CVE-2015-1274
chromium-browser: Settings allowed executable files to run immediately after download in unsepcified
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Google Chrome before 44.0.2403.89 does not ensure that the auto-open list omits all dangerous file types, which makes it easier for remote attackers to execute arbitrary code by providing a crafted file and leveraging a user's previous "Always open files of this type" choice, related to download_commands.cc and download_prefs.cc.
Vulnerabilidad en versiones anteriores a la 44.0.2403.89 de Google Chrome, no asegura que la lista de auto-apertura, omita todos los tipos de archivos peligrosos. Lo cual permite que sea más fácil para atacantes remotos ejecutar código arbitrario al proporcionar un archivo manipulado y aprovechar la elección 'siempre abrir archivos de este tipo ' de un usuario, error relacionado con download_commands.cc y download_prefs.cc.
Chromium is an open-source web browser, powered by WebKit. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash or, potentially, execute arbitrary code with the privileges of the user running Chromium. All Chromium users should upgrade to these updated packages, which contain Chromium version 44.0.2403.89, which corrects these issues. After installing the update, Chromium must be restarted for the changes to take effect.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-01-21 CVE Reserved
- 2015-07-23 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-254: 7PK - Security Features
CAPEC
References (11)
URL | Tag | Source |
---|---|---|
http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html | X_refsource_confirm | |
http://www.securityfocus.com/bid/75973 | Vdb Entry | |
http://www.securitytracker.com/id/1033031 | Vdb Entry | |
https://code.google.com/p/chromium/issues/detail?id=461858 | X_refsource_confirm | |
https://codereview.chromium.org/1165893004 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html | 2023-11-07 | |
http://rhn.redhat.com/errata/RHSA-2015-1499.html | 2023-11-07 | |
http://www.debian.org/security/2015/dsa-3315 | 2023-11-07 | |
https://security.gentoo.org/glsa/201603-09 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2015-1274 | 2015-07-27 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1245577 | 2015-07-27 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Opensuse Search vendor "Opensuse" for product "Opensuse" | 13.1 Search vendor "Opensuse" for product "Opensuse" and version "13.1" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Opensuse Search vendor "Opensuse" for product "Opensuse" | 13.2 Search vendor "Opensuse" for product "Opensuse" and version "13.2" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Desktop Supplementary Search vendor "Redhat" for product "Enterprise Linux Desktop Supplementary" | 6.0 Search vendor "Redhat" for product "Enterprise Linux Desktop Supplementary" and version "6.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Supplementary Search vendor "Redhat" for product "Enterprise Linux Server Supplementary" | 6.0 Search vendor "Redhat" for product "Enterprise Linux Server Supplementary" and version "6.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Supplementary Search vendor "Redhat" for product "Enterprise Linux Server Supplementary" | 6.7.z Search vendor "Redhat" for product "Enterprise Linux Server Supplementary" and version "6.7.z" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Workstation Supplementary Search vendor "Redhat" for product "Enterprise Linux Workstation Supplementary" | 6.0 Search vendor "Redhat" for product "Enterprise Linux Workstation Supplementary" and version "6.0" | - |
Affected
| ||||||
Google Search vendor "Google" | Chrome Search vendor "Google" for product "Chrome" | <= 43.0.2357.134 Search vendor "Google" for product "Chrome" and version " <= 43.0.2357.134" | - |
Affected
|