CVE-2015-1263
chromium-browser: insecure download of spellcheck dictionary in unspecified component
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The Spellcheck API implementation in Google Chrome before 43.0.2357.65 does not use an HTTPS session for downloading a Hunspell dictionary, which allows man-in-the-middle attackers to deliver incorrect spelling suggestions or possibly have unspecified other impact via a crafted file.
La implementación Spellcheck API en Google Chrome anterior a 43.0.2357.65 no utiliza una sesión HTTPS para descargar un diccionario Hunspell, lo que permite a atacantes man-in-the-middle entregar sugerencias de ortografía incorrectas o posiblemente tener otro impacto no especificado a través de un fichero manipulado.
Chromium is an open-source web browser, powered by WebKit. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash or, potentially, execute arbitrary code with the privileges of the user running Chromium. All Chromium users should upgrade to these updated packages, which contain Chromium version 43.0.2357.65, which corrects these issues. After installing the update, Chromium must be restarted for the changes to take effect.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-01-21 CVE Reserved
- 2015-05-20 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-17: DEPRECATED: Code
CAPEC
References (11)
URL | Tag | Source |
---|---|---|
http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html | X_refsource_confirm | |
http://www.securityfocus.com/bid/74723 | Vdb Entry | |
http://www.securitytracker.com/id/1032375 | Vdb Entry | |
https://code.google.com/p/chromium/issues/detail?id=479162 | X_refsource_confirm | |
https://codereview.chromium.org/1056103005 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html | 2023-11-07 | |
http://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html | 2023-11-07 | |
http://www.debian.org/security/2015/dsa-3267 | 2023-11-07 | |
https://security.gentoo.org/glsa/201506-04 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2015-1263 | 2015-05-25 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1223271 | 2015-05-25 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Google Search vendor "Google" | Chrome Search vendor "Google" for product "Chrome" | <= 42.0.2311.152 Search vendor "Google" for product "Chrome" and version " <= 42.0.2311.152" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
|