RHEL 6 : chromium-browser (RHSA-2018:2666)

critical Nessus Plugin ID 117447

Synopsis

The remote Red Hat host is missing one or more security updates for chromium-browser.

Description

The remote Redhat Enterprise Linux 6 host has a package installed that is affected by multiple vulnerabilities as referenced in the RHSA-2018:2666 advisory.

Chromium is an open-source web browser, powered by WebKit (Blink).

This update upgrades Chromium to version 69.0.3497.81.

Security Fix(es):

* chromium-browser: Out of bounds write in V8 (CVE-2018-16065)

* chromium-browser: Out of bounds read in Blink (CVE-2018-16066)

* chromium-browser: Out of bounds read in WebAudio (CVE-2018-16067)

* chromium-browser: Out of bounds write in Mojo (CVE-2018-16068)

* chromium-browser: Out of bounds read in SwiftShader (CVE-2018-16069)

* chromium-browser: Integer overflow in Skia (CVE-2018-16070)

* chromium-browser: Use after free in WebRTC (CVE-2018-16071)

* chromium-browser: Site Isolation bypass after tab restore (CVE-2018-16073)

* chromium-browser: Site Isolation bypass using Blob URLS (CVE-2018-16074)

* chromium-browser: Local file access in Blink (CVE-2018-16075)

* chromium-browser: Out of bounds read in PDFium (CVE-2018-16076)

* chromium-browser: Content security policy bypass in Blink (CVE-2018-16077)

* chromium-browser: Credit card information leak in Autofill (CVE-2018-16078)

* chromium-browser: URL spoof in permission dialogs (CVE-2018-16079)

* chromium-browser: URL spoof in full screen mode (CVE-2018-16080)

* chromium-browser: Local file access in DevTools (CVE-2018-16081)

* chromium-browser: Stack buffer overflow in SwiftShader (CVE-2018-16082)

* chromium-browser: Out of bounds read in WebRTC (CVE-2018-16083)

* chromium-browser: User confirmation bypass in external protocol handling (CVE-2018-16084)

* chromium-browser: Use after free in Memory Instrumentation (CVE-2018-16085)

* chromium-browser: Script injection in New Tab Page (CVE-2018-16086)

* chromium-browser: Multiple download restriction bypass (CVE-2018-16087)

* chromium-browser: User gesture requirement bypass (CVE-2018-16088)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL chromium-browser package based on the guidance in RHSA-2018:2666.

See Also

http://www.nessus.org/u?3f6cdb8f

https://access.redhat.com/errata/RHSA-2018:2666

https://access.redhat.com/security/updates/classification/#important

https://bugzilla.redhat.com/show_bug.cgi?id=1625466

https://bugzilla.redhat.com/show_bug.cgi?id=1625467

https://bugzilla.redhat.com/show_bug.cgi?id=1625469

https://bugzilla.redhat.com/show_bug.cgi?id=1625470

https://bugzilla.redhat.com/show_bug.cgi?id=1625471

https://bugzilla.redhat.com/show_bug.cgi?id=1625472

https://bugzilla.redhat.com/show_bug.cgi?id=1625473

https://bugzilla.redhat.com/show_bug.cgi?id=1625475

https://bugzilla.redhat.com/show_bug.cgi?id=1625476

https://bugzilla.redhat.com/show_bug.cgi?id=1625477

https://bugzilla.redhat.com/show_bug.cgi?id=1625478

https://bugzilla.redhat.com/show_bug.cgi?id=1625479

https://bugzilla.redhat.com/show_bug.cgi?id=1625480

https://bugzilla.redhat.com/show_bug.cgi?id=1625481

https://bugzilla.redhat.com/show_bug.cgi?id=1625482

https://bugzilla.redhat.com/show_bug.cgi?id=1625484

https://bugzilla.redhat.com/show_bug.cgi?id=1625485

https://bugzilla.redhat.com/show_bug.cgi?id=1625486

https://bugzilla.redhat.com/show_bug.cgi?id=1625487

https://bugzilla.redhat.com/show_bug.cgi?id=1625488

https://bugzilla.redhat.com/show_bug.cgi?id=1626286

https://bugzilla.redhat.com/show_bug.cgi?id=1626287

https://bugzilla.redhat.com/show_bug.cgi?id=1626288

Plugin Details

Severity: Critical

ID: 117447

File Name: redhat-RHSA-2018-2666.nasl

Version: 1.12

Type: local

Agent: unix

Published: 9/12/2018

Updated: 11/5/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

Vendor

Vendor Severity: Important

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2018-16085

CVSS v3

Risk Factor: Critical

Base Score: 9.6

Temporal Score: 8.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2018-16068

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:chromium-browser, cpe:/o:redhat:enterprise_linux:6

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/10/2018

Vulnerability Publication Date: 1/9/2019

Reference Information

CVE: CVE-2018-16065, CVE-2018-16066, CVE-2018-16067, CVE-2018-16068, CVE-2018-16069, CVE-2018-16070, CVE-2018-16071, CVE-2018-16073, CVE-2018-16074, CVE-2018-16075, CVE-2018-16076, CVE-2018-16077, CVE-2018-16078, CVE-2018-16079, CVE-2018-16080, CVE-2018-16081, CVE-2018-16082, CVE-2018-16083, CVE-2018-16084, CVE-2018-16085, CVE-2018-16086, CVE-2018-16087, CVE-2018-16088

RHSA: 2018:2666