mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
158 lines
5.2 KiB
JSON
158 lines
5.2 KiB
JSON
{
|
|
"id": "CVE-2015-6783",
|
|
"sourceIdentifier": "chrome-cve-admin@google.com",
|
|
"published": "2015-12-06T01:59:20.527",
|
|
"lastModified": "2024-11-21T02:35:39.510",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The FindStartOffsetOfFileInZipFile function in crazy_linker_zip.cpp in crazy_linker (aka Crazy Linker) in Android 5.x and 6.x, as used in Google Chrome before 47.0.2526.73, improperly searches for an EOCD record, which allows attackers to bypass a signature-validation requirement via a crafted ZIP archive."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "La funci\u00f3n FindStartOffsetOfFileInZipFile en crazy_linker_zip.cpp en crazy_linker (tambi\u00e9n conocida como Crazy Linker) en Android 5.x y 6.x, como se utiliza en Google Chrome en versiones anteriores a 47.0.2526.73, realiza b\u00fasquedas de manera incorrecta para un registro EOCD, lo que permite a atacantes eludir un requerimiento de validaci\u00f3n de firma a trav\u00e9s de un archivo ZIP manipulado."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"baseScore": 4.3,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-20"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7C4E6353-B77A-464F-B7DE-932704003B33"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E70C6D8D-C9C3-4D92-8DFC-71F59E068295"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "46.0.2490.86",
|
|
"matchCriteriaId": "C12CC8E6-3341-4505-99CF-384840C20815"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html",
|
|
"source": "chrome-cve-admin@google.com"
|
|
},
|
|
{
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html",
|
|
"source": "chrome-cve-admin@google.com"
|
|
},
|
|
{
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html",
|
|
"source": "chrome-cve-admin@google.com"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/78416",
|
|
"source": "chrome-cve-admin@google.com"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1034298",
|
|
"source": "chrome-cve-admin@google.com"
|
|
},
|
|
{
|
|
"url": "https://chromium.googlesource.com/chromium/src.git/+/d9e316238aee59acf665d80b544cf4e1edfd3349",
|
|
"source": "chrome-cve-admin@google.com"
|
|
},
|
|
{
|
|
"url": "https://code.google.com/p/chromium/issues/detail?id=537205",
|
|
"source": "chrome-cve-admin@google.com"
|
|
},
|
|
{
|
|
"url": "https://security.gentoo.org/glsa/201603-09",
|
|
"source": "chrome-cve-admin@google.com"
|
|
},
|
|
{
|
|
"url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/78416",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1034298",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://chromium.googlesource.com/chromium/src.git/+/d9e316238aee59acf665d80b544cf4e1edfd3349",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://code.google.com/p/chromium/issues/detail?id=537205",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://security.gentoo.org/glsa/201603-09",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |