ID

VAR-202011-0444


CVE

CVE-2020-15969


TITLE

Debian Security Advisory 4778-1

Trust: 0.1

sources: PACKETSTORM: 168916

DESCRIPTION

Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Google Chrome is a web browser developed by Google (Google). Chrome has security holes. For the stable distribution (buster), these problems have been fixed in version 78.4.0esr-1~deb10u2. We recommend that you upgrade your firefox-esr packages. Description: Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 (CVE-2020-15683) * chromium-browser: Use after free in WebRTC (CVE-2020-15969) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bugs fixed (https://bugzilla.redhat.com/): 1885885 - CVE-2020-15969 chromium-browser: Use after free in WebRTC 1889932 - CVE-2020-15683 Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 6. 8.0) - aarch64, ppc64le, s390x, x86_64 3. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Critical: chromium-browser security update Advisory ID: RHSA-2020:4235-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://access.redhat.com/errata/RHSA-2020:4235 Issue date: 2020-10-13 CVE Names: CVE-2020-6557 CVE-2020-15967 CVE-2020-15968 CVE-2020-15969 CVE-2020-15970 CVE-2020-15971 CVE-2020-15972 CVE-2020-15973 CVE-2020-15974 CVE-2020-15975 CVE-2020-15976 CVE-2020-15977 CVE-2020-15978 CVE-2020-15979 CVE-2020-15980 CVE-2020-15981 CVE-2020-15982 CVE-2020-15983 CVE-2020-15984 CVE-2020-15985 CVE-2020-15986 CVE-2020-15987 CVE-2020-15988 CVE-2020-15989 CVE-2020-15990 CVE-2020-15991 CVE-2020-15992 ==================================================================== 1. Summary: An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, i686, x86_64 Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - i686, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, i686, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, i686, x86_64 3. Description: Chromium is an open-source web browser, powered by WebKit (Blink). This update upgrades Chromium to version 86.0.4240.75. Security Fix(es): * chromium-browser: Use after free in payments (CVE-2020-15967) * chromium-browser: Use after free in Blink (CVE-2020-15968) * chromium-browser: Use after free in WebRTC (CVE-2020-15969) * chromium-browser: Use after free in NFC (CVE-2020-15970) * chromium-browser: Use after free in printing (CVE-2020-15971) * chromium-browser: Use after free in audio (CVE-2020-15972) * chromium-browser: Use after free in autofill (CVE-2020-15990) * chromium-browser: Use after free in password manager (CVE-2020-15991) * chromium-browser: Inappropriate implementation in networking (CVE-2020-6557) * chromium-browser: Insufficient policy enforcement in extensions (CVE-2020-15973) * chromium-browser: Integer overflow in Blink (CVE-2020-15974) * chromium-browser: Integer overflow in SwiftShader (CVE-2020-15975) * chromium-browser: Use after free in WebXR (CVE-2020-15976) * chromium-browser: Insufficient data validation in dialogs (CVE-2020-15977) * chromium-browser: Insufficient data validation in navigation (CVE-2020-15978) * chromium-browser: Inappropriate implementation in V8 (CVE-2020-15979) * chromium-browser: Insufficient policy enforcement in Intents (CVE-2020-15980) * chromium-browser: Out of bounds read in audio (CVE-2020-15981) * chromium-browser: Side-channel information leakage in cache (CVE-2020-15982) * chromium-browser: Insufficient data validation in webUI (CVE-2020-15983) * chromium-browser: Insufficient policy enforcement in Omnibox (CVE-2020-15984) * chromium-browser: Inappropriate implementation in Blink (CVE-2020-15985) * chromium-browser: Integer overflow in media (CVE-2020-15986) * chromium-browser: Use after free in WebRTC (CVE-2020-15987) * chromium-browser: Insufficient policy enforcement in networking (CVE-2020-15992) * chromium-browser: Insufficient policy enforcement in downloads (CVE-2020-15988) * chromium-browser: Uninitialized use in PDFium (CVE-2020-15989) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1885883 - CVE-2020-15967 chromium-browser: Use after free in payments 1885884 - CVE-2020-15968 chromium-browser: Use after free in Blink 1885885 - CVE-2020-15969 chromium-browser: Use after free in WebRTC 1885886 - CVE-2020-15970 chromium-browser: Use after free in NFC 1885887 - CVE-2020-15971 chromium-browser: Use after free in printing 1885888 - CVE-2020-15972 chromium-browser: Use after free in audio 1885889 - CVE-2020-15990 chromium-browser: Use after free in autofill 1885890 - CVE-2020-15991 chromium-browser: Use after free in password manager 1885891 - CVE-2020-15973 chromium-browser: Insufficient policy enforcement in extensions 1885892 - CVE-2020-15974 chromium-browser: Integer overflow in Blink 1885893 - CVE-2020-15975 chromium-browser: Integer overflow in SwiftShader 1885894 - CVE-2020-15976 chromium-browser: Use after free in WebXR 1885896 - CVE-2020-6557 chromium-browser: Inappropriate implementation in networking 1885897 - CVE-2020-15977 chromium-browser: Insufficient data validation in dialogs 1885899 - CVE-2020-15978 chromium-browser: Insufficient data validation in navigation 1885901 - CVE-2020-15979 chromium-browser: Inappropriate implementation in V8 1885902 - CVE-2020-15980 chromium-browser: Insufficient policy enforcement in Intents 1885903 - CVE-2020-15981 chromium-browser: Out of bounds read in audio 1885904 - CVE-2020-15982 chromium-browser: Side-channel information leakage in cache 1885905 - CVE-2020-15983 chromium-browser: Insufficient data validation in webUI 1885906 - CVE-2020-15984 chromium-browser: Insufficient policy enforcement in Omnibox 1885907 - CVE-2020-15985 chromium-browser: Inappropriate implementation in Blink 1885908 - CVE-2020-15986 chromium-browser: Integer overflow in media 1885909 - CVE-2020-15987 chromium-browser: Use after free in WebRTC 1885910 - CVE-2020-15992 chromium-browser: Insufficient policy enforcement in networking 1885911 - CVE-2020-15988 chromium-browser: Insufficient policy enforcement in downloads 1885912 - CVE-2020-15989 chromium-browser: Uninitialized use in PDFium 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: chromium-browser-86.0.4240.75-1.el6_10.i686.rpm chromium-browser-debuginfo-86.0.4240.75-1.el6_10.i686.rpm i686: chromium-browser-86.0.4240.75-1.el6_10.i686.rpm chromium-browser-debuginfo-86.0.4240.75-1.el6_10.i686.rpm x86_64: chromium-browser-86.0.4240.75-1.el6_10.x86_64.rpm chromium-browser-debuginfo-86.0.4240.75-1.el6_10.x86_64.rpm Red Hat Enterprise Linux HPC Node Supplementary (v. 6): i686: chromium-browser-86.0.4240.75-1.el6_10.i686.rpm chromium-browser-debuginfo-86.0.4240.75-1.el6_10.i686.rpm x86_64: chromium-browser-86.0.4240.75-1.el6_10.x86_64.rpm chromium-browser-debuginfo-86.0.4240.75-1.el6_10.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: chromium-browser-86.0.4240.75-1.el6_10.i686.rpm chromium-browser-debuginfo-86.0.4240.75-1.el6_10.i686.rpm i686: chromium-browser-86.0.4240.75-1.el6_10.i686.rpm chromium-browser-debuginfo-86.0.4240.75-1.el6_10.i686.rpm x86_64: chromium-browser-86.0.4240.75-1.el6_10.x86_64.rpm chromium-browser-debuginfo-86.0.4240.75-1.el6_10.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: chromium-browser-86.0.4240.75-1.el6_10.i686.rpm chromium-browser-debuginfo-86.0.4240.75-1.el6_10.i686.rpm i686: chromium-browser-86.0.4240.75-1.el6_10.i686.rpm chromium-browser-debuginfo-86.0.4240.75-1.el6_10.i686.rpm x86_64: chromium-browser-86.0.4240.75-1.el6_10.x86_64.rpm chromium-browser-debuginfo-86.0.4240.75-1.el6_10.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2020-6557 https://access.redhat.com/security/cve/CVE-2020-15967 https://access.redhat.com/security/cve/CVE-2020-15968 https://access.redhat.com/security/cve/CVE-2020-15969 https://access.redhat.com/security/cve/CVE-2020-15970 https://access.redhat.com/security/cve/CVE-2020-15971 https://access.redhat.com/security/cve/CVE-2020-15972 https://access.redhat.com/security/cve/CVE-2020-15973 https://access.redhat.com/security/cve/CVE-2020-15974 https://access.redhat.com/security/cve/CVE-2020-15975 https://access.redhat.com/security/cve/CVE-2020-15976 https://access.redhat.com/security/cve/CVE-2020-15977 https://access.redhat.com/security/cve/CVE-2020-15978 https://access.redhat.com/security/cve/CVE-2020-15979 https://access.redhat.com/security/cve/CVE-2020-15980 https://access.redhat.com/security/cve/CVE-2020-15981 https://access.redhat.com/security/cve/CVE-2020-15982 https://access.redhat.com/security/cve/CVE-2020-15983 https://access.redhat.com/security/cve/CVE-2020-15984 https://access.redhat.com/security/cve/CVE-2020-15985 https://access.redhat.com/security/cve/CVE-2020-15986 https://access.redhat.com/security/cve/CVE-2020-15987 https://access.redhat.com/security/cve/CVE-2020-15988 https://access.redhat.com/security/cve/CVE-2020-15989 https://access.redhat.com/security/cve/CVE-2020-15990 https://access.redhat.com/security/cve/CVE-2020-15991 https://access.redhat.com/security/cve/CVE-2020-15992 https://access.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBX4VjutzjgjWX9erEAQiBog/8D4EAnQmD6yqmkt9gVgCzoz1v/uOgnTHv lghXbEidNiTmb8DlvwZKbqA/2wz/kz+vW5v0bXZNjngYnbZsev252qT9L2LQ99UA +uirPF/zddn+T0tZ5PQHWBYpWgjF8XRQu7lJo7QHbB7GEMXJJ4SBN3erYqOjKKUo 3DakSX4DH1VIrSY+6kJ6fx26IwD7tWSBlsRklatxX1NkhrBg0Ha7lWjHhRV6WLjz CZFxwFNJJ6bGsf8eIaaps8Ab21m87BbwOyGt2aaFT9sC5noR4mTTjBGB4lmbslB3 Vcl7PSxqs/AzDK6fAqLOJ7nqZJpiQq9ii5Z3oBbiG3J8BO6sgY7cG+D2bVWD+3eV 9L13REiW/iPXqGbpgPre8WhAwg3wdNYDiaYO6pIC7N1a/btxIdq5Gjb31dWiFdyq XOtdEO9CieZGYNEoKf+wfe03SXCEvJz0EZZVwcFhqd8cF8xhUa2MNjpKDHryUjXg 8rJGA+5uS/UJHwToK++Q4+0Ze/jIxSuKRA7h9UhdACksgeMmFUdyfuLVfx1RdgEX TRtO8kHaGBHz60SY4Kd6xkZks1+FqotFF2zvs4gq8XvPFbHvPgt36qbtxOHYj1BF pl+WqaRsDOp6VmbMLAEJwZnRsR0dNN62MCgxB5sNRb5l7sSYOqYClV2zR47cEgFJ ObQiF6iTAHk=AItV -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . 8.0) - ppc64le, x86_64 3. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2020-12-14-1 iOS 14.3 and iPadOS 14.3 iOS 14.3 and iPadOS 14.3 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT212003. App Store Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation) Impact: An enterprise application installation prompt may display the wrong domain Description: A logic issue was addressed with improved state management. CVE-2020-29613: Ryan Pickren (ryanpickren.com) CoreAudio Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation) Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2020-27948: JunDong Xie of Ant Security Light-Year Lab FontParser Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation) Impact: Processing a maliciously crafted font may result in the disclosure of process memory Description: An information disclosure issue was addressed with improved state management. CVE-2020-27946: Mateusz Jurczyk of Google Project Zero FontParser Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation) Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: A memory corruption issue existed in the processing of font files. This issue was addressed with improved input validation. CVE-2020-27943: Mateusz Jurczyk of Google Project Zero CVE-2020-27944: Mateusz Jurczyk of Google Project Zero ImageIO Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation) Impact: Processing a maliciously crafted image may lead to heap corruption Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-29617: XingWei Lin of Ant Security Light-Year Lab CVE-2020-29619: XingWei Lin of Ant Security Light-Year Lab ImageIO Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation) Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-29618: XingWei Lin of Ant Security Light-Year Lab ImageIO Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation) Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2020-29611: Ivan Fratric of Google Project Zero Security Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation) Impact: Unauthorized code execution may lead to an authentication policy violation Description: This issue was addressed with improved checks. CVE-2020-27951: Apple WebRTC Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation) Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A use after free issue was addressed with improved memory management. CVE-2020-15969: an anonymous researcher Installation note: This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from https://www.apple.com/itunes/ iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device. The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device. To check that the iPhone, iPod touch, or iPad has been updated: * Navigate to Settings * Select General * Select About. 8.2) - aarch64, ppc64le, x86_64 3. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202010-08 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Mozilla Firefox, Mozilla Thunderbird: Multiple vulnerabilities Date: October 28, 2020 Bugs: #750446 ID: 202010-08 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Mozilla Firefox and Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 www-client/firefox < 82.0 >= 78.4.0:0/esr78 > = 82.0 2 www-client/firefox-bin < 82.0 >= 78.4.0:0/esr78 > = 82.0 3 mail-client/thunderbird < 78.4.0 >= 78.4.0 4 mail-client/thunderbird-bin < 78.4.0 >= 78.4.0 ------------------------------------------------------------------- 4 affected packages Description =========== Multiple vulnerabilities have been discovered in Mozilla Firefox and Mozilla Thunderbird. Please review the CVE identifiers referenced below for details. Impact ====== Please review the referenced CVE identifiers for details. Workaround ========== There is no known workaround at this time. Resolution ========== All Mozilla Firefox users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/firefox-82.0" All Mozilla Firefox (bin) users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-82.0" All Mozilla Firefox ESR users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=www-client/firefox-78.4.0:0/esr78" All Mozilla Firefox ESR (bin) users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=www-client/firefox-bin-78.4.0:0/esr78" All Mozilla Thunderbird users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-.4.0" All Mozilla Thunderbird (bin) users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=mail-client/thunderbird-bin-78.4.0" References ========== [ 1 ] CVE-2020-15683 https://nvd.nist.gov/vuln/detail/CVE-2020-15683 [ 2 ] CVE-2020-15969 https://nvd.nist.gov/vuln/detail/CVE-2020-15969 [ 3 ] MFSA-2020-45 https://www.mozilla.org/en-US/security/advisories/mfsa2020-45/ [ 4 ] MFSA-2020-46 https://www.mozilla.org/en-US/security/advisories/mfsa2020-46/ [ 5 ] MFSA-2020-47 https://www.mozilla.org/en-US/security/advisories/mfsa2020-47/ Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202010-08 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2020 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5

