Debian DSA-2724-1 : chromium-browser - several vulnerabilities

high Nessus Plugin ID 68970

Synopsis

The remote Debian host is missing a security-related update.

Description

Several vulnerabilities have been discovered in the Chromium web browser.

- CVE-2013-2853 The HTTPS implementation does not ensure that headers are terminated by \r\n\r\n (carriage return, newline, carriage return, newline).

- CVE-2013-2867 Chrome does not properly prevent pop-under windows.

- CVE-2013-2868 common/extensions/sync_helper.cc proceeds with sync operations for NPAPI extensions without checking for a certain plugin permission setting.

- CVE-2013-2869 Denial of service (out-of-bounds read) via a crafted JPEG2000 image.

- CVE-2013-2870 Use-after-free vulnerability in network sockets.

- CVE-2013-2871 Use-after-free vulnerability in input handling.

- CVE-2013-2873 Use-after-free vulnerability in resource loading.

- CVE-2013-2875 Out-of-bounds read in SVG file handling.

- CVE-2013-2876 Chromium does not properly enforce restrictions on the capture of screenshots by extensions, which could lead to information disclosure from previous page visits.

- CVE-2013-2877 Out-of-bounds read in XML file handling.

- CVE-2013-2878 Out-of-bounds read in text handling.

- CVE-2013-2879 The circumstances in which a renderer process can be considered a trusted process for sign-in and subsequent sync operations were not propertly checked.

- CVE-2013-2880 The Chromium 28 development team found various issues from internal fuzzing, audits, and other studies.

Solution

Upgrade the chromium-browser packages.

For the stable distribution (wheezy), these problems have been fixed in version 28.0.1500.71-1~deb7u1.

See Also

https://security-tracker.debian.org/tracker/CVE-2013-2853

https://security-tracker.debian.org/tracker/CVE-2013-2867

https://security-tracker.debian.org/tracker/CVE-2013-2868

https://security-tracker.debian.org/tracker/CVE-2013-2869

https://security-tracker.debian.org/tracker/CVE-2013-2870

https://security-tracker.debian.org/tracker/CVE-2013-2871

https://security-tracker.debian.org/tracker/CVE-2013-2873

https://security-tracker.debian.org/tracker/CVE-2013-2875

https://security-tracker.debian.org/tracker/CVE-2013-2876

https://security-tracker.debian.org/tracker/CVE-2013-2877

https://security-tracker.debian.org/tracker/CVE-2013-2878

https://security-tracker.debian.org/tracker/CVE-2013-2879

https://security-tracker.debian.org/tracker/CVE-2013-2880

https://packages.debian.org/source/wheezy/chromium-browser

https://www.debian.org/security/2013/dsa-2724

Plugin Details

Severity: High

ID: 68970

File Name: debian_DSA-2724.nasl

Version: 1.22

Type: local

Agent: unix

Published: 7/19/2013

Updated: 1/11/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:chromium-browser, cpe:/o:debian:debian_linux:7.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 7/17/2013

Vulnerability Publication Date: 7/10/2013

Reference Information

CVE: CVE-2013-2853, CVE-2013-2867, CVE-2013-2868, CVE-2013-2869, CVE-2013-2870, CVE-2013-2871, CVE-2013-2873, CVE-2013-2875, CVE-2013-2876, CVE-2013-2877, CVE-2013-2878, CVE-2013-2879, CVE-2013-2880

BID: 61046, 61047, 61049, 61050, 61051, 61052, 61054, 61055, 61056, 61057, 61059, 61060, 61061

DSA: 2724