aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml
diff options
context:
space:
mode:
authorRyan Steinmetz <zi@FreeBSD.org>2017-09-29 15:28:54 +0000
committerRyan Steinmetz <zi@FreeBSD.org>2017-09-29 15:28:54 +0000
commitb4d8d0b91f553c3929fd5dceaac1d8ab0bb29c2e (patch)
tree8c5f94680383ff3f39c20dec35b1823130c2db68 /security/vuxml
parentc8170d0aafb766240a64d8079203e90ca8011cea (diff)
- Purge another batch of superceded www/chromium entries to give us additional headroom under the 5M vuln.xml file size limit
Approved by: ports-secteam (with hat)
Notes
Notes: svn path=/head/; revision=450904
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml3088
1 files changed, 0 insertions, 3088 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 45f8fa604bce..d4d4f3e77ef8 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -52385,77 +52385,6 @@ and CVE-2013-0155.</p>
</dates>
</vuln>
- <vuln vid="d2bbcc01-4ec3-11e4-ab3f-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <name>chromium-pulse</name> <!-- pcbsd only -->
- <range><lt>38.0.2125.101</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/2014/10/stable-channel-update.html">
- <p>159 security fixes in this release, including 113 found using
- MemorySanitizer:</p>
- <ul>
- <li>[416449] Critical CVE-2014-3188: A special thanks to Jüri Aedla
- for a combination of V8 and IPC bugs that can lead to remote code
- execution outside of the sandbox.</li>
- <li>[398384] High CVE-2014-3189: Out-of-bounds read in PDFium.
- Credit to cloudfuzzer.</li>
- <li>[400476] High CVE-2014-3190: Use-after-free in Events. Credit
- to cloudfuzzer.</li>
- <li>[402407] High CVE-2014-3191: Use-after-free in Rendering.
- Credit to cloudfuzzer.</li>
- <li>[403276] High CVE-2014-3192: Use-after-free in DOM. Credit to
- cloudfuzzer.</li>
- <li>[399655] High CVE-2014-3193: Type confusion in Session Management.
- Credit to miaubiz.</li>
- <li>[401115] High CVE-2014-3194: Use-after-free in Web Workers.
- Credit to Collin Payne.</li>
- <li>[403409] Medium CVE-2014-3195: Information Leak in V8. Credit
- to Jüri Aedla.</li>
- <li>[338538] Medium CVE-2014-3196: Permissions bypass in Windows
- Sandbox. Credit to James Forshaw.</li>
- <li>[396544] Medium CVE-2014-3197: Information Leak in XSS Auditor.
- Credit to Takeshi Terada.</li>
- <li>[415307] Medium CVE-2014-3198: Out-of-bounds read in PDFium.
- Credit to Atte Kettunen of OUSPG.</li>
- <li>[395411] Low CVE-2014-3199: Release Assert in V8 bindings.
- Credit to Collin Payne.</li>
- <li>[420899] CVE-2014-3200: Various fixes from internal audits,
- fuzzing and other initiatives (Chrome 38).</li>
- <li>Multiple vulnerabilities in V8 fixed at the tip of the 3.28
- branch (currently 3.28.71.15).</li>
- </ul>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2014-3188</cvename>
- <cvename>CVE-2014-3189</cvename>
- <cvename>CVE-2014-3190</cvename>
- <cvename>CVE-2014-3191</cvename>
- <cvename>CVE-2014-3192</cvename>
- <cvename>CVE-2014-3193</cvename>
- <cvename>CVE-2014-3194</cvename>
- <cvename>CVE-2014-3195</cvename>
- <cvename>CVE-2014-3196</cvename>
- <cvename>CVE-2014-3197</cvename>
- <cvename>CVE-2014-3198</cvename>
- <cvename>CVE-2014-3199</cvename>
- <cvename>CVE-2014-3200</cvename>
- <url>http://googlechromereleases.blogspot.nl/2014/10/stable-channel-update.html</url>
- </references>
- <dates>
- <discovery>2014-10-07</discovery>
- <entry>2014-10-08</entry>
- </dates>
- </vuln>
-
<vuln vid="b6587341-4d88-11e4-aef9-20cf30e32f6d">
<topic>Bugzilla multiple security issues</topic>
<affects>
@@ -52935,34 +52864,6 @@ and CVE-2013-0155.</p>
</dates>
</vuln>
- <vuln vid="bd2ef267-4485-11e4-b0b7-00262d5ed8ee">
- <topic>chromium -- RSA signature malleability in NSS</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>37.0.2062.124</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/">
- <p>[414124] RSA signature malleability in NSS (CVE-2014-1568).
- Thanks to Antoine Delignat-Lavaud of Prosecco/INRIA, Brian Smith
- and Advanced Threat Research team at Intel Security</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2014-1568</cvename>
- <url>http://googlechromereleases.blogspot.nl/</url>
- </references>
- <dates>
- <discovery>2014-09-24</discovery>
- <entry>2014-09-25</entry>
- </dates>
- </vuln>
-
<vuln vid="fb25333d-442f-11e4-98f3-5453ed2e2b49">
<topic>krfb -- Multiple security issues in bundled libvncserver</topic>
<affects>
@@ -53258,39 +53159,6 @@ and CVE-2013-0155.</p>
</dates>
</vuln>
- <vuln vid="36a415c8-3867-11e4-b522-00262d5ed8ee">
- <topic>www/chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>37.0.2062.120</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/">
- <p>4 security fixes in this release, including:</p>
- <ul>
- <li>[401362] High CVE-2014-3178: Use-after-free in rendering.
- Credit to miaubiz.</li>
- <li>[411014] CVE-2014-3179: Various fixes from internal audits,
- fuzzing and other initiatives.</li>
- </ul>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2014-3178</cvename>
- <cvename>CVE-2014-3179</cvename>
- <url>http://googlechromereleases.blogspot.nl/</url>
- </references>
- <dates>
- <discovery>2014-09-09</discovery>
- <entry>2014-09-09</entry>
- </dates>
- </vuln>
-
<vuln vid="6318b303-3507-11e4-b76c-0011d823eebd">
<topic>trafficserver -- unspecified vulnerability</topic>
<affects>
@@ -53322,64 +53190,6 @@ and CVE-2013-0155.</p>
</dates>
</vuln>
- <vuln vid="fd5f305d-2d3d-11e4-aa3d-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>37.0.2062.94</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/">
- <p>50 security fixes in this release, including:</p>
- <ul>
- <li>[386988] Critical CVE-2014-3176, CVE-2014-3177: A special reward
- to lokihardt@asrt for a combination of bugs in V8, IPC, sync, and
- extensions that can lead to remote code execution outside of the
- sandbox.</li>
- <li>[369860] High CVE-2014-3168: Use-after-free in SVG. Credit to
- cloudfuzzer.</li>
- <li>[387389] High CVE-2014-3169: Use-after-free in DOM. Credit to
- Andrzej Dyjak.</li>
- <li>[390624] High CVE-2014-3170: Extension permission dialog spoofing.
- Credit to Rob Wu.</li>
- <li>[390928] High CVE-2014-3171: Use-after-free in bindings. Credit to
- cloudfuzzer.</li>
- <li>[367567] Medium CVE-2014-3172: Issue related to extension debugging.
- Credit to Eli Grey.</li>
- <li>[376951] Medium CVE-2014-3173: Uninitialized memory read in WebGL.
- Credit to jmuizelaar.</li>
- <li>[389219] Medium CVE-2014-3174: Uninitialized memory read in Web
- Audio. Credit to Atte Kettunen from OUSPG.</li>
- <li>[406143] CVE-2014-3175: Various fixes from internal audits, fuzzing
- and other initiatives (Chrome 37).</li>
-
- </ul>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2014-3168</cvename>
- <cvename>CVE-2014-3169</cvename>
- <cvename>CVE-2014-3170</cvename>
- <cvename>CVE-2014-3171</cvename>
- <cvename>CVE-2014-3172</cvename>
- <cvename>CVE-2014-3173</cvename>
- <cvename>CVE-2014-3174</cvename>
- <cvename>CVE-2014-3175</cvename>
- <cvename>CVE-2014-3176</cvename>
- <cvename>CVE-2014-3177</cvename>
- <url>http://googlechromereleases.blogspot.nl/</url>
- </references>
- <dates>
- <discovery>2014-08-26</discovery>
- <entry>2014-08-26</entry>
- </dates>
- </vuln>
-
<vuln vid="84203724-296b-11e4-bebd-000c2980a9f3">
<topic>file -- buffer overruns and missing buffer size tests</topic>
<affects>
@@ -53571,42 +53381,6 @@ and CVE-2013-0155.</p>
</dates>
</vuln>
- <vuln vid="df7754c0-2294-11e4-b505-000c6e25e3e9">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>36.0.1985.143</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl">
- <p>12 security fixes in this release, including</p>
- <ul>
- <li>[390174] High CVE-2014-3165: Use-after-free in web sockets.
- Credit to Collin Payne.</li>
- <li>[398925] High CVE-2014-3166: Information disclosure in SPDY.
- Credit to Antoine Delignat-Lavaud.</li>
- <li>[400950] CVE-2014-3167: Various fixes from internal audits,
- fuzzing and other initiatives.</li>
- </ul>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2014-3165</cvename>
- <cvename>CVE-2014-3166</cvename>
- <cvename>CVE-2014-3167</cvename>
- <url>http://googlechromereleases.blogspot.nl</url>
- </references>
- <dates>
- <discovery>2014-08-12</discovery>
- <entry>2014-08-13</entry>
- </dates>
- </vuln>
-
<vuln vid="69048656-2187-11e4-802c-20cf30e32f6d">
<topic>serf -- SSL Certificate Null Byte Poisoning</topic>
<affects>
@@ -54401,39 +54175,6 @@ and CVE-2013-0155.</p>
</dates>
</vuln>
- <vuln vid="3718833e-0d27-11e4-89db-000c6e25e3e9">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>36.0.1985.125</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl">
- <p>26 security fixes in this release, including</p>
- <ul>
- <li>[380885] Medium CVE-2014-3160: Same-Origin-Policy bypass in SVG. Credit
- to Christian Schneider.</li>
- <li>[393765] CVE-2014-3162: Various fixes from internal audits, fuzzing and
- other initiatives.</li>
- </ul>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2014-3160</cvename>
- <cvename>CVE-2014-3162</cvename>
- <url>http://googlechromereleases.blogspot.nl</url>
- </references>
- <dates>
- <discovery>2014-07-16</discovery>
- <entry>2014-07-16</entry>
- </dates>
- </vuln>
-
<vuln vid="4a114331-0d24-11e4-8dd2-5453ed2e2b49">
<topic>kdelibs4 -- KMail/KIO POP3 SSL Man-in-the-middle Flaw</topic>
<affects>
@@ -54862,44 +54603,6 @@ and CVE-2013-0155.</p>
</dates>
</vuln>
- <vuln vid="0b0fb9b0-f0fb-11e3-9bcd-000c6e25e3e9">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>35.0.1916.153</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl">
- <p>4 security fixes in this release, including:</p>
- <ul>
- <li>[369525] High CVE-2014-3154: Use-after-free in filesystem api. Credit
- to Collin Payne.</li>
- <li>[369539] High CVE-2014-3155: Out-if-bounds read in SPDY. Credit
- to James March, Daniel Sommermann and Alan Frindell of Facebook.</li>
- <li>[369621] Medium CVE-2014-3156: Buffer overflow in clipboard. Credit
- to Atte Kettunen of OUSPG.</li>
- <li>[368980] CVE-2014-3157: Heap overflow in media.</li>
- </ul>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2014-3154</cvename>
- <cvename>CVE-2014-3155</cvename>
- <cvename>CVE-2014-3156</cvename>
- <cvename>CVE-2014-3157</cvename>
- <url>http://googlechromereleases.blogspot.nl</url>
- </references>
- <dates>
- <discovery>2014-06-10</discovery>
- <entry>2014-06-10</entry>
- </dates>
- </vuln>
-
<vuln vid="888a0262-f0d9-11e3-ba0c-b4b52fce4ce8">
<topic>mozilla -- multiple vulnerabilities</topic>
<affects>
@@ -55226,93 +54929,6 @@ and CVE-2013-0155.</p>
</dates>
</vuln>
- <vuln vid="64f3872b-e05d-11e3-9dd4-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>35.0.1916.114</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/">
- <p>23 security fixes in this release, including:</p>
- <ul>
- <li>[356653] High CVE-2014-1743: Use-after-free in styles. Credit
- to cloudfuzzer.</li>
- <li>[359454] High CVE-2014-1744: Integer overflow in audio. Credit
- to Aaron Staple.</li>
- <li>[346192] High CVE-2014-1745: Use-after-free in SVG. Credit to
- Atte Kettunen of OUSPG.</li>
- <li>[364065] Medium CVE-2014-1746: Out-of-bounds read in media
- filters. Credit to Holger Fuhrmannek.</li>
- <li>[330663] Medium CVE-2014-1747: UXSS with local MHTML file.
- Credit to packagesu.</li>
- <li>[331168] Medium CVE-2014-1748: UI spoofing with scrollbar.
- Credit to Jordan Milne.</li>
- <li>[374649] CVE-2014-1749: Various fixes from internal audits,
- fuzzing and other initiatives.</li>
- <li>[358057] CVE-2014-3152: Integer underflow in V8 fixed in
- version 3.25.28.16.</li>
- </ul>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2014-1743</cvename>
- <cvename>CVE-2014-1744</cvename>
- <cvename>CVE-2014-1745</cvename>
- <cvename>CVE-2014-1746</cvename>
- <cvename>CVE-2014-1747</cvename>
- <cvename>CVE-2014-1748</cvename>
- <cvename>CVE-2014-1749</cvename>
- <cvename>CVE-2014-3152</cvename>
- <url>http://googlechromereleases.blogspot.nl/</url>
- </references>
- <dates>
- <discovery>2014-05-20</discovery>
- <entry>2014-05-20</entry>
- </dates>
- </vuln>
-
- <vuln vid="cdf450fc-db52-11e3-a9fc-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>34.0.1847.137</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/">
- <p>3 security fixes in this release:</p>
- <ul>
- <li>[358038] High CVE-2014-1740: Use-after-free in WebSockets.
- Credit to Collin Payne.</li>
- <li>[349898] High CVE-2014-1741: Integer overflow in DOM ranges.
- Credit to John Butler.</li>
- <li>[356690] High CVE-2014-1742: Use-after-free in editing. Credit
- to cloudfuzzer.</li>
- </ul>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2014-1740</cvename>
- <cvename>CVE-2014-1741</cvename>
- <cvename>CVE-2014-1742</cvename>
- <url>http://googlechromereleases.blogspot.nl/</url>
- </references>
- <dates>
- <discovery>2014-05-13</discovery>
- <entry>2014-05-14</entry>
- </dates>
- </vuln>
-
<vuln vid="b060ee50-daba-11e3-99f2-bcaec565249c">
<topic>libXfont -- X Font Service Protocol and Font metadata file handling issues</topic>
<affects>
@@ -55577,54 +55193,6 @@ and CVE-2013-0155.</p>
</dates>
</vuln>
- <vuln vid="7cf25a0c-d031-11e3-947b-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>34.0.1847.132</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports (belatedly):</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/">
- <p>9 security fixes in this release, including:</p>
- <ul>
- <li>[354967] High CVE-2014-1730: Type confusion in V8. Credit to
- Anonymous.</li>
- <li>[349903] High CVE-2014-1731: Type confusion in DOM. Credit to
- John Butler.</li>
- <li>[359802] High CVE-2014-1736: Integer overflow in V8. Credit to
- SkyLined working with HP's Zero Day Initiative.</li>
- <li>[352851] Medium CVE-2014-1732: Use-after-free in Speech
- Recognition. Credit to Khalil Zhani.</li>
- <li>[351103] Medium CVE-2014-1733: Compiler bug in Seccomp-BPF.
- Credit to Jed Davis.</li>
- <li>[367314] CVE-2014-1734: Various fixes from internal audits,
- fuzzing and other initiatives.</li>
- <li>[359130, 359525, 360429] CVE-2014-1735: Multiple
- vulnerabilities in V8 fixed in version 3.24.35.33.</li>
- </ul>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2014-1730</cvename>
- <cvename>CVE-2014-1731</cvename>
- <cvename>CVE-2014-1732</cvename>
- <cvename>CVE-2014-1733</cvename>
- <cvename>CVE-2014-1734</cvename>
- <cvename>CVE-2014-1735</cvename>
- <cvename>CVE-2014-1736</cvename>
- <url>http://googlechromereleases.blogspot.nl/</url>
- </references>
- <dates>
- <discovery>2014-04-24</discovery>
- <entry>2014-04-30</entry>
- </dates>
- </vuln>
-
<vuln vid="985d4d6c-cfbd-11e3-a003-b4b52fce4ce8">
<topic>mozilla -- multiple vulnerabilities</topic>
<affects>
@@ -56230,76 +55798,6 @@ and CVE-2013-0155.</p>
</dates>
</vuln>
- <vuln vid="963413a5-bf50-11e3-a2d6-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>34.0.1847.116</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/">
- <p>31 vulnerabilities fixed in this release, including:</p>
- <ul>
- <li>[354123] High CVE-2014-1716: UXSS in V8. Credit to
- Anonymous.</li>
- <li>[353004] High CVE-2014-1717: OOB access in V8. Credit to
- Anonymous.</li>
- <li>[348332] High CVE-2014-1718: Integer overflow in compositor.
- Credit to Aaron Staple.</li>
- <li>[343661] High CVE-2014-1719: Use-after-free in web workers.
- Credit to Collin Payne.</li>
- <li>[356095] High CVE-2014-1720: Use-after-free in DOM. Credit to
- cloudfuzzer.</li>
- <li>[350434] High CVE-2014-1721: Memory corruption in V8. Credit to
- Christian Holler.</li>
- <li>[330626] High CVE-2014-1722: Use-after-free in rendering.
- Credit to miaubiz.</li>
- <li>[337746] High CVE-2014-1723: Url confusion with RTL characters.
- Credit to George McBay.</li>
- <li>[327295] High CVE-2014-1724: Use-after-free in speech. Credit
- to Atte Kettunen of OUSPG.</li>
- <li>[357332] Medium CVE-2014-1725: OOB read with window property.
- Credit to Anonymous</li>
- <li>[346135] Medium CVE-2014-1726: Local cross-origin bypass.
- Credit to Jann Horn.</li>
- <li>[342735] Medium CVE-2014-1727: Use-after-free in forms. Credit
- to Khalil Zhani.</li>
- <li>[360298] CVE-2014-1728: Various fixes from internal audits,
- fuzzing and other initiatives.</li>
- <li>[345820, 347262, 348319, 350863, 352982, 355586, 358059]
- CVE-2014-1729: Multiple vulnerabilities in V8 fixed in version
- 3.24.35.22.</li>
- </ul>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2014-1716</cvename>
- <cvename>CVE-2014-1717</cvename>
- <cvename>CVE-2014-1718</cvename>
- <cvename>CVE-2014-1719</cvename>
- <cvename>CVE-2014-1720</cvename>
- <cvename>CVE-2014-1721</cvename>
- <cvename>CVE-2014-1722</cvename>
- <cvename>CVE-2014-1723</cvename>
- <cvename>CVE-2014-1724</cvename>
- <cvename>CVE-2014-1725</cvename>
- <cvename>CVE-2014-1726</cvename>
- <cvename>CVE-2014-1727</cvename>
- <cvename>CVE-2014-1728</cvename>
- <cvename>CVE-2014-1729</cvename>
- <url>http://googlechromereleases.blogspot.nl/</url>
- </references>
- <dates>
- <discovery>2014-04-08</discovery>
- <entry>2014-04-08</entry>
- </dates>
- </vuln>
-
<vuln vid="5631ae98-be9e-11e3-b5e3-c80aa9043978">
<topic>OpenSSL -- Remote Information Disclosure</topic>
<affects>
@@ -56793,51 +56291,6 @@ and CVE-2013-0155.</p>
</dates>
</vuln>
- <vuln vid="a70966a1-ac22-11e3-8d04-00262d5ed8ee">
- <topic>www/chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>33.0.1750.152</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/">
- <p>New vulnerabilities after the Pwn2Own competition:</p>
- <ul>
- <li>[352369] Code execution outside sandbox. Credit to VUPEN.
- <ul>
- <li>[352374] High CVE-2014-1713: Use-after-free in Blink
- bindings</li>
- <li>[352395] High CVE-2014-1714: Windows clipboard
- vulnerability</li>
- </ul>
- </li>
- <li> [352420] Code execution outside sandbox. Credit to Anonymous.
- <ul>
- <li>[351787] High CVE-2014-1705: Memory corruption in V8</li>
- <li>[352429] High CVE-2014-1715: Directory traversal issue</li>
- </ul>
- </li>
- </ul>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2014-1705</cvename>
- <cvename>CVE-2014-1713</cvename>
- <cvename>CVE-2014-1714</cvename>
- <cvename>CVE-2014-1715</cvename>
- <url>http://googlechromereleases.blogspot.nl/</url>
- </references>
- <dates>
- <discovery>2014-03-14</discovery>
- <entry>2014-03-15</entry>
- </dates>
- </vuln>
-
<vuln vid="eb426e82-ab68-11e3-9d09-000c2980a9f3">
<topic>mutt -- denial of service, potential remote code execution</topic>
<affects>
@@ -56998,48 +56451,6 @@ and CVE-2013-0155.</p>
</dates>
</vuln>
- <vuln vid="24cefa4b-a940-11e3-91f2-00262d5ed8ee">
- <topic>www/chromium --multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>33.0.1750.149</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/">
- <p>7 vulnerabilities fixed in this release, including:</p>
- <ul>
- <li>[344881] High CVE-2014-1700: Use-after-free in speech. Credit
- to Chamal de Silva.</li>
- <li>[342618] High CVE-2014-1701: UXSS in events. Credit to
- aidanhs.</li>
- <li>[333058] High CVE-2014-1702: Use-after-free in web database.
- Credit to Collin Payne.</li>
- <li>[338354] High CVE-2014-1703: Potential sandbox escape due to a
- use-after-free in web sockets.</li>
- <li>[328202, 349079, 345715] CVE-2014-1704: Multiple
- vulnerabilities in V8 fixed in version 3.23.17.18.</li>
- </ul>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2014-1700</cvename>
- <cvename>CVE-2014-1701</cvename>
- <cvename>CVE-2014-1702</cvename>
- <cvename>CVE-2014-1703</cvename>
- <cvename>CVE-2014-1704</cvename>
- <url>http://googlechromereleases.blogspot.nl/</url>
- </references>
- <dates>
- <discovery>2014-03-11</discovery>
- <entry>2014-03-11</entry>
- </dates>
- </vuln>
-
<vuln vid="1a0de610-a761-11e3-95fe-bcaec565249c">
<topic>freetype2 -- Out of bounds read/write</topic>
<affects>
@@ -57144,51 +56555,6 @@ and CVE-2013-0155.</p>
</dates>
</vuln>
- <vuln vid="b4023753-a4ba-11e3-bec2-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>33.0.1750.146</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/">
- <p>19 vulnerabilities fixed in this release, including:</p>
- <ul>
- <li>[344492] High CVE-2013-6663: Use-after-free in svg images.
- Credit to Atte Kettunen of OUSPG.</li>
- <li>[326854] High CVE-2013-6664: Use-after-free in speech
- recognition. Credit to Khalil Zhani.</li>
- <li>[337882] High CVE-2013-6665: Heap buffer overflow in software
- rendering. Credit to cloudfuzzer.</li>
- <li>[332023] Medium CVE-2013-6666: Chrome allows requests in flash
- header request. Credit to netfuzzerr.</li>
- <li>[348175] CVE-2013-6667: Various fixes from internal audits,
- fuzzing and other initiatives.</li>
- <li>[343964, 344186, 347909] CVE-2013-6668: Multiple
- vulnerabilities in V8 fixed in version 3.24.35.10.</li>
- </ul>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2013-6663</cvename>
- <cvename>CVE-2013-6664</cvename>
- <cvename>CVE-2013-6665</cvename>
- <cvename>CVE-2013-6666</cvename>
- <cvename>CVE-2013-6667</cvename>
- <cvename>CVE-2013-6668</cvename>
- <url>http://googlechromereleases.blogspot.nl/</url>
- </references>
- <dates>
- <discovery>2014-03-03</discovery>
- <entry>2014-03-05</entry>
- </dates>
- </vuln>
-
<vuln vid="f645aa90-a3e8-11e3-a422-3c970e169bc2">
<topic>gnutls -- multiple certificate verification issues</topic>
<affects>
@@ -57393,66 +56759,6 @@ JavaScript code would be executed.</p>
</dates>
</vuln>
- <vuln vid="9dd47fa3-9d53-11e3-b20f-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>33.0.1750.117</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/">
- <p>28 security fixes in this release, including:</p>
- <ul>
- <li>[334897] High CVE-2013-6652: Issue with relative paths in
- Windows sandbox named pipe policy. Credit to tyranid.</li>
- <li>[331790] High CVE-2013-6653: Use-after-free related to web
- contents. Credit to Khalil Zhani.</li>
- <li>[333176] High CVE-2013-6654: Bad cast in SVG. Credit to
- TheShow3511.</li>
- <li>[293534] High CVE-2013-6655: Use-after-free in layout. Credit
- to cloudfuzzer.</li>
- <li>[331725] High CVE-2013-6656: Information leak in XSS auditor.
- Credit to NeexEmil.</li>
- <li>[331060] Medium CVE-2013-6657: Information leak in XSS auditor.
- Credit to NeexEmil.</li>
- <li>[322891] Medium CVE-2013-6658: Use-after-free in layout. Credit
- to cloudfuzzer.</li>
- <li>[306959] Medium CVE-2013-6659: Issue with certificates
- validation in TLS handshake. Credit to Antoine Delignat-Lavaud
- and Karthikeyan Bhargavan from Prosecco, Inria Paris.</li>
- <li>[332579] Low CVE-2013-6660: Information leak in drag and drop.
- Credit to bishopjeffreys.</li>
- <li>[344876] Low-High CVE-2013-6661: Various fixes from internal
- audits, fuzzing and other initiatives. Of these, seven are fixes
- for issues that could have allowed for sandbox escapes from
- compromised renderers.</li>
- </ul>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2013-6652</cvename>
- <cvename>CVE-2013-6653</cvename>
- <cvename>CVE-2013-6654</cvename>
- <cvename>CVE-2013-6655</cvename>
- <cvename>CVE-2013-6656</cvename>
- <cvename>CVE-2013-6657</cvename>
- <cvename>CVE-2013-6658</cvename>
- <cvename>CVE-2013-6659</cvename>
- <cvename>CVE-2013-6660</cvename>
- <cvename>CVE-2013-6661</cvename>
- <url>http://googlechromereleases.blogspot.nl/</url>
- </references>
- <dates>
- <discovery>2014-02-20</discovery>
- <entry>2014-02-24</entry>
- </dates>
- </vuln>
-
<vuln vid="42d42090-9a4d-11e3-b029-08002798f6ff">
<topic>PostgreSQL -- multiple privilege issues</topic>
<affects>
@@ -57975,40 +57281,6 @@ JavaScript code would be executed.</p>
<cancelled superseded="c7b5d72b-886a-11e3-9533-60a44c524f57"/>
</vuln>
- <vuln vid="f9810c43-87a5-11e3-9214-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>32.0.1700.102</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/">
- <p>14 security fixes in this release, including:</p>
- <ul>
- <li>[330420] High CVE-2013-6649: Use-after-free in SVG images.
- Credit to Atte Kettunen of OUSPG.</li>
- <li>[331444] High CVE-2013-6650: Memory corruption in V8. This
- issue was fixed in v8 version 3.22.24.16. Credit to Christian
- Holler.</li>
- </ul>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2013-6649</cvename>
- <cvename>CVE-2013-6650</cvename>
- <url>http://googlechromereleases.blogspot.nl/</url>
- </references>
- <dates>
- <discovery>2014-01-27</discovery>
- <entry>2014-01-27</entry>
- </dates>
- </vuln>
-
<vuln vid="d1dfc4c7-8791-11e3-a371-6805ca0b3d42">
<topic>rt42 -- denial-of-service attack via the email gateway</topic>
<affects>
@@ -58233,51 +57505,6 @@ JavaScript code would be executed.</p>
</dates>
</vuln>
- <vuln vid="5acf4638-7e2c-11e3-9fba-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>32.0.1700.77</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/">
- <p>11 security fixes in this release, including:</p>
- <ul>
- <li>[249502] High CVE-2013-6646: Use-after-free in web workers.
- Credit to Collin Payne.</li>
- <li>[326854] High CVE-2013-6641: Use-after-free related to forms.
- Credit to Atte Kettunen of OUSPG.</li>
- <li>[324969] High CVE-2013-6642: Address bar spoofing in Chrome for
- Android. Credit to lpilorz.</li>
- <li>[321940] High CVE-2013-6643: Unprompted sync with an attacker’s
- Google account. Credit to Joao Lucas Melo Brasio.</li>
- <li>[318791] Medium CVE-2013-6645 Use-after-free related to speech
- input elements. Credit to Khalil Zhani.</li>
- <li>[333036] CVE-2013-6644: Various fixes from internal audits,
- fuzzing and other initiatives.</li>
- </ul>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2013-6641</cvename>
- <cvename>CVE-2013-6642</cvename>
- <cvename>CVE-2013-6643</cvename>
- <cvename>CVE-2013-6644</cvename>
- <cvename>CVE-2013-6645</cvename>
- <cvename>CVE-2013-6646</cvename>
- <url>http://googlechromereleases.blogspot.nl/</url>
- </references>
- <dates>
- <discovery>2014-01-14</discovery>
- <entry>2014-01-15</entry>
- </dates>
- </vuln>
-
<vuln vid="3d95c9a7-7d5c-11e3-a8c1-206a8a720317">
<topic>ntpd DRDoS / Amplification Attack using ntpdc monlist command</topic>
<affects>
@@ -59033,57 +58260,6 @@ JavaScript code would be executed.</p>
</dates>
</vuln>
- <vuln vid="79356040-5da4-11e3-829e-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>31.0.1650.63</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/">
- <p>15 security fixes in this release, including:</p>
- <ul>
- <li>[307159] Medium CVE-2013-6634: Session fixation in sync related
- to 302 redirects. Credit to Andrey Labunets.</li>
- <li>[314469] High CVE-2013-6635: Use-after-free in editing. Credit
- to cloudfuzzer.</li>
- <li>[322959] Medium CVE-2013-6636: Address bar spoofing related to
- modal dialogs. Credit to Bas Venis.</li>
- <li>[325501] CVE-2013-6637: Various fixes from internal audits,
- fuzzing and other initiatives.</li>
- <li>[319722] Medium CVE-2013-6638: Buffer overflow in v8. This
- issue was fixed in v8 version 3.22.24.7. Credit to Jakob Kummerow
- of the Chromium project.</li>
- <li>[319835] High CVE-2013-6639: Out of bounds write in v8. This
- issue was fixed in v8 version 3.22.24.7. Credit to Jakob Kummerow
- of the Chromium project.</li>
- <li>[319860] Medium CVE-2013-6640: Out of bounds read in v8. This
- issue was fixed in v8 version 3.22.24.7. Credit to Jakob Kummerow
- of the Chromium project.</li>
- </ul>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2013-6634</cvename>
- <cvename>CVE-2013-6635</cvename>
- <cvename>CVE-2013-6636</cvename>
- <cvename>CVE-2013-6637</cvename>
- <cvename>CVE-2013-6638</cvename>
- <cvename>CVE-2013-6639</cvename>
- <cvename>CVE-2013-6640</cvename>
- <url>http://googlechromereleases.blogspot.nl/</url>
- </references>
- <dates>
- <discovery>2013-12-04</discovery>
- <entry>2013-12-05</entry>
- </dates>
- </vuln>
-
<vuln vid="4158c57e-5d39-11e3-bc1e-6cf0490a8c18">
<topic>Joomla! -- Core XSS Vulnerabilities</topic>
<affects>
@@ -59448,33 +58624,6 @@ JavaScript code would be executed.</p>
</dates>
</vuln>
- <vuln vid="e62ab2af-4df4-11e3-b0cf-00262d5ed8ee">
- <topic>chromium -- multiple memory corruption issues</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>31.0.1650.57</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/">
- <p>[319117] [319125] Critical CVE-2013-6632: Multiple memory
- corruption issues. Credit to Pinkie Pie.</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2013-6632</cvename>
- <url>http://googlechromereleases.blogspot.nl/</url>
- </references>
- <dates>
- <discovery>2013-11-14</discovery>
- <entry>2013-11-15</entry>
- </dates>
- </vuln>
-
<vuln vid="adcbdba2-4c27-11e3-9848-98fc11cdc4f5">
<topic>linux-flashplugin -- multiple vulnerabilities</topic>
<affects>
@@ -59503,69 +58652,6 @@ JavaScript code would be executed.</p>
</dates>
</vuln>
- <vuln vid="3bfc7016-4bcc-11e3-b0cf-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>31.0.1650.48</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/">
- <p>25 security fixes in this release, including:</p>
- <ul>
- <li>[268565] Medium CVE-2013-6621: Use after free related to speech input elements.
- Credit to Khalil Zhani.</li>
- <li>[272786] High CVE-2013-6622: Use after free related to media elements. Credit
- to cloudfuzzer.</li>
- <li>[282925] High CVE-2013-6623: Out of bounds read in SVG. Credit to miaubiz.</li>
- <li>[290566] High CVE-2013-6624: Use after free related to “id” attribute strings.
- Credit to Jon Butler.</li>
- <li>[295010] High CVE-2013-6625: Use after free in DOM ranges. Credit to
- cloudfuzzer.</li>
- <li>[295695] Low CVE-2013-6626: Address bar spoofing related to interstitial
- warnings. Credit to Chamal de Silva.</li>
- <li>[299892] High CVE-2013-6627: Out of bounds read in HTTP parsing. Credit to
- skylined.</li>
- <li>[306959] Medium CVE-2013-6628: Issue with certificates not being checked
- during TLS renegotiation. Credit to Antoine Delignat-Lavaud and Karthikeyan
- Bhargavan from Prosecco of INRIA Paris.</li>
- <li>[315823] Medium-Critical CVE-2013-2931: Various fixes from internal audits,
- fuzzing and other initiatives.</li>
- <li>[258723] Medium CVE-2013-6629: Read of uninitialized memory in libjpeg and
- libjpeg-turbo. Credit to Michal Zalewski of Google.</li>
- <li>[299835] Medium CVE-2013-6630: Read of uninitialized memory in libjpeg-turbo.
- Credit to Michal Zalewski of Google.</li>
- <li>[296804] High CVE-2013-6631: Use after free in libjingle. Credit to Patrik
- Höglund of the Chromium project.</li>
- </ul>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2013-2931</cvename>
- <cvename>CVE-2013-6621</cvename>
- <cvename>CVE-2013-6622</cvename>
- <cvename>CVE-2013-6623</cvename>
- <cvename>CVE-2013-6624</cvename>
- <cvename>CVE-2013-6625</cvename>
- <cvename>CVE-2013-6626</cvename>
- <cvename>CVE-2013-6627</cvename>
- <cvename>CVE-2013-6628</cvename>
- <cvename>CVE-2013-6629</cvename>
- <cvename>CVE-2013-6630</cvename>
- <cvename>CVE-2013-6631</cvename>
- <url>http://googlechromereleases.blogspot.nl/</url>
- </references>
- <dates>
- <discovery>2013-11-12</discovery>
- <entry>2013-11-12</entry>
- </dates>
- </vuln>
-
<vuln vid="5709d244-4873-11e3-8a46-000d601460a4">
<topic>OpenSSH -- Memory corruption in sshd</topic>
<affects>
@@ -60051,45 +59137,6 @@ JavaScript code would be executed.</p>
</dates>
</vuln>
- <vuln vid="710cd5d5-35cb-11e3-85f9-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>30.0.1599.101</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/">
- <p>5 security fixes in this release, including:</p>
- <ul>
- <li>[292422] High CVE-2013-2925: Use after free in XHR. Credit to
- Atte Kettunen of OUSPG.</li>
- <li>[294456] High CVE-2013-2926: Use after free in editing. Credit
- to cloudfuzzer.</li>
- <li>[297478] High CVE-2013-2927: Use after free in forms. Credit
- to cloudfuzzer.</li>
- <li>[305790] High CVE-2013-2928: Various fixes from internal
- audits, fuzzing and other initiatives.</li>
- </ul>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2013-2925</cvename>
- <cvename>CVE-2013-2926</cvename>
- <cvename>CVE-2013-2927</cvename>
- <cvename>CVE-2013-2928</cvename>
- <url>http://googlechromereleases.blogspot.nl/</url>
- </references>
- <dates>
- <discovery>2013-10-15</discovery>
- <entry>2013-10-15</entry>
- </dates>
- </vuln>
-
<vuln vid="9003b500-31e3-11e3-b0d0-20cf30e32f6d">
<topic>mod_fcgid -- possible heap buffer overwrite</topic>
<affects>
@@ -60214,94 +59261,6 @@ affected..</p>
</dates>
</vuln>
- <vuln vid="e5414d0c-2ade-11e3-821d-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>30.0.1599.66</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/">
- <p>50 security fixes in this release, including:</p>
- <ul>
- <li>[223962][270758][271161][284785][284786] Medium CVE-2013-2906:
- Races in Web Audio. Credit to Atte Kettunen of OUSPG.</li>
- <li>[260667] Medium CVE-2013-2907: Out of bounds read in
- Window.prototype object. Credit to Boris Zbarsky.</li>
- <li>[265221] Medium CVE-2013-2908: Address bar spoofing related to
- the “204 No Content” status code. Credit to Chamal de Silva.</li>
- <li>[265838][279277] High CVE-2013-2909: Use after free in
- inline-block rendering. Credit to Atte Kettunen of OUSPG.</li>
- <li>[269753] Medium CVE-2013-2910: Use-after-free in Web Audio.
- Credit to Byoungyoung Lee of Georgia Tech Information Security
- Center (GTISC).</li>
- <li>[271939] High CVE-2013-2911: Use-after-free in XSLT. Credit to
- Atte Kettunen of OUSPG.</li>
- <li>[276368] High CVE-2013-2912: Use-after-free in PPAPI. Credit to
- Chamal de Silva and 41.w4r10r(at)garage4hackers.com.</li>
- <li>[278908] High CVE-2013-2913: Use-after-free in XML document
- parsing. Credit to cloudfuzzer.</li>
- <li>[279263] High CVE-2013-2914: Use after free in the Windows
- color chooser dialog. Credit to Khalil Zhani.</li>
- <li>[280512] Low CVE-2013-2915: Address bar spoofing via a
- malformed scheme. Credit to Wander Groeneveld. </li>
- <li>[281256] High CVE-2013-2916: Address bar spoofing related to
- the “204 No Content” status code. Credit to Masato Kinugawa.</li>
- <li>[281480] Medium CVE-2013-2917: Out of bounds read in Web Audio.
- Credit to Byoungyoung Lee and Tielei Wang of Georgia Tech
- Information Security Center (GTISC).</li>
- <li>[282088] High CVE-2013-2918: Use-after-free in DOM. Credit to
- Byoungyoung Lee of Georgia Tech Information Security Center
- (GTISC).</li>
- <li>[282736] High CVE-2013-2919: Memory corruption in V8. Credit to
- Adam Haile of Concrete Data.</li>
- <li>[285742] Medium CVE-2013-2920: Out of bounds read in URL
- parsing. Credit to Atte Kettunen of OUSPG.</li>
- <li>[286414] High CVE-2013-2921: Use-after-free in resource loader.
- Credit to Byoungyoung Lee and Tielei Wang of Georgia Tech
- Information Security Center (GTISC).</li>
- <li>[286975] High CVE-2013-2922: Use-after-free in template
- element. Credit to Jon Butler.</li>
- <li>[299016] CVE-2013-2923: Various fixes from internal audits,
- fuzzing and other initiatives (Chrome 30).</li>
- <li>[275803] Medium CVE-2013-2924: Use-after-free in ICU. Upstream
- bug here.</li>
- </ul>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2013-2906</cvename>
- <cvename>CVE-2013-2907</cvename>
- <cvename>CVE-2013-2908</cvename>
- <cvename>CVE-2013-2909</cvename>
- <cvename>CVE-2013-2910</cvename>
- <cvename>CVE-2013-2911</cvename>
- <cvename>CVE-2013-2912</cvename>
- <cvename>CVE-2013-2913</cvename>
- <cvename>CVE-2013-2914</cvename>
- <cvename>CVE-2013-2915</cvename>
- <cvename>CVE-2013-2916</cvename>
- <cvename>CVE-2013-2917</cvename>
- <cvename>CVE-2013-2918</cvename>
- <cvename>CVE-2013-2919</cvename>
- <cvename>CVE-2013-2920</cvename>
- <cvename>CVE-2013-2921</cvename>
- <cvename>CVE-2013-2922</cvename>
- <cvename>CVE-2013-2923</cvename>
- <cvename>CVE-2013-2924</cvename>
- <url>http://googlechromereleases.blogspot.nl/</url>
- </references>
- <dates>
- <discovery>2013-10-01</discovery>
- <entry>2013-10-01</entry>
- </dates>
- </vuln>
-
<vuln vid="e1f99d59-81aa-4662-bf62-c1076f5016c8">
<topic>py-graphite-web -- Multiple vulnerabilities</topic>
<affects>
@@ -60764,55 +59723,6 @@ affected..</p>
</dates>
</vuln>
- <vuln vid="ae651a4b-0a42-11e3-ba52-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>29.0.1547.57</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/">
- <p>25 security fixes in this release, including:</p>
- <ul>
- <li>[181617] High CVE-2013-2900: Incomplete path sanitization in
- file handling. Credit to Krystian Bigaj.</li>
- <li> [254159] Low CVE-2013-2905: Information leak via overly broad
- permissions on shared memory files. Credit to Christian
- Jaeger.</li>
- <li>[257363] High CVE-2013-2901: Integer overflow in ANGLE. Credit
- to Alex Chapman.</li>
- <li>[260105] High CVE-2013-2902: Use after free in XSLT. Credit to
- cloudfuzzer.</li>
- <li>[260156] High CVE-2013-2903: Use after free in media element.
- Credit to cloudfuzzer.</li>
- <li>[260428] High CVE-2013-2904: Use after free in document
- parsing. Credit to cloudfuzzer.</li>
- <li>[274602] CVE-2013-2887: Various fixes from internal audits,
- fuzzing and other initiatives (Chrome 29).</li>
- </ul>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2013-2887</cvename>
- <cvename>CVE-2013-2900</cvename>
- <cvename>CVE-2013-2901</cvename>
- <cvename>CVE-2013-2902</cvename>
- <cvename>CVE-2013-2903</cvename>
- <cvename>CVE-2013-2904</cvename>
- <cvename>CVE-2013-2905</cvename>
- <url>http://googlechromereleases.blogspot.nl/</url>
- </references>
- <dates>
- <discovery>2013-08-20</discovery>
- <entry>2013-08-21</entry>
- </dates>
- </vuln>
-
<vuln vid="4d087b35-0990-11e3-a9f4-bcaec565249c">
<topic>gstreamer-ffmpeg -- Multiple vulnerabilities in bundled libav</topic>
<affects>
@@ -61276,49 +60186,6 @@ affected..</p>
</dates>
</vuln>
- <vuln vid="69098c5c-fc4b-11e2-8ad0-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>28.0.1500.95</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/">
- <p>Eleven vulnerabilities, including:</p>
- <p>[257748] Medium CVE-2013-2881: Origin bypass in frame handling.
- Credit to Karthik Bhargavan.</p>
- <p>[260106] High CVE-2013-2882: Type confusion in V8. Credit to
- Cloudfuzzer.</p>
- <p>[260165] High CVE-2013-2883: Use-after-free in MutationObserver.
- Credit to Cloudfuzzer.</p>
- <p>[248950] High CVE-2013-2884: Use-after-free in DOM. Credit to Ivan
- Fratric of Google Security Team.</p>
- <p>[249640] [257353] High CVE-2013-2885: Use-after-free in input
- handling. Credit to Ivan Fratric of Google Security Team.</p>
- <p>[261701] High CVE-2013-2886: Various fixes from internal audits,
- fuzzing and other initiatives.</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2013-2881</cvename>
- <cvename>CVE-2013-2882</cvename>
- <cvename>CVE-2013-2883</cvename>
- <cvename>CVE-2013-2884</cvename>
- <cvename>CVE-2013-2885</cvename>
- <cvename>CVE-2013-2886</cvename>
- <url>http://www.googlechromereleases.blogspot.nl/</url>
- </references>
- <dates>
- <discovery>2013-07-30</discovery>
- <entry>2013-08-03</entry>
- </dates>
- </vuln>
-
<vuln vid="f4a0212f-f797-11e2-9bb9-6805ca0b3d42">
<topic>phpMyAdmin -- multiple vulnerabilities</topic>
<affects>
@@ -61993,75 +60860,6 @@ affected..</p>
</dates>
</vuln>
- <vuln vid="3b80104f-e96c-11e2-8bac-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>28.0.1500.71</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/">
- <p>A special reward for Andrey Labunets for his combination of
- CVE-2013-2879 and CVE-2013-2868 along with some (since fixed)
- server-side bugs.</p>
- <p>[252216] Low CVE-2013-2867: Block pop-unders in various
- scenarios.</p>
- <p>[252062] High CVE-2013-2879: Confusion setting up sign-in and sync.
- Credit to Andrey Labunets.</p>
- <p>[252034] Medium CVE-2013-2868: Incorrect sync of NPAPI extension
- component. Credit to Andrey Labunets.</p>
- <p>[245153] Medium CVE-2013-2869: Out-of-bounds read in JPEG2000
- handling. Credit to Felix Groebert of Google Security Team.</p>
- <p>[244746] [242762] Critical CVE-2013-2870: Use-after-free with
- network sockets. Credit to Collin Payne.</p>
- <p>[244260] Medium CVE-2013-2853: Man-in-the-middle attack against
- HTTP in SSL. Credit to Antoine Delignat-Lavaud and Karthikeyan
- Bhargavan from Prosecco at INRIA Paris.</p>
- <p>[243991] [243818] High CVE-2013-2871: Use-after-free in input
- handling. Credit to miaubiz.</p>
- <p>[Mac only] [242702] Low CVE-2013-2872: Possible lack of entropy in
- renderers. Credit to Eric Rescorla.</p>
- <p>[241139] High CVE-2013-2873: Use-after-free in resource loading.
- Credit to miaubiz.</p>
- <p>[233848] Medium CVE-2013-2875: Out-of-bounds-read in SVG. Credit
- to miaubiz.</p>
- <p>[229504] Medium CVE-2013-2876: Extensions permissions confusion
- with interstitials. Credit to Dev Akhawe.</p>
- <p>[229019] Low CVE-2013-2877: Out-of-bounds read in XML parsing.
- Credit to Aki Helin of OUSPG.</p>
- <p>[196636] None: Remove the "viewsource" attribute on iframes.
- Credit to Collin Jackson.</p>
- <p>[177197] Medium CVE-2013-2878: Out-of-bounds read in text
- handling. Credit to Atte Kettunen of OUSPG.</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2013-2853</cvename>
- <cvename>CVE-2013-2867</cvename>
- <cvename>CVE-2013-2868</cvename>
- <cvename>CVE-2013-2869</cvename>
- <cvename>CVE-2013-2870</cvename>
- <cvename>CVE-2013-2871</cvename>
- <cvename>CVE-2013-2872</cvename>
- <cvename>CVE-2013-2873</cvename>
- <cvename>CVE-2013-2875</cvename>
- <cvename>CVE-2013-2876</cvename>
- <cvename>CVE-2013-2877</cvename>
- <cvename>CVE-2013-2878</cvename>
- <cvename>CVE-2013-2879</cvename>
- <url>http://googlechromereleases.blogspot.nl/</url>
- </references>
- <dates>
- <discovery>2013-07-09</discovery>
- <entry>2013-07-10</entry>
- </dates>
- </vuln>
-
<vuln vid="f3d24aee-e5ad-11e2-b183-20cf30e32f6d">
<topic>apache22 -- several vulnerabilities</topic>
<affects>
@@ -62734,65 +61532,6 @@ affected..</p>
</dates>
</vuln>
- <vuln vid="4865d189-cd62-11e2-ae11-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>27.0.1453.110</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/">
- <p>[242322] Medium CVE-2013-2855: Memory corruption in dev tools API.
- Credit to "daniel.zulla".</p>
- <p>[242224] High CVE-2013-2856: Use-after-free in input handling.
- Credit to miaubiz.</p>
- <p>[240124] High CVE-2013-2857: Use-after-free in image handling.
- Credit to miaubiz.</p>
- <p>[239897] High CVE-2013-2858: Use-after-free in HTML5 Audio. Credit
- to "cdel921".</p>
- <p>[237022] High CVE-2013-2859: Cross-origin namespace pollution.
- to "bobbyholley".</p>
- <p>[225546] High CVE-2013-2860: Use-after-free with workers accessing
- database APIs. Credit to Collin Payne.</p>
- <p>[209604] High CVE-2013-2861: Use-after-free with SVG. Credit to
- miaubiz.</p>
- <p>[161077] High CVE-2013-2862: Memory corruption in Skia GPU
- handling. Credit to Atte Kettunen of OUSPG.</p>
- <p>[232633] Critical CVE-2013-2863: Memory corruption in SSL socket
- handling. Credit to Sebastian Marchand of the Chromium development
- community.</p>
- <p>[239134] High CVE-2013-2864: Bad free in PDF viewer. Credit to
- Mateusz Jurczyk, with contributions by Gynvael Coldwind, both from
- Google Security Team.</p>
- <p>[246389] High CVE-2013-2865: Various fixes from internal audits,
- fuzzing and other initiatives.</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2013-2855</cvename>
- <cvename>CVE-2013-2856</cvename>
- <cvename>CVE-2013-2857</cvename>
- <cvename>CVE-2013-2858</cvename>
- <cvename>CVE-2013-2859</cvename>
- <cvename>CVE-2013-2860</cvename>
- <cvename>CVE-2013-2861</cvename>
- <cvename>CVE-2013-2862</cvename>
- <cvename>CVE-2013-2863</cvename>
- <cvename>CVE-2013-2864</cvename>
- <cvename>CVE-2013-2865</cvename>
- <url>http://googlechromereleases.blogspot.nl/</url>
- </references>
- <dates>
- <discovery>2013-06-04</discovery>
- <entry>2013-06-04</entry>
- </dates>
- </vuln>
-
<vuln vid="2eebebff-cd3b-11e2-8f09-001b38c3836c">
<topic>xorg -- protocol handling issues in X Window System client libraries</topic>
<affects>
@@ -63475,72 +62214,6 @@ affected..</p>
</dates>
</vuln>
- <vuln vid="358133b5-c2b9-11e2-a738-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>27.0.1453.93</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/search/Stable%20Updates">
- <p>[235638] High CVE-2013-2837: Use-after-free in SVG. Credit to
- Slawomir Blazek.</p>
- <p>[235311] Medium CVE-2013-2838: Out-of-bounds read in v8. Credit to
- Christian Holler.</p>
- <p>[230176] High CVE-2013-2839: Bad cast in clipboard handling.
- Credit to Jon of MWR InfoSecurity.</p>
- <p>[230117] High CVE-2013-2840: Use-after-free in media loader.
- Credit to Nils of MWR InfoSecurity.</p>
- <p>[227350] High CVE-2013-2841: Use-after-free in Pepper resource
- handling. Credit to Chamal de Silva.</p>
- <p>[226696] High CVE-2013-2842: Use-after-free in widget handling.
- Credit to Cyril Cattiaux.</p>
- <p>[222000] High CVE-2013-2843: Use-after-free in speech handling.
- Credit to Khalil Zhani.</p>
- <p>[196393] High CVE-2013-2844: Use-after-free in style resolution.
- Credit to Sachin Shinde (@cons0ul).</p>
- <p>[188092] [179522] [222136] [188092] High CVE-2013-2845: Memory
- safety issues in Web Audio. Credit to Atte Kettunen of OUSPG.</p>
- <p>[177620] High CVE-2013-2846: Use-after-free in media loader.
- Credit to Chamal de Silva.</p>
- <p>[176692] High CVE-2013-2847: Use-after-free race condition with
- workers. Credit to Collin Payne.</p>
- <p>[176137] Medium CVE-2013-2848: Possible data extraction with XSS
- Auditor. Credit to Egor Homakov.</p>
- <p>[171392] Low CVE-2013-2849: Possible XSS with drag+drop or
- copy+paste. Credit to Mario Heiderich.</p>
- <p>[241595] High CVE-2013-2836: Various fixes from internal audits,
- fuzzing and other initiatives.</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2013-2836</cvename>
- <cvename>CVE-2013-2837</cvename>
- <cvename>CVE-2013-2838</cvename>
- <cvename>CVE-2013-2839</cvename>
- <cvename>CVE-2013-2840</cvename>
- <cvename>CVE-2013-2841</cvename>
- <cvename>CVE-2013-2842</cvename>
- <cvename>CVE-2013-2843</cvename>
- <cvename>CVE-2013-2844</cvename>
- <cvename>CVE-2013-2845</cvename>
- <cvename>CVE-2013-2846</cvename>
- <cvename>CVE-2013-2847</cvename>
- <cvename>CVE-2013-2848</cvename>
- <cvename>CVE-2013-2849</cvename>
- <url>http://googlechromereleases.blogspot.nl/search/Stable%20Updates</url>
- </references>
- <dates>
- <discovery>2013-05-21</discovery>
- <entry>2013-05-22</entry>
- </dates>
- </vuln>
-
<vuln vid="c72a2494-c08b-11e2-bb21-083e8ed0f47b">
<topic>plib -- stack-based buffer overflow</topic>
<affects>
@@ -64770,70 +63443,6 @@ affected..</p>
</dates>
</vuln>
- <vuln vid="bdd48858-9656-11e2-a9a8-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>26.0.1410.43</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/search/Stable%20Updates">
- <p>[172342] High CVE-2013-0916: Use-after-free in Web Audio. Credit
- to Atte Kettunen of OUSPG.</p>
- <p>[180909] Low CVE-2013-0917: Out-of-bounds read in URL loader.
- Credit to Google Chrome Security Team (Cris Neckar).</p>
- <p>[180555] Low CVE-2013-0918: Do not navigate dev tools upon drag
- and drop. Credit to Vsevolod Vlasov of the Chromium development
- community.</p>
- <p>[Linux only] [178760] Medium CVE-2013-0919: Use-after-free with
- pop-up windows in extensions. Credit to Google Chrome Security Team
- (Mustafa Emre Acer).</p>
- <p>[177410] Medium CVE-2013-0920: Use-after-free in extension
- bookmarks API. Credit to Google Chrome Security Team (Mustafa Emre
- Acer).</p>
- <p>[174943] High CVE-2013-0921: Ensure isolated web sites run in
- their own processes.</p>
- <p>[174129] Low CVE-2013-0922: Avoid HTTP basic auth brute force
- attempts. Credit to "t3553r".</p>
- <p>[169981] [169972] [169765] Medium CVE-2013-0923: Memory safety
- issues in the USB Apps API. Credit to Google Chrome Security Team
- (Mustafa Emre Acer).</p>
- <p>[169632] Low CVE-2013-0924: Check an extension's permissions API
- usage again file permissions. Credit to Benjamin Kalman of the
- Chromium development community.</p>
- <p>[168442] Low CVE-2013-0925: Avoid leaking URLs to extensions
- without the tabs permissions. Credit to Michael Vrable of
- Google.</p>
- <p>[112325] Medium CVE-2013-0926: Avoid pasting active tags in
- certain situations. Credit to Subho Halder, Aditya Gupta, and Dev
- Kar of xys3c (xysec.com).</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2013-0916</cvename>
- <cvename>CVE-2013-0917</cvename>
- <cvename>CVE-2013-0918</cvename>
- <cvename>CVE-2013-0919</cvename>
- <cvename>CVE-2013-0920</cvename>
- <cvename>CVE-2013-0921</cvename>
- <cvename>CVE-2013-0922</cvename>
- <cvename>CVE-2013-0923</cvename>
- <cvename>CVE-2013-0924</cvename>
- <cvename>CVE-2013-0925</cvename>
- <cvename>CVE-2013-0926</cvename>
- <url>http://googlechromereleases.blogspot.nl/search/Stable%20Updates</url>
- </references>
- <dates>
- <discovery>2013-03-26</discovery>
- <entry>2013-03-26</entry>
- </dates>
- </vuln>
-
<vuln vid="6adca5e9-95d2-11e2-8549-68b599b52a02">
<topic>firebird -- Remote Stack Buffer Overflow</topic>
<affects>
@@ -65326,33 +63935,6 @@ affected..</p>
</dates>
</vuln>
- <vuln vid="54bed676-87ce-11e2-b528-00262d5ed8ee">
- <topic>chromium -- WebKit vulnerability</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>25.0.1364.160</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/search/Stable%20Updates">
- <p>[180763] High CVE-2013-0912: Type confusion in WebKit. Credit to
- Nils and Jon of MWR Labs.</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2013-0912</cvename>
- <url>http://googlechromereleases.blogspot.nl/search/Stable%20Updates</url>
- </references>
- <dates>
- <discovery>2013-03-07</discovery>
- <entry>2013-03-08</entry>
- </dates>
- </vuln>
-
<vuln vid="b9a347ac-8671-11e2-b73c-0019d18c446a">
<topic>typo3 -- Multiple vulnerabilities in TYPO3 Core</topic>
<affects>
@@ -65395,62 +63977,6 @@ affected..</p>
</dates>
</vuln>
- <vuln vid="40d5ab37-85f2-11e2-b528-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>25.0.1364.152</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/search/Stable%20Updates">
- <p>[176882] High CVE-2013-0902: Use-after-free in frame loader.
- Credit to Chamal de Silva.</p>
- <p>[176252] High CVE-2013-0903: Use-after-free in browser navigation
- handling. Credit to "chromium.khalil".</p>
- <p>[172926] [172331] High CVE-2013-0904: Memory corruption in Web
- Audio. Credit to Atte Kettunen of OUSPG.</p>
- <p>[168982] High CVE-2013-0905: Use-after-free with SVG animations.
- Credit to Atte Kettunen of OUSPG.</p>
- <p>[174895] High CVE-2013-0906: Memory corruption in Indexed DB.
- Credit to Google Chrome Security Team (Juri Aedla).</p>
- <p>[174150] Medium CVE-2013-0907: Race condition in media thread
- handling. Credit to Andrew Scherkus of the Chromium development
- community.</p>
- <p>[174059] Medium CVE-2013-0908: Incorrect handling of bindings for
- extension processes.</p>
- <p>[173906] Low CVE-2013-0909: Referer leakage with XSS Auditor.
- Credit to Egor Homakov.</p>
- <p>[172573] Medium CVE-2013-0910: Mediate renderer -&gt; browser
- plug-in loads more strictly. Credit to Google Chrome Security Team
- (Chris Evans).</p>
- <p>[172264] High CVE-2013-0911: Possible path traversal in database
- handling. Credit to Google Chrome Security Team (Juri Aedla).</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2013-0902</cvename>
- <cvename>CVE-2013-0903</cvename>
- <cvename>CVE-2013-0904</cvename>
- <cvename>CVE-2013-0905</cvename>
- <cvename>CVE-2013-0906</cvename>
- <cvename>CVE-2013-0907</cvename>
- <cvename>CVE-2013-0908</cvename>
- <cvename>CVE-2013-0909</cvename>
- <cvename>CVE-2013-0910</cvename>
- <cvename>CVE-2013-0911</cvename>
- <url>http://googlechromereleases.blogspot.nl/search/Stable%20Updates</url>
- </references>
- <dates>
- <discovery>2013-03-04</discovery>
- <entry>2013-03-06</entry>
- </dates>
- </vuln>
-
<vuln vid="c97219b6-843d-11e2-b131-000c299b62e1">
<topic>stunnel -- Remote Code Execution</topic>
<affects>
@@ -65884,100 +64410,6 @@ affected..</p>
</dates>
</vuln>
- <vuln vid="dfd92cb2-7d48-11e2-ad48-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>25.0.1364.97</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/search/label/Stable%20updates">
- <p>[172243] High CVE-2013-0879: Memory corruption with web audio
- node. Credit to Atte Kettunen of OUSPG.</p>
- <p>[171951] High CVE-2013-0880: Use-after-free in database handling.
- Credit to Chamal de Silva.</p>
- <p>[167069] Medium CVE-2013-0881: Bad read in Matroska handling.
- Credit to Atte Kettunen of OUSPG.</p>
- <p>[165432] High CVE-2013-0882: Bad memory access with excessive SVG
- parameters. Credit to Renata Hodovan.</p>
- <p>[142169] Medium CVE-2013-0883: Bad read in Skia. Credit to Atte
- Kettunen of OUSPG.</p>
- <p>[172984] Low CVE-2013-0884: Inappropriate load of NaCl. Credit to
- Google Chrome Security Team (Chris Evans).</p>
- <p>[172369] Medium CVE-2013-0885: Too many API permissions granted to
- web store.</p>
- <p>[171065] [170836] Low CVE-2013-0887: Developer tools process has
- too many permissions and places too much trust in the connected
- server.</p>
- <p>[170666] Medium CVE-2013-0888: Out-of-bounds read in Skia. Credit
- to Google Chrome Security Team (Inferno).</p>
- <p>[170569] Low CVE-2013-0889: Tighten user gesture check for
- dangerous file downloads.</p>
- <p>[169973] [169966] High CVE-2013-0890: Memory safety issues across
- the IPC layer. Credit to Google Chrome Security Team (Chris
- Evans).</p>
- <p>[169685] High CVE-2013-0891: Integer overflow in blob handling.
- Credit to Google Chrome Security Team (Jüri Aedla).</p>
- <p>[169295] [168710] [166493] [165836] [165747] [164958] [164946]
- Medium CVE-2013-0892: Lower severity issues across the IPC layer.
- Credit to Google Chrome Security Team (Chris Evans).</p>
- <p>[168570] Medium CVE-2013-0893: Race condition in media handling.
- Credit to Andrew Scherkus of the Chromium development community.</p>
- <p>[168473] High CVE-2013-0894: Buffer overflow in vorbis decoding.
- Credit to Google Chrome Security Team (Inferno).</p>
- <p>[Linux / Mac] [167840] High CVE-2013-0895: Incorrect path handling
- in file copying. Credit to Google Chrome Security Team (Jüri
- Aedla).</p>
- <p>[166708] High CVE-2013-0896: Memory management issues in plug-in
- message handling. Credit to Google Chrome Security Team (Cris
- Neckar).</p>
- <p>[165537] Low CVE-2013-0897: Off-by-one read in PDF. Credit to
- Mateusz Jurczyk, with contributions by Gynvael Coldwind, both from
- Google Security Team.</p>
- <p>[164643] High CVE-2013-0898: Use-after-free in URL handling.
- Credit to Alexander Potapenko of the Chromium development
- community.</p>
- <p>[160480] Low CVE-2013-0899: Integer overflow in Opus handling.
- Credit to Google Chrome Security Team (Jüri Aedla).</p>
- <p>[152442] Medium CVE-2013-0900: Race condition in ICU. Credit to
- Google Chrome Security Team (Inferno).</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2013-0879</cvename>
- <cvename>CVE-2013-0880</cvename>
- <cvename>CVE-2013-0881</cvename>
- <cvename>CVE-2013-0882</cvename>
- <cvename>CVE-2013-0883</cvename>
- <cvename>CVE-2013-0884</cvename>
- <cvename>CVE-2013-0885</cvename>
- <cvename>CVE-2013-0887</cvename>
- <cvename>CVE-2013-0888</cvename>
- <cvename>CVE-2013-0889</cvename>
- <cvename>CVE-2013-0890</cvename>
- <cvename>CVE-2013-0891</cvename>
- <cvename>CVE-2013-0892</cvename>
- <cvename>CVE-2013-0893</cvename>
- <cvename>CVE-2013-0894</cvename>
- <cvename>CVE-2013-0895</cvename>
- <cvename>CVE-2013-0896</cvename>
- <cvename>CVE-2013-0897</cvename>
- <cvename>CVE-2013-0898</cvename>
- <cvename>CVE-2013-0899</cvename>
- <cvename>CVE-2013-0900</cvename>
- <url>http://googlechromereleases.blogspot.nl/search/label/Stable%20updates</url>
- </references>
- <dates>
- <discovery>2013-02-21</discovery>
- <entry>2013-02-22</entry>
- </dates>
- </vuln>
-
<vuln vid="f54584bc-7d2b-11e2-9bd1-206a8a720317">
<topic>krb5 -- null pointer dereference in the KDC PKINIT code [CVE-2013-1415]</topic>
<affects>
@@ -66749,43 +65181,6 @@ affected..</p>
</dates>
</vuln>
- <vuln vid="8d03202c-6559-11e2-a389-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>24.0.1312.56</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/search/label/Stable%20updates">
- <p>[151008] High CVE-2013-0839: Use-after-free in canvas font
- handling. Credit to Atte Kettunen of OUSPG.</p>
- <p>[170532] Medium CVE-2013-0840: Missing URL validation when opening
- new windows.</p>
- <p>[169770] High CVE-2013-0841: Unchecked array index in content
- blocking. Credit to Google Chrome Security Team (Chris Evans).</p>
- <p>[166867] Medium CVE-2013-0842: Problems with NULL characters
- embedded in paths. Credit to Google Chrome Security Team (Jüri
- Aedla).</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2013-0839</cvename>
- <cvename>CVE-2013-0840</cvename>
- <cvename>CVE-2013-0841</cvename>
- <cvename>CVE-2013-0842</cvename>
- <url>http://googlechromereleases.blogspot.nl/search/label/Stable%20updates</url>
- </references>
- <dates>
- <discovery>2013-01-22</discovery>
- <entry>2013-01-23</entry>
- </dates>
- </vuln>
-
<vuln vid="1827f213-633e-11e2-8d93-c8600054b392">
<topic>drupal -- multiple vulnerabilities</topic>
<affects>
@@ -66968,106 +65363,6 @@ affected..</p>
</dates>
</vuln>
- <vuln vid="46bd747b-5b84-11e2-b06d-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>24.0.1312.52</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/search/label/Stable%20updates">
- <p>[162494] High CVE-2012-5145: Use-after-free in SVG layout. Credit
- to Atte Kettunen of OUSPG.</p>
- <p>[165622] High CVE-2012-5146: Same origin policy bypass with
- malformed URL. Credit to Erling A Ellingsen and Subodh Iyengar,
- both of Facebook.</p>
- <p>[165864] High CVE-2012-5147: Use-after-free in DOM handling.
- Credit to José A. Vázquez.</p>
- <p>[167122] Medium CVE-2012-5148: Missing filename sanitization in
- hyphenation support. Credit to Google Chrome Security Team (Justin
- Schuh).</p>
- <p>[166795] High CVE-2012-5149: Integer overflow in audio IPC
- handling. Credit to Google Chrome Security Team (Chris Evans).</p>
- <p>[165601] High CVE-2012-5150: Use-after-free when seeking video.
- Credit to Google Chrome Security Team (Inferno).</p>
- <p>[165538] High CVE-2012-5151: Integer overflow in PDF JavaScript.
- Credit to Mateusz Jurczyk, with contribution from Gynvael Coldwind,
- both of Google Security Team.</p>
- <p>[165430] Medium CVE-2012-5152: Out-of-bounds read when seeking
- video. Credit to Google Chrome Security Team (Inferno).</p>
- <p>[164565] High CVE-2012-5153: Out-of-bounds stack access in v8.
- Credit to Andreas Rossberg of the Chromium development
- community.</p>
- <p>[Mac only] [163208] Medium CVE-2012-5155: Missing Mac sandbox for
- worker processes. Credit to Google Chrome Security Team (Julien
- Tinnes).</p>
- <p>[162778] High CVE-2012-5156: Use-after-free in PDF fields. Credit
- to Mateusz Jurczyk, with contribution from Gynvael Coldwind, both
- of Google Security Team.</p>
- <p>[162776] [162156] Medium CVE-2012-5157: Out-of-bounds reads in PDF
- image handling. Credit to Mateusz Jurczyk, with contribution from
- Gynvael Coldwind, both of Google Security Team.</p>
- <p>[162153] High CVE-2013-0828: Bad cast in PDF root handling. Credit
- to Mateusz Jurczyk, with contribution from Gynvael Coldwind, both
- of Google Security Team.</p>
- <p>[162114] High CVE-2013-0829: Corruption of database metadata
- leading to incorrect file access. Credit to Google Chrome Security
- Team (Jüri Aedla).</p>
- <p>[161836] Low CVE-2013-0831: Possible path traversal from extension
- process. Credit to Google Chrome Security Team (Tom Sepez).</p>
- <p>[160380] Medium CVE-2013-0832: Use-after-free with printing.
- Credit to Google Chrome Security Team (Cris Neckar).</p>
- <p>[154485] Medium CVE-2013-0833: Out-of-bounds read with printing.
- Credit to Google Chrome Security Team (Cris Neckar).</p>
- <p>[154283] Medium CVE-2013-0834: Out-of-bounds read with glyph
- handling. Credit to Google Chrome Security Team (Cris Neckar).</p>
- <p>[152921] Low CVE-2013-0835: Browser crash with geolocation. Credit
- to Arthur Gerkis.</p>
- <p>[150545] High CVE-2013-0836: Crash in v8 garbage collection.
- Credit to Google Chrome Security Team (Cris Neckar).</p>
- <p>[145363] Medium CVE-2013-0837: Crash in extension tab handling.
- Credit to Tom Nielsen.</p>
- <p>[Linux only] [143859] Low CVE-2013-0838: Tighten permissions on
- shared memory segments. Credit to Google Chrome Security Team
- (Chris Palmer).</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2012-5145</cvename>
- <cvename>CVE-2012-5146</cvename>
- <cvename>CVE-2012-5147</cvename>
- <cvename>CVE-2012-5148</cvename>
- <cvename>CVE-2012-5149</cvename>
- <cvename>CVE-2012-5150</cvename>
- <cvename>CVE-2012-5151</cvename>
- <cvename>CVE-2012-5152</cvename>
- <cvename>CVE-2012-5153</cvename>
- <cvename>CVE-2012-5155</cvename>
- <cvename>CVE-2012-5156</cvename>
- <cvename>CVE-2012-5157</cvename>
- <cvename>CVE-2013-0828</cvename>
- <cvename>CVE-2013-0829</cvename>
- <cvename>CVE-2013-0831</cvename>
- <cvename>CVE-2013-0832</cvename>
- <cvename>CVE-2013-0833</cvename>
- <cvename>CVE-2013-0834</cvename>
- <cvename>CVE-2013-0835</cvename>
- <cvename>CVE-2013-0836</cvename>
- <cvename>CVE-2013-0837</cvename>
- <cvename>CVE-2013-0838</cvename>
- <url>http://googlechromereleases.blogspot.nl/search/label/Stable%20updates</url>
- </references>
- <dates>
- <discovery>2013-01-10</discovery>
- <entry>2013-01-11</entry>
- </dates>
- </vuln>
-
<vuln vid="a4ed6632-5aa9-11e2-8fcb-c8600054b392">
<topic>mozilla -- multiple vulnerabilities</topic>
<affects>
@@ -67793,49 +66088,6 @@ executed in your Internet Explorer while displaying the email.</p>
</dates>
</vuln>
- <vuln vid="51f84e28-444e-11e2-8306-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>23.0.1271.97</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/search/label/Stable%20updates">
- <p>[158204] High CVE-2012-5139: Use-after-free with visibility
- events. Credit to Chamal de Silva.</p>
- <p>[159429] High CVE-2012-5140: Use-after-free in URL loader. Credit
- to Chamal de Silva.</p>
- <p>[160456] Medium CVE-2012-5141: Limit Chromoting client plug-in
- instantiation. Credit to Google Chrome Security Team (Jüri
- Aedla).</p>
- <p>[160803] Critical CVE-2012-5142: Crash in history navigation.
- Credit to Michal Zalewski of Google Security Team.</p>
- <p>[160926] Medium CVE-2012-5143: Integer overflow in PPAPI image
- buffers. Credit to Google Chrome Security Team (Cris Neckar).</p>
- <p>[161639] High CVE-2012-5144: Stack corruption in AAC decoding.
- Credit to pawlkt.</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2012-5139</cvename>
- <cvename>CVE-2012-5140</cvename>
- <cvename>CVE-2012-5141</cvename>
- <cvename>CVE-2012-5142</cvename>
- <cvename>CVE-2012-5143</cvename>
- <cvename>CVE-2012-5144</cvename>
- <url>http://googlechromereleases.blogspot.nl/search/label/Stable%20updates</url>
- </references>
- <dates>
- <discovery>2012-12-11</discovery>
- <entry>2012-12-12</entry>
- </dates>
- </vuln>
-
<vuln vid="953911fe-51ef-11e2-8e34-0022156e8794">
<topic>tomcat -- bypass of CSRF prevention filter</topic>
<affects>
@@ -68007,36 +66259,6 @@ executed in your Internet Explorer while displaying the email.</p>
</dates>
</vuln>
- <vuln vid="5af51ae9-3acd-11e2-a4eb-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>23.0.1271.95</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/search/label/Stable%20updates">
- <p>[161564] High CVE-2012-5138: Incorrect file path handling. Credit
- to Google Chrome Security Team (Jüri Aedla).</p>
- <p>[162835] High CVE-2012-5137: Use-after-free in media source
- handling. Credit to Pinkie Pie.</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2012-5137</cvename>
- <cvename>CVE-2012-5138</cvename>
- <url>http://googlechromereleases.blogspot.nl/search/label/Stable%20updates</url>
- </references>
- <dates>
- <discovery>2012-11-29</discovery>
- <entry>2012-11-30</entry>
- </dates>
- </vuln>
-
<vuln vid="aa4f86af-3172-11e2-ad21-20cf30e32f6d">
<topic>YUI JavaScript library -- JavaScript injection exploits in Flash components</topic>
<affects>
@@ -68072,48 +66294,6 @@ executed in your Internet Explorer while displaying the email.</p>
</dates>
</vuln>
- <vuln vid="4d64fc61-3878-11e2-a4eb-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>23.0.1271.91</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/search/label/Stable%20updates">
- <p>[156567] High CVE-2012-5133: Use-after-free in SVG filters. Credit
- to miaubiz.</p>
- <p>[148638] Medium CVE-2012-5130: Out-of-bounds read in Skia. Credit
- to Atte Kettunen of OUSPG.</p>
- <p>[155711] Low CVE-2012-5132: Browser crash with chunked encoding.
- Credit to Attila Szász.</p>
- <p>[158249] High CVE-2012-5134: Buffer underflow in libxml. Credit to
- Google Chrome Security Team (Jüri Aedla).</p>
- <p>[159165] Medium CVE-2012-5135: Use-after-free with printing.
- Credit to Fermin Serna of Google Security Team.</p>
- <p>[159829] Medium CVE-2012-5136: Bad cast in input element handling.
- Credit to Google Chrome Security Team (Inferno).</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2012-5130</cvename>
- <cvename>CVE-2012-5132</cvename>
- <cvename>CVE-2012-5133</cvename>
- <cvename>CVE-2012-5134</cvename>
- <cvename>CVE-2012-5135</cvename>
- <cvename>CVE-2012-5136</cvename>
- <url>http://googlechromereleases.blogspot.nl/search/label/Stable%20updates</url>
- </references>
- <dates>
- <discovery>2012-11-26</discovery>
- <entry>2012-11-27</entry>
- </dates>
- </vuln>
-
<vuln vid="5536c8e4-36b3-11e2-a633-902b343deec9">
<topic>FreeBSD -- Linux compatibility layer input validation error</topic>
<affects>
@@ -68740,72 +66920,6 @@ executed in your Internet Explorer while displaying the email.</p>
</dates>
</vuln>
- <vuln vid="209c068d-28be-11e2-9160-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>23.0.1271.64</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/search/label/Stable%20updates">
- <p>[157079] Medium CVE-2012-5127: Integer overflow leading to
- out-of-bounds read in WebP handling. Credit to Phil Turnbull.</p>
- <p>[Linux 64-bit only] [150729] Medium CVE-2012-5120: Out-of-bounds
- array access in v8. Credit to Atte Kettunen of OUSPG.</p>
- <p>[143761] High CVE-2012-5116: Use-after-free in SVG filter
- handling. Credit to miaubiz.</p>
- <p>[Mac OS only] [149717] High CVE-2012-5118: Integer bounds check
- issue in GPU command buffers. Credit to miaubiz.</p>
- <p>[154055] High CVE-2012-5121: Use-after-free in video layout.
- Credit to Atte Kettunen of OUSPG.</p>
- <p>[145915] Low CVE-2012-5117: Inappropriate load of SVG subresource
- in img context. Credit to Felix Gröbert of the Google Security
- Team.</p>
- <p>[149759] Medium CVE-2012-5119: Race condition in Pepper buffer
- handling. Credit to Fermin Serna of the Google Security Team.</p>
- <p>[154465] Medium CVE-2012-5122: Bad cast in input handling. Credit
- to Google Chrome Security Team (Inferno).</p>
- <p>[154590] [156826] Medium CVE-2012-5123: Out-of-bounds reads in
- Skia. Credit to Google Chrome Security Team (Inferno).</p>
- <p>[155323] High CVE-2012-5124: Memory corruption in texture handling.
- Credit to Al Patrick of the Chromium development community.</p>
- <p>[156051] Medium CVE-2012-5125: Use-after-free in extension tab
- handling. Credit to Alexander Potapenko of the Chromium development
- community.</p>
- <p>[156366] Medium CVE-2012-5126: Use-after-free in plug-in
- placeholder handling. Credit to Google Chrome Security Team
- (Inferno).</p>
- <p>[157124] High CVE-2012-5128: Bad write in v8. Credit to Google
- Chrome Security Team (Cris Neckar).</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2012-5127</cvename>
- <cvename>CVE-2012-5120</cvename>
- <cvename>CVE-2012-5116</cvename>
- <cvename>CVE-2012-5118</cvename>
- <cvename>CVE-2012-5121</cvename>
- <cvename>CVE-2012-5117</cvename>
- <cvename>CVE-2012-5119</cvename>
- <cvename>CVE-2012-5122</cvename>
- <cvename>CVE-2012-5123</cvename>
- <cvename>CVE-2012-5124</cvename>
- <cvename>CVE-2012-5125</cvename>
- <cvename>CVE-2012-5126</cvename>
- <cvename>CVE-2012-5128</cvename>
- <url>http://googlechromereleases.blogspot.nl/search/label/Stable%20updates</url>
- </references>
- <dates>
- <discovery>2012-11-06</discovery>
- <entry>2012-11-07</entry>
- </dates>
- </vuln>
-
<vuln vid="38daea4f-2851-11e2-9483-14dae938ec40">
<topic>opera -- multiple vulnerabilities</topic>
<affects>
@@ -69565,33 +67679,6 @@ executed in your Internet Explorer while displaying the email.</p>
</dates>
</vuln>
- <vuln vid="09e83f7f-1326-11e2-afe3-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>22.0.1229.94</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/search/label/Stable%20updates">
- <p>[154983][154987] Critical CVE-2012-5112: SVG use-after-free and
- IPC arbitrary file write. Credit to Pinkie Pie.</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2012-5112</cvename>
- <url>http://googlechromereleases.blogspot.nl/search/label/Stable%20updates</url>
- </references>
- <dates>
- <discovery>2012-10-10</discovery>
- <entry>2012-10-10</entry>
- </dates>
- </vuln>
-
<vuln vid="6e5a9afd-12d3-11e2-b47d-c8600054b392">
<topic>mozilla -- multiple vulnerabilities</topic>
<affects>
@@ -69763,46 +67850,6 @@ executed in your Internet Explorer while displaying the email.</p>
</dates>
</vuln>
- <vuln vid="e6161b65-1187-11e2-afe3-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>22.0.1229.92</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/search/label/Stable%20updates">
- <p>[138208] High CVE-2012-2900: Crash in Skia text rendering. Credit
- to Atte Kettunen of OUSPG.</p>
- <p>[147499] Critical CVE-2012-5108: Race condition in audio device
- handling. Credit to Atte Kettunen of OUSPG.</p>
- <p>[148692] Medium CVE-2012-5109: OOB read in ICU regex. Credit to
- Arthur Gerkis.</p>
- <p>[151449] Medium CVE-2012-5110: Out-of-bounds read in compositor.
- Credit to Google Chrome Security Team (Inferno).</p>
- <p>[151895] Low CVE-2012-5111: Plug-in crash monitoring was missing
- for Pepper plug-ins. Credit to Google Chrome Security Team (Chris
- Evans).</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2012-2900</cvename>
- <cvename>CVE-2012-5108</cvename>
- <cvename>CVE-2012-5109</cvename>
- <cvename>CVE-2012-5110</cvename>
- <cvename>CVE-2012-5111</cvename>
- <url>http://googlechromereleases.blogspot.nl/search/label/Stable%20updates</url>
- </references>
- <dates>
- <discovery>2012-10-08</discovery>
- <entry>2012-10-08</entry>
- </dates>
- </vuln>
-
<vuln vid="dee44ba9-08ab-11e2-a044-d0df9acfd7e5">
<topic>OpenX -- SQL injection vulnerability</topic>
<affects>
@@ -69839,102 +67886,6 @@ executed in your Internet Explorer while displaying the email.</p>
</dates>
</vuln>
- <vuln vid="5bae2ab4-0820-11e2-be5f-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>22.0.1229.79</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/search/label/Stable%20updates">
- <p>[143439] High CVE-2012-2889: UXSS in frame handling. Credit to
- Sergey Glazunov.</p>
- <p>[143437] High CVE-2012-2886: UXSS in v8 bindings. Credit to Sergey
- Glazunov.</p>
- <p>[139814] High CVE-2012-2881: DOM tree corruption with plug-ins.
- Credit to Chamal de Silva.</p>
- <p>[135432] High CVE-2012-2876: Buffer overflow in SSE2 optimizations.
- Credit to Atte Kettunen of OUSPG.</p>
- <p>[140803] High CVE-2012-2883: Out-of-bounds write in Skia. Credit to
- Atte Kettunen of OUSPG.</p>
- <p>[143609] High CVE-2012-2887: Use-after-free in onclick handling.
- Credit to Atte Kettunen of OUSPG.</p>
- <p>[143656] High CVE-2012-2888: Use-after-free in SVG text references.
- Credit to miaubiz.</p>
- <p>[144899] High CVE-2012-2894: Crash in graphics context handling.
- Credit to Slawomir Blazek.</p>
- <p>[137707] Medium CVE-2012-2877: Browser crash with extensions and
- modal dialogs. Credit to Nir Moshe.</p>
- <p>[139168] Low CVE-2012-2879: DOM topology corruption. Credit to
- pawlkt.</p>
- <p>[141651] Medium CVE-2012-2884: Out-of-bounds read in Skia. Credit
- to Atte Kettunen of OUSPG.</p>
- <p>[132398] High CVE-2012-2874: Out-of-bounds write in Skia. Credit to
- Google Chrome Security Team (Inferno).</p>
- <p>[134955] [135488] [137106] [137288] [137302] [137547] [137556]
- [137606] [137635] [137880] [137928] [144579] [145079] [145121]
- [145163] [146462] Medium CVE-2012-2875: Various lower severity
- issues in the PDF viewer. Credit to Mateusz Jurczyk of Google
- Security Team, with contributions by Gynvael Coldwind of Google
- Security Team.</p>
- <p>[137852] High CVE-2012-2878: Use-after-free in plug-in handling.
- Credit to Fermin Serna of Google Security Team.</p>
- <p>[139462] Medium CVE-2012-2880: Race condition in plug-in paint
- buffer. Credit to Google Chrome Security Team (Cris Neckar).</p>
- <p>[140647] High CVE-2012-2882: Wild pointer in OGG container
- handling. Credit to Google Chrome Security Team (Inferno).</p>
- <p>[142310] Medium CVE-2012-2885: Possible double free on exit. Credit
- to the Chromium development community.</p>
- <p>[143798] [144072] [147402] High CVE-2012-2890: Use-after-free in
- PDF viewer. Credit to Mateusz Jurczyk of Google Security Team, with
- contributions by Gynvael Coldwind of Google Security Team.</p>
- <p>[144051] Low CVE-2012-2891: Address leak over IPC. Credit to Lei
- Zhang of the Chromium development community.</p>
- <p>[144704] Low CVE-2012-2892: Pop-up block bypass. Credit to Google
- Chrome Security Team (Cris Neckar).</p>
- <p>[144799] High CVE-2012-2893: Double free in XSL transforms. Credit
- to Google Chrome Security Team (Cris Neckar).</p>
- <p>[145029] [145157] [146460] High CVE-2012-2895: Out-of-bounds writes
- in PDF viewer. Credit to Mateusz Jurczyk of Google Security Team,
- with contributions by Gynvael Coldwind of Google Security Team.</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2012-2889</cvename>
- <cvename>CVE-2012-2886</cvename>
- <cvename>CVE-2012-2881</cvename>
- <cvename>CVE-2012-2876</cvename>
- <cvename>CVE-2012-2883</cvename>
- <cvename>CVE-2012-2887</cvename>
- <cvename>CVE-2012-2888</cvename>
- <cvename>CVE-2012-2894</cvename>
- <cvename>CVE-2012-2877</cvename>
- <cvename>CVE-2012-2879</cvename>
- <cvename>CVE-2012-2884</cvename>
- <cvename>CVE-2012-2874</cvename>
- <cvename>CVE-2012-2875</cvename>
- <cvename>CVE-2012-2878</cvename>
- <cvename>CVE-2012-2880</cvename>
- <cvename>CVE-2012-2882</cvename>
- <cvename>CVE-2012-2885</cvename>
- <cvename>CVE-2012-2890</cvename>
- <cvename>CVE-2012-2891</cvename>
- <cvename>CVE-2012-2892</cvename>
- <cvename>CVE-2012-2893</cvename>
- <cvename>CVE-2012-2895</cvename>
- <url>http://googlechromereleases.blogspot.nl/search/label/Stable%20updates</url>
- </references>
- <dates>
- <discovery>2012-09-25</discovery>
- <entry>2012-09-26</entry>
- </dates>
- </vuln>
-
<vuln vid="73efb1b7-07ec-11e2-a391-000c29033c32">
<topic>eperl -- Remote code execution</topic>
<affects>
@@ -70755,53 +68706,6 @@ executed in your Internet Explorer while displaying the email.</p>
</dates>
</vuln>
- <vuln vid="ee68923d-f2f5-11e1-8014-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>21.0.1180.89</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/search/label/Stable%20updates">
- <p>[121347] Medium CVE-2012-2865: Out-of-bounds read in line breaking.
- Credit to miaubiz.</p>
- <p>[134897] High CVE-2012-2866: Bad cast with run-ins. Credit to
- miaubiz.</p>
- <p>[135485] Low CVE-2012-2867: Browser crash with SPDY.</p>
- <p>[136881] Medium CVE-2012-2868: Race condition with workers and XHR.
- Credit to miaubiz.</p>
- <p>[137778] High CVE-2012-2869: Avoid stale buffer in URL loading.
- Credit to Fermin Serna of the Google Security Team.</p>
- <p>[138672] [140368] Low CVE-2012-2870: Lower severity memory
- management issues in XPath. Credit to Nicolas Gregoire.</p>
- <p>[138673] High CVE-2012-2871: Bad cast in XSL transforms. Credit to
- Nicolas Gregoire.</p>
- <p>[142956] Medium CVE-2012-2872: XSS in SSL interstitial. Credit to
- Emmanuel Bronshtein.</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2012-2865</cvename>
- <cvename>CVE-2012-2866</cvename>
- <cvename>CVE-2012-2867</cvename>
- <cvename>CVE-2012-2868</cvename>
- <cvename>CVE-2012-2869</cvename>
- <cvename>CVE-2012-2870</cvename>
- <cvename>CVE-2012-2871</cvename>
- <cvename>CVE-2012-2872</cvename>
- <url>http://googlechromereleases.blogspot.nl/search/label/Stable%20updates</url>
- </references>
- <dates>
- <discovery>2012-08-30</discovery>
- <entry>2012-08-30</entry>
- </dates>
- </vuln>
-
<vuln vid="4c53f007-f2ed-11e1-a215-14dae9ebcf89">
<topic>asterisk -- multiple vulnerabilities</topic>
<affects>
@@ -71772,148 +69676,6 @@ executed in your Internet Explorer while displaying the email.</p>
</dates>
</vuln>
- <vuln vid="60bbe12c-e2c1-11e1-a8ca-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>21.0.1180.75</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/search/label/Stable%20updates">
- <p>[136643] [137721] [137957] High CVE-2012-2862: Use-after-free in
- PDF viewer. Credit to Mateusz Jurczyk of Google Security Team, with
- contributions by Gynvael Coldwind of Google Security Team.</p>
- <p>[136968] [137361] High CVE-2012-2863: Out-of-bounds writes in PDF
- viewer. Credit to Mateusz Jurczyk of Google Security Team, with
- contributions by Gynvael Coldwind of Google Security Team.</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2012-2862</cvename>
- <cvename>CVE-2012-2863</cvename>
- <url>http://googlechromereleases.blogspot.com/search/label/Stable%20updates</url>
- </references>
- <dates>
- <discovery>2012-08-08</discovery>
- <entry>2012-08-10</entry>
- </dates>
- </vuln>
-
- <vuln vid="ce84e136-e2f6-11e1-a8ca-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>21.0.1180.60</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/search/label/Stable%20updates">
- <p>[Linux only] [125225] Medium CVE-2012-2846: Cross-process
- interference in renderers. Credit to Google Chrome Security Team
- (Julien Tinnes).</p>
- <p>[127522] Low CVE-2012-2847: Missing re-prompt to user upon
- excessive downloads. Credit to Matt Austin of Aspect Security.</p>
- <p>[127525] Medium CVE-2012-2848: Overly broad file access granted
- after drag+drop. Credit to Matt Austin of Aspect Security.</p>
- <p>[128163] Low CVE-2012-2849: Off-by-one read in GIF decoder. Credit
- to Atte Kettunen of OUSPG.</p>
- <p>[130251] [130592] [130611] [131068] [131237] [131252] [131621]
- [131690] [132860] Medium CVE-2012-2850: Various lower severity
- issues in the PDF viewer. Credit to Mateusz Jurczyk of Google
- Security Team, with contributions by Gynvael Coldwind of Google
- Security Team.</p>
- <p>[132585] [132694] [132861] High CVE-2012-2851: Integer overflows in
- PDF viewer. Credit to Mateusz Jurczyk of Google Security Team, with
- contributions by Gynvael Coldwind of Google Security Team.</p>
- <p>[134028] High CVE-2012-2852: Use-after-free with bad object linkage
- in PDF. Credit to Alexey Samsonov of Google.</p>
- <p>[134101] Medium CVE-2012-2853: webRequest can interfere with the
- Chrome Web Store. Credit to Trev of Adblock.</p>
- <p>[134519] Low CVE-2012-2854: Leak of pointer values to WebUI
- renderers. Credit to Nasko Oskov of the Chromium development
- community.</p>
- <p>[134888] High CVE-2012-2855: Use-after-free in PDF viewer. Credit
- to Mateusz Jurczyk of Google Security Team, with contributions by
- Gynvael Coldwind of Google Security Team.</p>
- <p>[134954] [135264] High CVE-2012-2856: Out-of-bounds writes in PDF
- viewer. Credit to Mateusz Jurczyk of Google Security Team, with
- contributions by Gynvael Coldwind of Google Security Team.</p>
- <p>[136235] High CVE-2012-2857: Use-after-free in CSS DOM. Credit to
- Arthur Gerkis.</p>
- <p>[136894] High CVE-2012-2858: Buffer overflow in WebP decoder.
- Credit to Juri Aedla.</p>
- <p>[Linux only] [137541] Critical CVE-2012-2859: Crash in tab
- handling. Credit to Jeff Roberts of Google Security Team.</p>
- <p>[137671] Medium CVE-2012-2860: Out-of-bounds access when clicking
- in date picker. Credit to Chamal de Silva.</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2012-2846</cvename>
- <cvename>CVE-2012-2847</cvename>
- <cvename>CVE-2012-2848</cvename>
- <cvename>CVE-2012-2849</cvename>
- <cvename>CVE-2012-2850</cvename>
- <cvename>CVE-2012-2851</cvename>
- <cvename>CVE-2012-2852</cvename>
- <cvename>CVE-2012-2853</cvename>
- <cvename>CVE-2012-2854</cvename>
- <cvename>CVE-2012-2855</cvename>
- <cvename>CVE-2012-2856</cvename>
- <cvename>CVE-2012-2857</cvename>
- <cvename>CVE-2012-2858</cvename>
- <cvename>CVE-2012-2859</cvename>
- <cvename>CVE-2012-2860</cvename>
- <url>http://googlechromereleases.blogspot.com/search/label/Stable%20updates</url>
- </references>
- <dates>
- <discovery>2012-07-31</discovery>
- <entry>2012-08-10</entry>
- </dates>
- </vuln>
-
- <vuln vid="2092a45b-e2f6-11e1-a8ca-00262d5ed8ee">
- <topic>www/chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>20.0.1132.57</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/search/label/Stable%20updates">
- <p>[129898] High CVE-2012-2842: Use-after-free in counter handling.
- Credit to miaubiz.</p>
- <p>[130595] High CVE-2012-2843: Use-after-free in layout height
- tracking. Credit to miaubiz.</p>
- <p>[133450] High CVE-2012-2844: Bad object access with JavaScript in
- PDF. Credit to Alexey Samsonov of Google.</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2012-2842</cvename>
- <cvename>CVE-2012-2843</cvename>
- <cvename>CVE-2012-2844</cvename>
- <url>http://googlechromereleases.blogspot.com/search/label/Stable%20updates</url>
- </references>
- <dates>
- <discovery>2012-07-11</discovery>
- <entry>2012-08-10</entry>
- </dates>
- </vuln>
-
<vuln vid="31db9a18-e289-11e1-a57d-080027a27dbf">
<topic>rubygem-rails -- multiple vulnerabilities</topic>
<affects>
@@ -72875,86 +70637,6 @@ executed in your Internet Explorer while displaying the email.</p>
</dates>
</vuln>
- <vuln vid="ff922811-c096-11e1-b0f4-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>20.0.1132.43</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.nl/search/label/Stable%20updates">
- <p>[118633] Low CVE-2012-2815: Leak of iframe fragment id. Credit to
- Elie Bursztein of Google.</p>
- <p>[120222] High CVE-2012-2817: Use-after-free in table section
- handling. Credit to miaubiz.</p>
- <p>[120944] High CVE-2012-2818: Use-after-free in counter layout.
- Credit to miaubiz.</p>
- <p>[120977] High CVE-2012-2819: Crash in texture handling. Credit to
- Ken "gets" Russell of the Chromium development community.</p>
- <p>[121926] Medium CVE-2012-2820: Out-of-bounds read in SVG filter
- handling. Credit to Atte Kettunen of OUSPG.</p>
- <p>[122925] Medium CVE-2012-2821: Autofill display problem. Credit to
- "simonbrown60".</p>
- <p>[various] Medium CVE-2012-2822: Misc. lower severity OOB read
- issues in PDF. Credit to awesome ASAN and various Googlers (Kostya
- Serebryany, Evgeniy Stepanov, Mateusz Jurczyk, Gynvael Coldwind).</p>
- <p>[124356] High CVE-2012-2823: Use-after-free in SVG resource
- handling. Credit to miaubiz.</p>
- <p>[125374] High CVE-2012-2824: Use-after-free in SVG painting.
- Credit to miaubiz.</p>
- <p>[128688] Medium CVE-2012-2826: Out-of-bounds read in texture
- conversion. Credit to Google Chrome Security Team (Inferno).</p>
- <p>[Mac only] [129826] Low CVE-2012-2827: Use-after-free in Mac UI.
- Credit to the Chromium development community (Dharani Govindan).</p>
- <p>[129857] High CVE-2012-2828: Integer overflows in PDF. Credit to
- Mateusz Jurczyk of Google Security Team and Google Chrome Security
- Team (Chris Evans).</p>
- <p>[129947] High CVE-2012-2829: Use-after-free in first-letter
- handling. Credit to miaubiz.</p>
- <p>[129951] High CVE-2012-2830: Wild pointer in array value setting.
- Credit to miaubiz.</p>
- <p>[130356] High CVE-2012-2831: Use-after-free in SVG reference
- handling. Credit to miaubiz.</p>
- <p>[131553] High CVE-2012-2832: Uninitialized pointer in PDF image
- codec. Credit to Mateusz Jurczyk of Google Security Team.</p>
- <p>[132156] High CVE-2012-2833: Buffer overflow in PDF JS API. Credit
- to Mateusz Jurczyk of Google Security Team.</p>
- <p>[132779] High CVE-2012-2834: Integer overflow in Matroska
- container. Credit to Juri Aedla.</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2012-2815</cvename>
- <cvename>CVE-2012-2817</cvename>
- <cvename>CVE-2012-2818</cvename>
- <cvename>CVE-2012-2819</cvename>
- <cvename>CVE-2012-2820</cvename>
- <cvename>CVE-2012-2821</cvename>
- <cvename>CVE-2012-2822</cvename>
- <cvename>CVE-2012-2823</cvename>
- <cvename>CVE-2012-2824</cvename>
- <cvename>CVE-2012-2826</cvename>
- <cvename>CVE-2012-2827</cvename>
- <cvename>CVE-2012-2828</cvename>
- <cvename>CVE-2012-2829</cvename>
- <cvename>CVE-2012-2830</cvename>
- <cvename>CVE-2012-2831</cvename>
- <cvename>CVE-2012-2832</cvename>
- <cvename>CVE-2012-2833</cvename>
- <cvename>CVE-2012-2834</cvename>
- <url>http://googlechromereleases.blogspot.com/search/label/Stable%20updates</url>
- </references>
- <dates>
- <discovery>2012-06-26</discovery>
- <entry>2012-06-27</entry>
- </dates>
- </vuln>
-
<vuln vid="aed44c4e-c067-11e1-b5e0-000c299b62e1">
<topic>FreeBSD -- Privilege escalation when returning from kernel</topic>
<affects>
@@ -73673,74 +71355,6 @@ executed in your Internet Explorer while displaying the email.</p>
</dates>
</vuln>
- <vuln vid="219d0bfd-a915-11e1-b519-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>19.0.1084.52</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.com/search/label/Stable%20updates">
- <p>[117409] High CVE-2011-3103: Crashes in v8 garbage collection.
- Credit to the Chromium development community (Brett Wilson).</p>
- <p>[118018] Medium CVE-2011-3104: Out-of-bounds read in Skia. Credit
- to Google Chrome Security Team (Inferno).</p>
- <p>[120912] High CVE-2011-3105: Use-after-free in first-letter
- handling. Credit to miaubiz.</p>
- <p>[122654] Critical CVE-2011-3106: Browser memory corruption with
- websockets over SSL. Credit to the Chromium development community
- (Dharani Govindan).</p>
- <p>[124625] High CVE-2011-3107: Crashes in the plug-in JavaScript
- bindings. Credit to the Chromium development community (Dharani
- Govindan).</p>
- <p>[125159] Critical CVE-2011-3108: Use-after-free in browser cache.
- Credit to "efbiaiinzinz".</p>
- <p>[Linux only] [126296] High CVE-2011-3109: Bad cast in GTK UI.
- Credit to Micha Bartholome.</p>
- <p>[126337] [126343] [126378] [127349] [127819] [127868] High
- CVE-2011-3110: Out of bounds writes in PDF. Credit to Mateusz
- Jurczyk of the Google Security Team, with contributions by Gynvael
- Coldwind of the Google Security Team.</p>
- <p>[126414] Medium CVE-2011-3111: Invalid read in v8. Credit to
- Christian Holler.</p>
- <p>[127331] High CVE-2011-3112: Use-after-free with invalid encrypted
- PDF. Credit to Mateusz Jurczyk of the Google Security Team, with
- contributions by Gynvael Coldwind of the Google Security Team.</p>
- <p>[127883] High CVE-2011-3113: Invalid cast with colorspace handling
- in PDF. Credit to Mateusz Jurczyk of the Google Security Team, with
- contributions by Gynvael Coldwind of the Google Security Team.</p>
- <p>[128014] High CVE-2011-3114: Buffer overflows with PDF functions.
- Credit to Google Chrome Security Team (scarybeasts).</p>
- <p>[128018] High CVE-2011-3115: Type corruption in v8. Credit to
- Christian Holler.</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2011-3103</cvename>
- <cvename>CVE-2011-3104</cvename>
- <cvename>CVE-2011-3105</cvename>
- <cvename>CVE-2011-3106</cvename>
- <cvename>CVE-2011-3107</cvename>
- <cvename>CVE-2011-3108</cvename>
- <cvename>CVE-2011-3110</cvename>
- <cvename>CVE-2011-3111</cvename>
- <cvename>CVE-2011-3112</cvename>
- <cvename>CVE-2011-3113</cvename>
- <cvename>CVE-2011-3114</cvename>
- <cvename>CVE-2011-3115</cvename>
- <url>http://googlechromereleases.blogspot.com/search/label/Stable%20updates</url>
- </references>
- <dates>
- <discovery>2012-05-23</discovery>
- <entry>2012-05-28</entry>
- </dates>
- </vuln>
-
<vuln vid="617959ce-a5f6-11e1-a284-0023ae8e59f0">
<topic>haproxy -- buffer overflow</topic>
<affects>
@@ -74102,84 +71716,6 @@ executed in your Internet Explorer while displaying the email.</p>
</dates>
</vuln>
- <vuln vid="1449af37-9eba-11e1-b9c1-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>19.0.1084.46</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.com/search/label/Stable%20updates">
- <p>[112983] Low CVE-2011-3083: Browser crash with video + FTP. Credit
- to Aki Helin of OUSPG.</p>
- <p>[113496] Low CVE-2011-3084: Load links from internal pages in their
- own process. Credit to Brett Wilson of the Chromium development
- community.</p>
- <p>[118374] Medium CVE-2011-3085: UI corruption with long autofilled
- values. Credit to "psaldorn".</p>
- <p>[118642] High CVE-2011-3086: Use-after-free with style element.
- Credit to Arthur Gerkis.</p>
- <p>[118664] Low CVE-2011-3087: Incorrect window navigation. Credit to
- Charlie Reis of the Chromium development community.</p>
- <p>[120648] Medium CVE-2011-3088: Out-of-bounds read in hairline
- drawing. Credit to Aki Helin of OUSPG.</p>
- <p>[120711] High CVE-2011-3089: Use-after-free in table handling.
- Credit to miaubiz.</p>
- <p>[121223] Medium CVE-2011-3090: Race condition with workers. Credit
- to Arthur Gerkis.</p>
- <p>[121734] High CVE-2011-3091: Use-after-free with indexed DB. Credit
- to Google Chrome Security Team (Inferno).</p>
- <p>[122337] High CVE-2011-3092: Invalid write in v8 regex. Credit to
- Christian Holler.</p>
- <p>[122585] Medium CVE-2011-3093: Out-of-bounds read in glyph
- handling. Credit to miaubiz.</p>
- <p>[122586] Medium CVE-2011-3094: Out-of-bounds read in Tibetan
- handling. Credit to miaubiz.</p>
- <p>[123481] High CVE-2011-3095: Out-of-bounds write in OGG container.
- Credit to Hannu Heikkinen.</p>
- <p>[Linux only] [123530] Low CVE-2011-3096: Use-after-free in GTK
- omnibox handling. Credit to Arthur Gerkis.</p>
- <p>[123733] [124182] High CVE-2011-3097: Out-of-bounds write in
- sampled functions with PDF. Credit to Kostya Serebryany of Google
- and Evgeniy Stepanov of Google.</p>
- <p>[124479] High CVE-2011-3099: Use-after-free in PDF with corrupt
- font encoding name. Credit to Mateusz Jurczyk of Google Security
- Team and Gynvael Coldwind of Google Security Team.</p>
- <p>[124652] Medium CVE-2011-3100: Out-of-bounds read drawing dash
- paths. Credit to Google Chrome Security Team (Inferno).</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2011-3083</cvename>
- <cvename>CVE-2011-3084</cvename>
- <cvename>CVE-2011-3085</cvename>
- <cvename>CVE-2011-3086</cvename>
- <cvename>CVE-2011-3087</cvename>
- <cvename>CVE-2011-3088</cvename>
- <cvename>CVE-2011-3089</cvename>
- <cvename>CVE-2011-3090</cvename>
- <cvename>CVE-2011-3091</cvename>
- <cvename>CVE-2011-3092</cvename>
- <cvename>CVE-2011-3093</cvename>
- <cvename>CVE-2011-3094</cvename>
- <cvename>CVE-2011-3095</cvename>
- <cvename>CVE-2011-3096</cvename>
- <cvename>CVE-2011-3097</cvename>
- <cvename>CVE-2011-3099</cvename>
- <cvename>CVE-2011-3100</cvename>
- <url>http://googlechromereleases.blogspot.com/search/label/Stable%20updates</url>
- </references>
- <dates>
- <discovery>2012-05-15</discovery>
- <entry>2012-05-15</entry>
- </dates>
- </vuln>
-
<vuln vid="6601127c-9e09-11e1-b5e0-000c299b62e1">
<topic>socat -- Heap-based buffer overflow</topic>
<affects>
@@ -74513,48 +72049,6 @@ executed in your Internet Explorer while displaying the email.</p>
</dates>
</vuln>
- <vuln vid="94c0ac4f-9388-11e1-b242-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>18.0.1025.168</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.com/search/label/Stable%20updates">
- <p>[106413] High CVE-2011-3078: Use after free in floats handling.
- Credit to Google Chrome Security Team (Marty Barbella) and
- independent later discovery by miaubiz.</p>
- <p>[117627] Medium CVE-2011-3079: IPC validation failure. Credit to
- PinkiePie.</p>
- <p>[121726] Medium CVE-2011-3080: Race condition in sandbox IPC.
- Credit to Willem Pinckaers of Matasano.</p>
- <p>[121899] High CVE-2011-3081: Use after free in floats handling.
- Credit to miaubiz.</p>
- <p>[117110] High CVE-2012-1521: Use after free in xml parser. Credit
- to Google Chrome Security Team (SkyLined) and independent later
- discovery by wushi of team509 reported through iDefense VCP
- (V-874rcfpq7z).</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2011-3078</cvename>
- <cvename>CVE-2011-3079</cvename>
- <cvename>CVE-2011-3080</cvename>
- <cvename>CVE-2011-3081</cvename>
- <cvename>CVE-2012-1521</cvename>
- <url>http://googlechromereleases.blogspot.com/search/label/Stable%20updates</url>
- </references>
- <dates>
- <discovery>2012-04-30</discovery>
- <entry>2012-05-01</entry>
- </dates>
- </vuln>
-
<vuln vid="2cde1892-913e-11e1-b44c-001fd0af1a4c">
<topic>php -- multiple vulnerabilities</topic>
<affects>
@@ -75342,66 +72836,6 @@ executed in your Internet Explorer while displaying the email.</p>
</dates>
</vuln>
- <vuln vid="057130e6-7f61-11e1-8a43-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>18.0.1025.151</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.com/search/label/Stable%20updates">
- <p>[106577] Medium CVE-2011-3066: Out-of-bounds read in Skia clipping. Credit to miaubiz.</p>
- <p>[117583] Medium CVE-2011-3067: Cross-origin iframe replacement.
- Credit to Sergey Glazunov.</p>
- <p>[117698] High CVE-2011-3068: Use-after-free in run-in handling.
- Credit to miaubiz.</p>
- <p>[117728] High CVE-2011-3069: Use-after-free in line box handling.
- Credit to miaubiz.</p>
- <p>[118185] High CVE-2011-3070: Use-after-free in v8 bindings. Credit
- to Google Chrome Security Team (SkyLined).</p>
- <p>[118273] High CVE-2011-3071: Use-after-free in HTMLMediaElement.
- Credit to pa_kt, reporting through HP TippingPoint ZDI
- (ZDI-CAN-1528).</p>
- <p>[118467] Low CVE-2011-3072: Cross-origin violation parenting pop-up
- window. Credit to Sergey Glazunov.</p>
- <p>[118593] High CVE-2011-3073: Use-after-free in SVG resource
- handling. Credit to Arthur Gerkis.</p>
- <p>[119281] Medium CVE-2011-3074: Use-after-free in media handling.
- Credit to Slawomir Blazek.</p>
- <p>[119525] High CVE-2011-3075: Use-after-free applying style command.
- Credit to miaubiz.</p>
- <p>[120037] High CVE-2011-3076: Use-after-free in focus handling.
- Credit to miaubiz.</p>
- <p>[120189] Medium CVE-2011-3077: Read-after-free in script bindings.
- Credit to Google Chrome Security Team (Inferno).</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2011-3066</cvename>
- <cvename>CVE-2011-3067</cvename>
- <cvename>CVE-2011-3068</cvename>
- <cvename>CVE-2011-3069</cvename>
- <cvename>CVE-2011-3070</cvename>
- <cvename>CVE-2011-3071</cvename>
- <cvename>CVE-2011-3072</cvename>
- <cvename>CVE-2011-3073</cvename>
- <cvename>CVE-2011-3074</cvename>
- <cvename>CVE-2011-3075</cvename>
- <cvename>CVE-2011-3076</cvename>
- <cvename>CVE-2011-3077</cvename>
- <url>http://googlechromereleases.blogspot.com/search/label/Stable%20updates</url>
- </references>
- <dates>
- <discovery>2012-04-05</discovery>
- <entry>2012-04-05</entry>
- </dates>
- </vuln>
-
<vuln vid="7289214f-7c55-11e1-ab3b-000bcdf0a03b">
<topic>libpurple -- Remote DoS via an MSN OIM message that lacks UTF-8 encoding</topic>
<affects>
@@ -75461,57 +72895,6 @@ executed in your Internet Explorer while displaying the email.</p>
</dates>
</vuln>
- <vuln vid="b8f0a391-7910-11e1-8a43-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>18.0.1025.142</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.com/search/label/Stable%20updates">
- <p>[109574] Medium CVE-2011-3058: Bad interaction possibly leading to
- XSS in EUC-JP. Credit to Masato Kinugawa.</p>
- <p>[112317] Medium CVE-2011-3059: Out-of-bounds read in SVG text
- handling. Credit to Arthur Gerkis.</p>
- <p>[114056] Medium CVE-2011-3060: Out-of-bounds read in text fragment
- handling. Credit to miaubiz.</p>
- <p>[116398] Medium CVE-2011-3061: SPDY proxy certificate checking
- error. Credit to Leonidas Kontothanassis of Google.</p>
- <p>[116524] High CVE-2011-3062: Off-by-one in OpenType Sanitizer.
- Credit to Mateusz Jurczyk of the Google Security Team.</p>
- <p>[117417] Low CVE-2011-3063: Validate navigation requests from the
- renderer more carefully. Credit to kuzzcc, Sergey Glazunov,
- PinkiePie and scarybeasts (Google Chrome Security Team).</p>
- <p>[117471] High CVE-2011-3064: Use-after-free in SVG clipping. Credit to Atte Kettunen of OUSPG.</p>
- <p>[117588] High CVE-2011-3065: Memory corruption in Skia. Credit to
- Omair.</p>
- <p>[117794] Medium CVE-2011-3057: Invalid read in v8. Credit to
- Christian Holler.</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2011-3057</cvename>
- <cvename>CVE-2011-3058</cvename>
- <cvename>CVE-2011-3059</cvename>
- <cvename>CVE-2011-3060</cvename>
- <cvename>CVE-2011-3061</cvename>
- <cvename>CVE-2011-3062</cvename>
- <cvename>CVE-2011-3063</cvename>
- <cvename>CVE-2011-3064</cvename>
- <cvename>CVE-2011-3065</cvename>
- <url>http://googlechromereleases.blogspot.com/search/label/Stable%20updates</url>
- </references>
- <dates>
- <discovery>2012-03-28</discovery>
- <entry>2012-03-28</entry>
- </dates>
- </vuln>
-
<vuln vid="60f81af3-7690-11e1-9423-00235a5f2c9a">
<topic>raptor/raptor2 -- XXE in RDF/XML File Interpretation</topic>
<affects>
@@ -75629,61 +73012,6 @@ executed in your Internet Explorer while displaying the email.</p>
</dates>
</vuln>
- <vuln vid="330106da-7406-11e1-a1d7-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>17.0.963.83</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.com/search/label/Stable%20updates">
- <p>[113902] High CVE-2011-3050: Use-after-free with first-letter
- handling. Credit to miaubiz.</p>
- <p>[116162] High CVE-2011-3045: libpng integer issue from upstream.
- Credit to Glenn Randers-Pehrson of the libpng project.</p>
- <p>[116461] High CVE-2011-3051: Use-after-free in CSS cross-fade
- handling. Credit to Arthur Gerkis.</p>
- <p>[116637] High CVE-2011-3052: Memory corruption in WebGL canvas
- handling. Credit to Ben Vanik of Google.</p>
- <p>[116746] High CVE-2011-3053: Use-after-free in block splitting.
- Credit to miaubiz.</p>
- <p>[117418] Low CVE-2011-3054: Apply additional isolations to webui
- privileges. Credit to Sergey Glazunov.</p>
- <p>[117736] Low CVE-2011-3055: Prompt in the browser native UI for
- unpacked extension installation. Credit to PinkiePie.</p>
- <p>[117550] High CVE-2011-3056: Cross-origin violation with "magic
- iframe". Credit to Sergey Glazunov.</p>
- <p>[117794] Medium CVE-2011-3057: Invalid read in v8. Credit to
- Christian Holler.</p>
- <p>[108648] Low CVE-2011-3049: Extension web request API can
- interfere with system requests. Credit to Michael Gundlach.
- Fixed in an earlier release.</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2011-3045</cvename>
- <cvename>CVE-2011-3049</cvename>
- <cvename>CVE-2011-3050</cvename>
- <cvename>CVE-2011-3051</cvename>
- <cvename>CVE-2011-3052</cvename>
- <cvename>CVE-2011-3053</cvename>
- <cvename>CVE-2011-3054</cvename>
- <cvename>CVE-2011-3055</cvename>
- <cvename>CVE-2011-3056</cvename>
- <cvename>CVE-2011-3057</cvename>
- <url>http://googlechromereleases.blogspot.com/search/label/Stable%20updates</url>
- </references>
- <dates>
- <discovery>2012-03-21</discovery>
- <entry>2012-03-22</entry>
- </dates>
- </vuln>
-
<vuln vid="2e7e9072-73a0-11e1-a883-001cc0a36e12">
<topic>libtasn1 -- ASN.1 length decoding vulnerability</topic>
<affects>
@@ -75979,33 +73307,6 @@ executed in your Internet Explorer while displaying the email.</p>
</dates>
</vuln>
- <vuln vid="ab1f515d-6b69-11e1-8288-00262d5ed8ee">
- <topic>chromium -- Errant plug-in load and GPU process memory corruption</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>17.0.963.79</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.com/search/label/Stable%20updates">
- <p>[117620] [117656] Critical CVE-2011-3047: Errant plug-in load and
- GPU process memory corruption. Credit to PinkiePie.</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2011-3047</cvename>
- <url>http://googlechromereleases.blogspot.com/search/label/Stable%20updates</url>
- </references>
- <dates>
- <discovery>2012-03-10</discovery>
- <entry>2012-03-11</entry>
- </dates>
- </vuln>
-
<vuln vid="9da3834b-6a50-11e1-91af-003067b2972c">
<topic>linux-flashplugin -- multiple vulnerabilities</topic>
<affects>
@@ -76033,33 +73334,6 @@ executed in your Internet Explorer while displaying the email.</p>
</dates>
</vuln>
- <vuln vid="1015e1fe-69ce-11e1-8288-00262d5ed8ee">
- <topic>chromium -- cross-site scripting vulnerability</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>17.0.963.78</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.com/search/label/Stable%20updates">
- <p>[117226] [117230] Critical CVE-2011-3046: UXSS and bad history
- navigation. Credit to Sergey Glazunov.</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2011-3046</cvename>
- <url>http://googlechromereleases.blogspot.com/search/label/Stable%20updates</url>
- </references>
- <dates>
- <discovery>2012-03-08</discovery>
- <entry>2012-03-09</entry>
- </dates>
- </vuln>
-
<vuln vid="9448a82f-6878-11e1-865f-00e0814cab4e">
<topic>jenkins -- XSS vulnerability</topic>
<affects>
@@ -76089,72 +73363,6 @@ executed in your Internet Explorer while displaying the email.</p>
</dates>
</vuln>
- <vuln vid="99aef698-66ed-11e1-8288-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>17.0.963.65</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.com/search/label/Stable%20updates">
- <p>[105867] High CVE-2011-3031: Use-after-free in v8 element wrapper.
- Credit to Chamal de Silva.</p>
- <p>[108037] High CVE-2011-3032: Use-after-free in SVG value handling.
- Credit to Arthur Gerkis.</p>
- <p>[108406] [115471] High CVE-2011-3033: Buffer overflow in the Skia
- drawing library. Credit to Aki Helin of OUSPG.</p>
- <p>[111748] High CVE-2011-3034: Use-after-free in SVG document
- handling. Credit to Arthur Gerkis.</p>
- <p>[112212] High CVE-2011-3035: Use-after-free in SVG use handling.
- Credit to Arthur Gerkis.</p>
- <p>[113258] High CVE-2011-3036: Bad cast in line box handling. Credit
- to miaubiz.</p>
- <p>[113439] [114924] [115028] High CVE-2011-3037: Bad casts in
- anonymous block splitting. Credit to miaubiz.</p>
- <p>[113497] High CVE-2011-3038: Use-after-free in multi-column
- handling. Credit to miaubiz.</p>
- <p>[113707] High CVE-2011-3039: Use-after-free in quote handling.
- Credit to miaubiz.</p>
- <p>[114054] High CVE-2011-3040: Out-of-bounds read in text handling.
- Credit to miaubiz.</p>
- <p>[114068] High CVE-2011-3041: Use-after-free in class attribute
- handling. Credit to miaubiz.</p>
- <p>[114219] High CVE-2011-3042: Use-after-free in table section
- handling. Credit to miaubiz.</p>
- <p>[115681] High CVE-2011-3043: Use-after-free in flexbox with floats.
- Credit to miaubiz.</p>
- <p>[116093] High CVE-2011-3044: Use-after-free with SVG animation
- elements. Credit to Arthur Gerkis.</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2011-3031</cvename>
- <cvename>CVE-2011-3032</cvename>
- <cvename>CVE-2011-3033</cvename>
- <cvename>CVE-2011-3034</cvename>
- <cvename>CVE-2011-3035</cvename>
- <cvename>CVE-2011-3036</cvename>
- <cvename>CVE-2011-3037</cvename>
- <cvename>CVE-2011-3038</cvename>
- <cvename>CVE-2011-3039</cvename>
- <cvename>CVE-2011-3040</cvename>
- <cvename>CVE-2011-3041</cvename>
- <cvename>CVE-2011-3042</cvename>
- <cvename>CVE-2011-3043</cvename>
- <cvename>CVE-2011-3044</cvename>
- <url>http://googlechromereleases.blogspot.com/search/label/Stable%20updates</url>
- </references>
- <dates>
- <discovery>2012-03-04</discovery>
- <entry>2012-03-05</entry>
- </dates>
- </vuln>
-
<vuln vid="eba70db4-6640-11e1-98af-00262d8b701d">
<topic>dropbear -- arbitrary code execution</topic>
<affects>
@@ -76452,71 +73660,6 @@ executed in your Internet Explorer while displaying the email.</p>
</dates>
</vuln>
- <vuln vid="2f5ff968-5829-11e1-8288-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>17.0.963.56</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.com/search/label/Stable%20updates">
- <p>[105803] High CVE-2011-3015: Integer overflows in PDF codecs.
- Credit to Google Chrome Security Team (scarybeasts).</p>
- <p>[106336] Medium CVE-2011-3016: Read-after-free with counter nodes.
- Credit to miaubiz.</p>
- <p>[108695] High CVE-2011-3017: Possible use-after-free in database
- handling. Credit to miaubiz.</p>
- <p>[110172] High CVE-2011-3018: Heap overflow in path rendering.
- Credit to Aki Helin of OUSPG.</p>
- <p>[110849] High CVE-2011-3019: Heap buffer overflow in MKV handling.
- Credit to Google Chrome Security Team (scarybeasts) and Mateusz
- Jurczyk of the Google Security Team.</p>
- <p>[111575] Medium CVE-2011-3020: Native client validator error.
- Credit to Nick Bray of the Chromium development community.</p>
- <p>[111779] High CVE-2011-3021: Use-after-free in subframe loading.
- Credit to Arthur Gerkis.</p>
- <p>[112236] Medium CVE-2011-3022: Inappropriate use of http for
- translation script. Credit to Google Chrome Security Team (Jorge
- Obes).</p>
- <p>[112259] Medium CVE-2011-3023: Use-after-free with drag and drop.
- Credit to pa_kt.</p>
- <p>[112451] Low CVE-2011-3024: Browser crash with empty x509
- certificate. Credit to chrometot.</p>
- <p>[112670] Medium CVE-2011-3025: Out-of-bounds read in h.264
- parsing. Credit to Slawomir Blazek.</p>
- <p>[112822] High CVE-2011-3026: Integer overflow / truncation in
- libpng. Credit to Juri Aedla.</p>
- <p>[112847] Medium CVE-2011-3027: Bad cast in column handling.
- Credit to miaubiz.</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2011-3015</cvename>
- <cvename>CVE-2011-3016</cvename>
- <cvename>CVE-2011-3017</cvename>
- <cvename>CVE-2011-3018</cvename>
- <cvename>CVE-2011-3019</cvename>
- <cvename>CVE-2011-3020</cvename>
- <cvename>CVE-2011-3021</cvename>
- <cvename>CVE-2011-3022</cvename>
- <cvename>CVE-2011-3023</cvename>
- <cvename>CVE-2011-3024</cvename>
- <cvename>CVE-2011-3025</cvename>
- <cvename>CVE-2011-3026</cvename>
- <cvename>CVE-2011-3027</cvename>
- <url>http://googlechromereleases.blogspot.com/search/label/Stable%20updates</url>
- </references>
- <dates>
- <discovery>2012-02-15</discovery>
- <entry>2012-02-15</entry>
- </dates>
- </vuln>
-
<vuln vid="b4f8be9e-56b2-11e1-9fb7-003067b2972c">
<topic>Python -- DoS via malformed XML-RPC / HTTP POST request</topic>
<affects>
@@ -76737,91 +73880,6 @@ executed in your Internet Explorer while displaying the email.</p>
</dates>
</vuln>
- <vuln vid="fe1976c2-5317-11e1-9e99-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>17.0.963.46</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.com/search/label/Stable%20updates">
- <p>[73478] Low CVE-2011-3953: Avoid clipboard monitoring after paste
- event. Credit to Daniel Cheng of the Chromium development
- community.</p>
- <p>[92550] Low CVE-2011-3954: Crash with excessive database usage.
- Credit to Collin Payne.</p>
- <p>[93106] High CVE-2011-3955: Crash aborting an IndexDB transaction.
- Credit to David Grogan of the Chromium development community.</p>
- <p>[103630] Low CVE-2011-3956: Incorrect handling of sandboxed origins
- inside extensions. Credit to Devdatta Akhawe, UC Berkeley.</p>
- <p>[104056] High CVE-2011-3957: Use-after-free in PDF garbage
- collection. Credit to Aki Helin of OUSPG.</p>
- <p>[105459] High CVE-2011-3958: Bad casts with column spans. Credit
- to miaubiz.</p>
- <p>[106441] High CVE-2011-3959: Buffer overflow in locale handling.
- Credit to Aki Helin of OUSPG.</p>
- <p>[108416] Medium CVE-2011-3960: Out-of-bounds read in audio
- decoding. Credit to Aki Helin of OUSPG.</p>
- <p>[108871] Critical CVE-2011-3961: Race condition after crash of
- utility process. Credit to Shawn Goertzen.</p>
- <p>[108901] Medium CVE-2011-3962: Out-of-bounds read in path clipping.
- Credit to Aki Helin of OUSPG.</p>
- <p>[109094] Medium CVE-2011-3963: Out-of-bounds read in PDF fax image
- handling. Credit to Atte Kettunen of OUSPG.</p>
- <p>[109245] Low CVE-2011-3964: URL bar confusion after drag + drop.
- Credit to Code Audit Labs of VulnHunt.com.</p>
- <p>[109664] Low CVE-2011-3965: Crash in signature check. Credit to
- Slawomir Blazek.</p>
- <p>[109716] High CVE-2011-3966: Use-after-free in stylesheet error
- handling. Credit to Aki Helin of OUSPG.</p>
- <p>[109717] Low CVE-2011-3967: Crash with unusual certificate. Credit
- to Ben Carrillo.</p>
- <p>[109743] High CVE-2011-3968: Use-after-free in CSS handling.
- Credit to Arthur Gerkis.</p>
- <p>[110112] High CVE-2011-3969: Use-after-free in SVG layout. Credit
- to Arthur Gerkis.</p>
- <p>[110277] Medium CVE-2011-3970: Out-of-bounds read in libxslt.
- Credit to Aki Helin of OUSPG.</p>
- <p>[110374] High CVE-2011-3971: Use-after-free with mousemove events.
- Credit to Arthur Gerkis.</p>
- <p>[110559] Medium CVE-2011-3972: Out-of-bounds read in shader
- translator. Credit to Google Chrome Security Team (Inferno).</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2011-3953</cvename>
- <cvename>CVE-2011-3954</cvename>
- <cvename>CVE-2011-3955</cvename>
- <cvename>CVE-2011-3956</cvename>
- <cvename>CVE-2011-3957</cvename>
- <cvename>CVE-2011-3958</cvename>
- <cvename>CVE-2011-3959</cvename>
- <cvename>CVE-2011-3960</cvename>
- <cvename>CVE-2011-3961</cvename>
- <cvename>CVE-2011-3962</cvename>
- <cvename>CVE-2011-3963</cvename>
- <cvename>CVE-2011-3964</cvename>
- <cvename>CVE-2011-3965</cvename>
- <cvename>CVE-2011-3966</cvename>
- <cvename>CVE-2011-3967</cvename>
- <cvename>CVE-2011-3968</cvename>
- <cvename>CVE-2011-3969</cvename>
- <cvename>CVE-2011-3970</cvename>
- <cvename>CVE-2011-3971</cvename>
- <cvename>CVE-2011-3972</cvename>
- <url>http://googlechromereleases.blogspot.com/search/label/Stable%20updates</url>
- </references>
- <dates>
- <discovery>2012-02-08</discovery>
- <entry>2012-02-09</entry>
- </dates>
- </vuln>
-
<vuln vid="10720fe8-51e0-11e1-91c1-00215c6a37bb">
<topic>drupal -- multiple vulnerabilities</topic>
<affects>
@@ -77446,42 +74504,6 @@ executed in your Internet Explorer while displaying the email.</p>
</dates>
</vuln>
- <vuln vid="33d73d59-4677-11e1-88cd-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>16.0.912.77</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.com/search/label/Stable%20updates">
- <p>[106484] High CVE-2011-3924: Use-after-free in DOM selections.
- Credit to Arthur Gerkis.</p>
- <p>[108461] High CVE-2011-3928: Use-after-free in DOM handling.
- Credit to wushi of team509 reported through ZDI (ZDI-CAN-1415).</p>
- <p>[108605] High CVE-2011-3927: Uninitialized value in Skia. Credit
- to miaubiz.</p>
- <p>[109556] High CVE-2011-3926: Heap-buffer-overflow in tree builder.
- Credit to Arthur Gerkis.</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2011-3924</cvename>
- <cvename>CVE-2011-3926</cvename>
- <cvename>CVE-2011-3927</cvename>
- <cvename>CVE-2011-3928</cvename>
- <url>http://googlechromereleases.blogspot.com/search/label/Stable%20updates</url>
- </references>
- <dates>
- <discovery>2012-01-23</discovery>
- <entry>2012-01-24</entry>
- </dates>
- </vuln>
-
<vuln vid="3ebb2dc8-4609-11e1-9f47-00e0815b8da8">
<topic>Wireshark -- Multiple vulnerabilities</topic>
<affects>
@@ -78061,43 +75083,6 @@ executed in your Internet Explorer while displaying the email.</p>
</dates>
</vuln>
- <vuln vid="1a1aef8e-3894-11e1-8b5c-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>16.0.912.75</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.com/search/label/Stable%20updates">
- <p>[106672] High CVE-2011-3921: Use-after-free in animation frames.
- Credit to Boris Zbarsky of Mozilla.<br/>
- [107128] High CVE-2011-3919: Heap-buffer-overflow in libxml.
- Credit to Juri Aedla.<br/>
- [108006] High CVE-2011-3922: Stack-buffer-overflow in glyph
- handling. Credit to Google Chrome Security Team (Cris
- Neckar).</p>
- <p>[107182] Critical CVE-2011-3925: Use-after-free in Safe Browsing
- navigation. Credit to Chamal de Silva.</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2011-3919</cvename>
- <cvename>CVE-2011-3921</cvename>
- <cvename>CVE-2011-3922</cvename>
- <cvename>CVE-2011-3925</cvename>
- </references>
- <dates>
- <discovery>2012-01-05</discovery>
- <entry>2012-01-06</entry>
- <modified>2012-01-23</modified>
- </dates>
- </vuln>
-
<vuln vid="0c7a3ee2-3654-11e1-b404-20cf30e32f6d">
<topic>bugzilla -- multiple vulnerabilities</topic>
<affects>
@@ -78567,79 +75552,6 @@ executed in your Internet Explorer while displaying the email.</p>
</dates>
</vuln>
- <vuln vid="68ac6266-25c3-11e1-b63a-00262d5ed8ee">
- <topic>chromium -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>chromium</name>
- <range><lt>16.0.912.63</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Google Chrome Releases reports:</p>
- <blockquote cite="http://googlechromereleases.blogspot.com/search/label/Stable%20updates">
- <p>[81753] Medium CVE-2011-3903: Out-of-bounds read in regex
- matching. Credit to David Holloway of the Chromium development
- community.<br/>
- [95465] Low CVE-2011-3905: Out-of-bounds reads in libxml. Credit to
- Google Chrome Security Team (Inferno).<br/>
- [98809] Medium CVE-2011-3906: Out-of-bounds read in PDF parser.
- Credit to Aki Helin of OUSPG.<br/>
- [99016] High CVE-2011-3907: URL bar spoofing with view-source.
- Credit to Mitja Kolsek of ACROS Security.<br/>
- [100863] Low CVE-2011-3908: Out-of-bounds read in SVG parsing.
- Credit to Aki Helin of OUSPG.<br/>
- [101010] Medium CVE-2011-3909: [64-bit only] Memory corruption in
- CSS property array. Credit to Google Chrome Security Team
- (scarybeasts) and Chu.<br/>
- [101494] Medium CVE-2011-3910: Out-of-bounds read in YUV video
- frame handling. Credit to Google Chrome Security Team (Cris
- Neckar).<br/>
- [101779] Medium CVE-2011-3911: Out-of-bounds read in PDF. Credit to
- Google Chrome Security Team (scarybeasts) and Robert Swiecki of
- the Google Security Team.<br/>
- [102359] High CVE-2011-3912: Use-after-free in SVG filters. Credit
- to Arthur Gerkis.<br/>
- [103921] High CVE-2011-3913: Use-after-free in Range handling.
- Credit to Arthur Gerkis.<br/>
- [104011] High CVE-2011-3914: Out-of-bounds write in v8 i18n
- handling. Credit to Slawomir Blazek.<br/>
- [104529] High CVE-2011-3915: Buffer overflow in PDF font handling.
- Credit to Atte Kettunen of OUSPG.<br/>
- [104959] Medium CVE-2011-3916: Out-of-bounds reads in PDF cross
- references. Credit to Atte Kettunen of OUSPG.<br/>
- [105162] Medium CVE-2011-3917: Stack-buffer-overflow in FileWatcher.
- Credit to Google Chrome Security Team (Marty Barbella).<br/>
- [107258] High CVE-2011-3904: Use-after-free in bidi handling.
- Credit to Google Chrome Security Team (Inferno) and miaubiz.</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2011-3903</cvename>
- <cvename>CVE-2011-3904</cvename>
- <cvename>CVE-2011-3905</cvename>
- <cvename>CVE-2011-3906</cvename>
- <cvename>CVE-2011-3907</cvename>
- <cvename>CVE-2011-3908</cvename>
- <cvename>CVE-2011-3909</cvename>
- <cvename>CVE-2011-3910</cvename>
- <cvename>CVE-2011-3911</cvename>
- <cvename>CVE-2011-3912</cvename>
- <cvename>CVE-2011-3913</cvename>
- <cvename>CVE-2011-3914</cvename>
- <cvename>CVE-2011-3915</cvename>
- <cvename>CVE-2011-3916</cvename>
- <cvename>CVE-2011-3917</cvename>
- <url>http://googlechromereleases.blogspot.com/search/label/Stable%20updates</url>
- </references>
- <dates>
- <discovery>2011-12-13</discovery>
- <entry>2011-12-13</entry>
- </dates>
- </vuln>
-
<vuln vid="bbd5f486-24f1-11e1-95bc-080027ef73ec">
<topic>PuTTY -- Password vulnerability</topic>
<affects>