Trust: 1.89

sources: NVD: CVE-2020-15969 // VULHUB: VHN-169000 // VULMON: CVE-2020-15969 // PACKETSTORM: 168916 // PACKETSTORM: 159910 // PACKETSTORM: 159679 // PACKETSTORM: 160542 // PACKETSTORM: 159536 // PACKETSTORM: 159907 // PACKETSTORM: 160536 // PACKETSTORM: 159906 // PACKETSTORM: 159746

AFFECTED PRODUCTS

vendor:fedoraprojectmodel:fedorascope:eqversion:33

Trust: 1.0

vendor:applemodel:watchosscope:ltversion:7.2

Trust: 1.0

vendor:opensusemodel:backports slescope:eqversion:15.0

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:31

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:applemodel:macosscope:ltversion:11.1

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:32

Trust: 1.0

vendor:applemodel:tvosscope:ltversion:14.3

Trust: 1.0

vendor:applemodel:ipadosscope:ltversion:14.3

Trust: 1.0

vendor:googlemodel:chromescope:ltversion:86.0.4240.75

Trust: 1.0

vendor:applemodel:safariscope:ltversion:14.0.2

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:14.3

Trust: 1.0

sources: NVD: CVE-2020-15969

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-15969
value: HIGH

Trust: 1.0

VULHUB: VHN-169000
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-15969
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-169000
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-15969
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-169000 // NVD: CVE-2020-15969

PROBLEMTYPE DATA

problemtype:CWE-416

Trust: 1.1

problemtype:CWE-787

Trust: 1.1

sources: VULHUB: VHN-169000 // NVD: CVE-2020-15969

TYPE

arbitrary

Trust: 0.2

sources: PACKETSTORM: 168916 // PACKETSTORM: 159746

PATCH

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2020-15969 log

Trust: 0.1

title:Red Hat: Critical: chromium-browser security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20204235 - Security Advisory

Trust: 0.1

title:Arch Linux Advisories: [ASA-202010-1] chromium: multiple issuesurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-202010-1

Trust: 0.1

title:Google Chrome: Stable Channel Update for Desktopurl:https://vulmon.com/vendoradvisory?qidtp=chrome_releases&qid=19864a55e2d45827624ffa261a77ce92

Trust: 0.1

title:Threatposturl:https://threatpost.com/google-chrome-86-critical-payments-bug-password-check/159938/

Trust: 0.1

sources: VULMON: CVE-2020-15969

EXTERNAL IDS

db:NVDid:CVE-2020-15969

Trust: 2.1

db:PACKETSTORMid:159910

Trust: 0.2

db:PACKETSTORMid:159679

Trust: 0.2

db:PACKETSTORMid:159906

Trust: 0.2

db:PACKETSTORMid:160536

Trust: 0.2

db:PACKETSTORMid:159536

Trust: 0.2

db:PACKETSTORMid:160542

Trust: 0.2

db:PACKETSTORMid:159907

Trust: 0.2

db:PACKETSTORMid:159746

Trust: 0.2

db:PACKETSTORMid:159893

Trust: 0.1

db:PACKETSTORMid:159683

Trust: 0.1

db:PACKETSTORMid:159909

Trust: 0.1

db:PACKETSTORMid:160538

Trust: 0.1

db:PACKETSTORMid:160543

Trust: 0.1

db:PACKETSTORMid:161131

Trust: 0.1

db:PACKETSTORMid:159695

Trust: 0.1

db:PACKETSTORMid:159587

Trust: 0.1

db:PACKETSTORMid:160540

Trust: 0.1

db:PACKETSTORMid:159888

Trust: 0.1

db:PACKETSTORMid:159686

Trust: 0.1

db:PACKETSTORMid:159682

Trust: 0.1

db:VULHUBid:VHN-169000

Trust: 0.1

db:VULMONid:CVE-2020-15969

Trust: 0.1

db:PACKETSTORMid:168916

Trust: 0.1

sources: VULHUB: VHN-169000 // VULMON: CVE-2020-15969 // PACKETSTORM: 168916 // PACKETSTORM: 159910 // PACKETSTORM: 159679 // PACKETSTORM: 160542 // PACKETSTORM: 159536 // PACKETSTORM: 159907 // PACKETSTORM: 160536 // PACKETSTORM: 159906 // PACKETSTORM: 159746 // NVD: CVE-2020-15969

REFERENCES

url:https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html

Trust: 1.2

url:https://crbug.com/1124659

Trust: 1.2

url:https://support.apple.com/kb/ht212003

Trust: 1.1

url:https://support.apple.com/kb/ht212005

Trust: 1.1

url:https://support.apple.com/kb/ht212007

Trust: 1.1

url:https://support.apple.com/kb/ht212009

Trust: 1.1

url:https://support.apple.com/kb/ht212011

Trust: 1.1

url:https://www.debian.org/security/2021/dsa-4824

Trust: 1.1

url:http://seclists.org/fulldisclosure/2020/dec/24

Trust: 1.1

url:http://seclists.org/fulldisclosure/2020/dec/26

Trust: 1.1

url:http://seclists.org/fulldisclosure/2020/dec/27

Trust: 1.1

url:http://seclists.org/fulldisclosure/2020/dec/29

Trust: 1.1

url:http://seclists.org/fulldisclosure/2020/dec/30

Trust: 1.1

url:https://security.gentoo.org/glsa/202101-30

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4gwcwnhttyoh6hsfuxpgpbb6j6jyzhze/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/24qfl4c3azkmfvl7lvsymu2dne5vvugs/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/sc3u3h6aisvzb5plzllnf4hmq4uffl7m/

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2020-15969

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2020-15683

Trust: 0.6

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2020-15969

Trust: 0.5

url:https://bugzilla.redhat.com/):

Trust: 0.5

url:https://access.redhat.com/security/team/key/

Trust: 0.5

url:https://access.redhat.com/articles/11258

Trust: 0.5

url:https://access.redhat.com/security/team/contact/

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2020-15683

Trust: 0.4

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-27948

Trust: 0.2

url:https://www.apple.com/support/security/pgp/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-27943

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-27946

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-29618

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-29617

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-29611

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-29619

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-27944

Trust: 0.2

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4gwcwnhttyoh6hsfuxpgpbb6j6jyzhze/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/sc3u3h6aisvzb5plzllnf4hmq4uffl7m/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/24qfl4c3azkmfvl7lvsymu2dne5vvugs/

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/189465

Trust: 0.1

url:https://threatpost.com/google-chrome-86-critical-payments-bug-password-check/159938/

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://security-tracker.debian.org/tracker/firefox-esr

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:4947

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:4311

Trust: 0.1

url:https://support.apple.com/ht212005.

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:4235

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15968

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15972

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15990

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15974

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15971

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15968

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15984

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15986

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15972

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15973

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15977

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15987

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15979

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15989

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15988

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15978

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15989

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15983

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15991

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15971

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15987

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15970

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6557

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15973

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15975

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15978

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15977

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15981

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15988

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15985

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15984

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15992

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15970

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15980

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15975

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15980

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15982

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15967

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15974

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15985

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15976

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15982

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15967

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15992

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15981

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15983

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15976

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15991

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15990

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15979

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15986

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:4944

Trust: 0.1

url:https://www.apple.com/itunes/

Trust: 0.1

url:https://support.apple.com/ht212003.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27951

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-29613

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:4948

Trust: 0.1

url:https://www.mozilla.org/en-us/security/advisories/mfsa2020-47/

Trust: 0.1

url:https://www.mozilla.org/en-us/security/advisories/mfsa2020-46/

Trust: 0.1

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://security.gentoo.org/glsa/202010-08

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://www.mozilla.org/en-us/security/advisories/mfsa2020-45/

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

sources: VULHUB: VHN-169000 // VULMON: CVE-2020-15969 // PACKETSTORM: 168916 // PACKETSTORM: 159910 // PACKETSTORM: 159679 // PACKETSTORM: 160542 // PACKETSTORM: 159536 // PACKETSTORM: 159907 // PACKETSTORM: 160536 // PACKETSTORM: 159906 // PACKETSTORM: 159746 // NVD: CVE-2020-15969

CREDITS

Red Hat

Trust: 0.5

sources: PACKETSTORM: 159910 // PACKETSTORM: 159679 // PACKETSTORM: 159536 // PACKETSTORM: 159907 // PACKETSTORM: 159906

SOURCES

db:VULHUBid:VHN-169000
db:VULMONid:CVE-2020-15969
db:PACKETSTORMid:168916
db:PACKETSTORMid:159910
db:PACKETSTORMid:159679
db:PACKETSTORMid:160542
db:PACKETSTORMid:159536
db:PACKETSTORMid:159907
db:PACKETSTORMid:160536
db:PACKETSTORMid:159906
db:PACKETSTORMid:159746
db:NVDid:CVE-2020-15969

LAST UPDATE DATE

2025-11-23T21:23:53.293000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-169000date:2021-07-21T00:00:00
db:VULMONid:CVE-2020-15969date:2021-01-30T00:00:00
db:NVDid:CVE-2020-15969date:2024-11-21T05:06:34.250

SOURCES RELEASE DATE

db:VULHUBid:VHN-169000date:2020-11-03T00:00:00
db:VULMONid:CVE-2020-15969date:2020-11-03T00:00:00
db:PACKETSTORMid:168916date:2020-10-28T19:12:00
db:PACKETSTORMid:159910date:2020-11-05T17:01:22
db:PACKETSTORMid:159679date:2020-10-22T17:19:42
db:PACKETSTORMid:160542date:2020-12-16T18:02:43
db:PACKETSTORMid:159536date:2020-10-13T20:24:04
db:PACKETSTORMid:159907date:2020-11-05T17:00:57
db:PACKETSTORMid:160536date:2020-12-16T17:56:45
db:PACKETSTORMid:159906date:2020-11-05T17:00:50
db:PACKETSTORMid:159746date:2020-10-28T16:36:31
db:NVDid:CVE-2020-15969date:2020-11-03T03:15:12.790