CVE-2015-1288

CWE-177 documents6 sources
Severity
6.8MEDIUM
EPSS
0.8%
top 25.16%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 23
Latest updateMay 14

Description

The Spellcheck API implementation in Google Chrome before 44.0.2403.89 does not use an HTTPS session for downloading a Hunspell dictionary, which allows man-in-the-middle attackers to deliver incorrect spelling suggestions or possibly have unspecified other impact via a crafted file, a related issue to CVE-2015-1263.

CVSS vector

AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4

Affected Packages5 packages

NVDgoogle/chrome43.0.2357.134
Ubuntuchromium-browser< 44.0.2403.89-0ubuntu0.14.04.1.1095
NVDopensuse/opensuse13.1, 13.2+1

Also affects: Debian Linux 8.0, Enterprise Linux 6.0, 6.7z

🔴Vulnerability Details

3
GHSA
GHSA-gg9q-x7v7-56vv: The Spellcheck API implementation in Google Chrome before 442022-05-14
OSV
CVE-2015-1288: The Spellcheck API implementation in Google Chrome before 442015-07-23
CVEList
CVE-2015-1288: The Spellcheck API implementation in Google Chrome before 442015-07-23

📋Vendor Advisories

1
Red Hat
chromium-browser: Spell checking dictionaries fetched over HTTP in unspecified2015-07-21

💬Community

2
Bugzilla
CVE-2015-8540 libpng: underflow read in png_check_keyword()2015-12-14
Bugzilla
CVE-2015-1288 chromium-browser: Spell checking dictionaries fetched over HTTP in unspecified2015-07-22
CVE-2015-1288 (MEDIUM CVSS 6.8) | The Spellcheck API implementation i | cvebase.io