
Google Search vendor "Google" | Chrome Search vendor "Google" for product "Chrome" | <= 40.0.2214.85 Search vendor "Google" for product "Chrome" and version " <= 40.0.2214.85" | - |
Affected
|