CVE-2015-1263
Severity CVSS v4.0:
Pending analysis
Type:
CWE-17
Code Errors
Publication date:
20/05/2015
Last modified:
12/04/2025
Description
The Spellcheck API implementation in Google Chrome before 43.0.2357.65 does not use an HTTPS session for downloading a Hunspell dictionary, which allows man-in-the-middle attackers to deliver incorrect spelling suggestions or possibly have unspecified other impact via a crafted file.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* | 42.0.2311.152 (including) | |
| cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html
- http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html
- http://www.debian.org/security/2015/dsa-3267
- http://www.securityfocus.com/bid/74723
- http://www.securitytracker.com/id/1032375
- https://code.google.com/p/chromium/issues/detail?id=479162
- https://codereview.chromium.org/1056103005
- https://security.gentoo.org/glsa/201506-04
- http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html
- http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html
- http://www.debian.org/security/2015/dsa-3267
- http://www.securityfocus.com/bid/74723
- http://www.securitytracker.com/id/1032375
- https://code.google.com/p/chromium/issues/detail?id=479162
- https://codereview.chromium.org/1056103005
- https://security.gentoo.org/glsa/201506-04



