Vulnerability Details : CVE-2015-1263
The Spellcheck API implementation in Google Chrome before 43.0.2357.65 does not use an HTTPS session for downloading a Hunspell dictionary, which allows man-in-the-middle attackers to deliver incorrect spelling suggestions or possibly have unspecified other impact via a crafted file.
Products affected by CVE-2015-1263
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-1263
0.23%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 61 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-1263
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2015-1263
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-1263
-
http://www.securityfocus.com/bid/74723
Google Chrome Prior to 43.0.2357.65 Multiple Security Vulnerabilities
-
http://www.securitytracker.com/id/1032375
Google Chrome Multiple Bugs Let Remote Users Execute Arbitrary Code, Bypass Same-Origin Restrictions, and Spoof URLs - SecurityTracker
-
http://www.debian.org/security/2015/dsa-3267
Debian -- Security Information -- DSA-3267-1 chromium-browser
-
https://codereview.chromium.org/1056103005
Issue 1056103005: [Spellcheck] Switch to https download - Code Review
-
https://code.google.com/p/chromium/issues/detail?id=479162
479162 - Security: spell checking dictionaries are fetched over HTTP, and large responses lead to a crash - chromium - Monorail
-
http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html
Chrome Releases: Stable Channel UpdatePatch;Vendor Advisory
-
http://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html
openSUSE-SU-2015:1877-1: moderate: Security update for Chromium
-
https://security.gentoo.org/glsa/201506-04
Chromium: Multiple vulnerabilities (GLSA 201506-04) — Gentoo security
-
http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html
Object not found!
Jump to