CVE-2015-1263

The Spellcheck API implementation in Google Chrome before 43.0.2357.65 does not use an HTTPS session for downloading a Hunspell dictionary, which allows man-in-the-middle attackers to deliver incorrect spelling suggestions or possibly have unspecified other impact via a crafted file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

07 Nov 2023, 02:24

Type Values Removed Values Added
References (SECTRACK) http://www.securitytracker.com/id/1032375 - () http://www.securitytracker.com/id/1032375 -
References (CONFIRM) https://codereview.chromium.org/1056103005 - () https://codereview.chromium.org/1056103005 -
References (SUSE) http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html - () http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html -
References (GENTOO) https://security.gentoo.org/glsa/201506-04 - () https://security.gentoo.org/glsa/201506-04 -
References (SUSE) http://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html - () http://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html -
References (CONFIRM) http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html - Patch, Vendor Advisory () http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html -
References (CONFIRM) https://code.google.com/p/chromium/issues/detail?id=479162 - () https://code.google.com/p/chromium/issues/detail?id=479162 -
References (DEBIAN) http://www.debian.org/security/2015/dsa-3267 - () http://www.debian.org/security/2015/dsa-3267 -
References (BID) http://www.securityfocus.com/bid/74723 - () http://www.securityfocus.com/bid/74723 -

Information

Published : 2015-05-20 10:59

Updated : 2023-12-10 11:46


NVD link : CVE-2015-1263

Mitre link : CVE-2015-1263

CVE.ORG link : CVE-2015-1263


JSON object : View

Products Affected

debian

  • debian_linux

google

  • chrome
CWE
CWE-17

DEPRECATED: Code