![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.702939 |
Category: | Debian Local Security Checks |
Title: | Debian: Security Advisory (DSA-2939-1) |
Summary: | The remote host is missing an update for the Debian 'chromium-browser' package(s) announced via the DSA-2939-1 advisory. |
Description: | Summary: The remote host is missing an update for the Debian 'chromium-browser' package(s) announced via the DSA-2939-1 advisory. Vulnerability Insight: Several vulnerabilities were discovered in the chromium web browser. CVE-2014-1743 cloudfuzzer discovered a use-after-free issue in the Blink/Webkit document object model implementation. CVE-2014-1744 Aaron Staple discovered an integer overflow issue in audio input handling. CVE-2014-1745 Atte Kettunen discovered a use-after-free issue in the Blink/Webkit scalable vector graphics implementation. CVE-2014-1746 Holger Fuhrmannek discovered an out-of-bounds read issue in the URL protocol implementation for handling media. CVE-2014-1747 packagesu discovered a cross-site scripting issue involving malformed MHTML files. CVE-2014-1748 Jordan Milne discovered a user interface spoofing issue. CVE-2014-1749 The Google Chrome development team discovered and fixed multiple issues with potential security impact. CVE-2014-3152 An integer underflow issue was discovered in the v8 javascript library. For the stable distribution (wheezy), these problems have been fixed in version 35.0.1916.114-1~ deb7u2. For the testing distribution (jessie), these problems will be fixed soon. For the unstable distribution (sid), these problems have been fixed in version 35.0.1916.114-1. We recommend that you upgrade your chromium-browser packages. Affected Software/OS: 'chromium-browser' package(s) on Debian 7. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2014-1743 Debian Security Information: DSA-2939 (Google Search) http://www.debian.org/security/2014/dsa-2939 http://security.gentoo.org/glsa/glsa-201408-16.xml http://www.securitytracker.com/id/1030270 http://secunia.com/advisories/58920 http://secunia.com/advisories/59155 http://secunia.com/advisories/60372 SuSE Security Announcement: openSUSE-SU-2014:0783 (Google Search) http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html Common Vulnerability Exposure (CVE) ID: CVE-2014-1744 Common Vulnerability Exposure (CVE) ID: CVE-2014-1745 http://www.openwall.com/lists/oss-security/2024/02/05/8 Common Vulnerability Exposure (CVE) ID: CVE-2014-1746 Common Vulnerability Exposure (CVE) ID: CVE-2014-1747 Common Vulnerability Exposure (CVE) ID: CVE-2014-1748 http://lists.apple.com/archives/security-announce/2014/Dec/msg00000.html SuSE Security Announcement: openSUSE-SU-2016:0915 (Google Search) http://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html http://www.ubuntu.com/usn/USN-2937-1 Common Vulnerability Exposure (CVE) ID: CVE-2014-1749 Common Vulnerability Exposure (CVE) ID: CVE-2014-3152 http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157363.html http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157338.html http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157357.html Common Vulnerability Exposure (CVE) ID: CVE-2014-3803 BugTraq ID: 67582 http://www.securityfocus.com/bid/67582 http://blog.guya.net/2014/04/07/to-listen-without-consent-abusing-the-html5-speech/ |
Copyright | Copyright (C) 2014 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |