![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.842685 |
Category: | Ubuntu Local Security Checks |
Title: | Ubuntu: Security Advisory (USN-2920-1) |
Summary: | The remote host is missing an update for the 'oxide-qt' package(s) announced via the USN-2920-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'oxide-qt' package(s) announced via the USN-2920-1 advisory. Vulnerability Insight: It was discovered that the ContainerNode::parserRemoveChild function in Blink mishandled widget updates in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to bypass same-origin restrictions. (CVE-2016-1630) It was discovered that the PPB_Flash_MessageLoop_Impl::InternalRun function in Chromium mishandled nested message loops. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to bypass same-origin restrictions. (CVE-2016-1631) Multiple use-after-frees were discovered in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via renderer crash or execute arbitrary code with the privileges of the sandboxed render process. (CVE-2016-1633, CVE-2016-1634, CVE-2016-1644) It was discovered that the PendingScript::notifyFinished function in Blink relied on memory-cache information about integrity-check occurrences instead of integrity-check successes. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to bypass Subresource Integrity (SRI) protections. (CVE-2016-1636) It was discovered that the SkATan2_255 function in Skia mishandled arctangent calculations. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to obtain sensitive information. (CVE-2016-1637) A use-after-free was discovered in Chromium. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking the program. (CVE-2016-1641) Multiple security issues were discovered in Chromium. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to read uninitialized memory, cause a denial of service via application crash or execute arbitrary code with the privileges of the user invoking the program. (CVE-2016-1642) A type-confusion bug was discovered in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash or execute arbitrary code with the privileges of the sandboxed render process. (CVE-2016-1643) Multiple security issues were discovered in V8. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to read uninitialized memory, cause a denial of service via renderer crash or execute arbitrary code with the privileges of the sandboxed render process. (CVE-2016-2843) An invalid cast was discovered in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'oxide-qt' package(s) on Ubuntu 14.04, Ubuntu 15.10. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-1630 BugTraq ID: 84008 http://www.securityfocus.com/bid/84008 Debian Security Information: DSA-3507 (Google Search) http://www.debian.org/security/2016/dsa-3507 https://security.gentoo.org/glsa/201603-09 http://www.securitytracker.com/id/1035185 SuSE Security Announcement: SUSE-SU-2016:0665 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html SuSE Security Announcement: openSUSE-SU-2016:0664 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html SuSE Security Announcement: openSUSE-SU-2016:0684 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html SuSE Security Announcement: openSUSE-SU-2016:0729 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html http://www.ubuntu.com/usn/USN-2920-1 Common Vulnerability Exposure (CVE) ID: CVE-2016-1631 Common Vulnerability Exposure (CVE) ID: CVE-2016-1633 Common Vulnerability Exposure (CVE) ID: CVE-2016-1634 Common Vulnerability Exposure (CVE) ID: CVE-2016-1636 Common Vulnerability Exposure (CVE) ID: CVE-2016-1637 Common Vulnerability Exposure (CVE) ID: CVE-2016-1641 Common Vulnerability Exposure (CVE) ID: CVE-2016-1642 Common Vulnerability Exposure (CVE) ID: CVE-2016-1643 BugTraq ID: 84224 http://www.securityfocus.com/bid/84224 Debian Security Information: DSA-3513 (Google Search) http://www.debian.org/security/2016/dsa-3513 http://www.securitytracker.com/id/1035259 SuSE Security Announcement: openSUSE-SU-2016:0817 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00066.html SuSE Security Announcement: openSUSE-SU-2016:0818 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00067.html SuSE Security Announcement: openSUSE-SU-2016:0828 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00073.html Common Vulnerability Exposure (CVE) ID: CVE-2016-1644 Common Vulnerability Exposure (CVE) ID: CVE-2016-2843 Common Vulnerability Exposure (CVE) ID: CVE-2016-2844 BugTraq ID: 84170 http://www.securityfocus.com/bid/84170 Common Vulnerability Exposure (CVE) ID: CVE-2016-2845 BugTraq ID: 84168 http://www.securityfocus.com/bid/84168 http://homakov.blogspot.com/2014/01/using-content-security-policy-for-evil.html |
Copyright | Copyright (C) 2016 Greenbone AG |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |