ID CVE-2014-7926
Summary The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN revision 292944, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a zero-length quantifier.
References
Vulnerable Configurations
  • Red Hat Enterprise Linux Desktop Supplementary 6.0 (v. 6)
    cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0
  • Red Hat Enterprise Linux Server Supplementary 6.0 (v. 6)
    cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0
  • cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.6.z
    cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.6.z
  • Red Hat Enterprise Linux Workstation Supplementary 6.0 (v. 6)
    cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0
  • OpenSUSE 13.1
    cpe:2.3:o:opensuse:opensuse:13.1
  • OpenSUSE 13.2
    cpe:2.3:o:opensuse:opensuse:13.2
  • Google Chrome 40.0.2214.85
    cpe:2.3:a:google:chrome:40.0.2214.85
  • cpe:2.3:o:oracle:communications_messaging_server:7.0.5
    cpe:2.3:o:oracle:communications_messaging_server:7.0.5
  • cpe:2.3:o:oracle:communications_messaging_server:8.0
    cpe:2.3:o:oracle:communications_messaging_server:8.0
  • ICU Project International Components for Unicode for C/C++ 1.4
    cpe:2.3:a:icu-project:international_components_for_unicode:1.4:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 1.4.1
    cpe:2.3:a:icu-project:international_components_for_unicode:1.4.1:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 1.4.1.1
    cpe:2.3:a:icu-project:international_components_for_unicode:1.4.1.1:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 1.4.1.2
    cpe:2.3:a:icu-project:international_components_for_unicode:1.4.1.2:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 1.4.2
    cpe:2.3:a:icu-project:international_components_for_unicode:1.4.2:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 1.5
    cpe:2.3:a:icu-project:international_components_for_unicode:1.5:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 1.6
    cpe:2.3:a:icu-project:international_components_for_unicode:1.6:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 1.7
    cpe:2.3:a:icu-project:international_components_for_unicode:1.7:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 1.8
    cpe:2.3:a:icu-project:international_components_for_unicode:1.8:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 1.8.1
    cpe:2.3:a:icu-project:international_components_for_unicode:1.8.1:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 2.0
    cpe:2.3:a:icu-project:international_components_for_unicode:2.0:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 2.0.1
    cpe:2.3:a:icu-project:international_components_for_unicode:2.0.1:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 2.0.2
    cpe:2.3:a:icu-project:international_components_for_unicode:2.0.2:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 2.1
    cpe:2.3:a:icu-project:international_components_for_unicode:2.1:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 2.2
    cpe:2.3:a:icu-project:international_components_for_unicode:2.2:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 2.4
    cpe:2.3:a:icu-project:international_components_for_unicode:2.4:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 2.6
    cpe:2.3:a:icu-project:international_components_for_unicode:2.6:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 2.6.1
    cpe:2.3:a:icu-project:international_components_for_unicode:2.6.1:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 2.6.2
    cpe:2.3:a:icu-project:international_components_for_unicode:2.6.2:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 2.8
    cpe:2.3:a:icu-project:international_components_for_unicode:2.8:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 3.0
    cpe:2.3:a:icu-project:international_components_for_unicode:3.0:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 3.2
    cpe:2.3:a:icu-project:international_components_for_unicode:3.2:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 3.2.1
    cpe:2.3:a:icu-project:international_components_for_unicode:3.2.1:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 3.4
    cpe:2.3:a:icu-project:international_components_for_unicode:3.4:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 3.4.1
    cpe:2.3:a:icu-project:international_components_for_unicode:3.4.1:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 3.6
    cpe:2.3:a:icu-project:international_components_for_unicode:3.6:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 3.8
    cpe:2.3:a:icu-project:international_components_for_unicode:3.8:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 3.8.1
    cpe:2.3:a:icu-project:international_components_for_unicode:3.8.1:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 4.0
    cpe:2.3:a:icu-project:international_components_for_unicode:4.0:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 4.0.1
    cpe:2.3:a:icu-project:international_components_for_unicode:4.0.1:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 4.2
    cpe:2.3:a:icu-project:international_components_for_unicode:4.2:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 4.2.0.1
    cpe:2.3:a:icu-project:international_components_for_unicode:4.2.0.1:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 4.4.1
    cpe:2.3:a:icu-project:international_components_for_unicode:4.4.1:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 4.4.2
    cpe:2.3:a:icu-project:international_components_for_unicode:4.4.2:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 4.4.2.1
    cpe:2.3:a:icu-project:international_components_for_unicode:4.4.2.1:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 4.6
    cpe:2.3:a:icu-project:international_components_for_unicode:4.6:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 4.6.1
    cpe:2.3:a:icu-project:international_components_for_unicode:4.6.1:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 4.8
    cpe:2.3:a:icu-project:international_components_for_unicode:4.8:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 4.8.1
    cpe:2.3:a:icu-project:international_components_for_unicode:4.8.1:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 4.8.1.1
    cpe:2.3:a:icu-project:international_components_for_unicode:4.8.1.1:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 49.1
    cpe:2.3:a:icu-project:international_components_for_unicode:49.1:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 49.1.1
    cpe:2.3:a:icu-project:international_components_for_unicode:49.1.1:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 49.1.2
    cpe:2.3:a:icu-project:international_components_for_unicode:49.1.2:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 50.1
    cpe:2.3:a:icu-project:international_components_for_unicode:50.1:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 50.1.1
    cpe:2.3:a:icu-project:international_components_for_unicode:50.1.1:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 50.1.2
    cpe:2.3:a:icu-project:international_components_for_unicode:50.1.2:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 51.1
    cpe:2.3:a:icu-project:international_components_for_unicode:51.1:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 51.2
    cpe:2.3:a:icu-project:international_components_for_unicode:51.2:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 52.1
    cpe:2.3:a:icu-project:international_components_for_unicode:52.1:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 53.1
    cpe:2.3:a:icu-project:international_components_for_unicode:53.1:-:-:-:-:c%2fc%2b%2b
  • ICU Project International Components for Unicode for C/C++ 54.1
    cpe:2.3:a:icu-project:international_components_for_unicode:54.1:-:-:-:-:c%2fc%2b%2b
  • Canonical Ubuntu Linux 14.04 LTS (Long-Term Support)
    cpe:2.3:o:canonical:ubuntu_linux:14.04:-:-:-:lts
  • Canonical Ubuntu Linux 14.10
    cpe:2.3:o:canonical:ubuntu_linux:14.10
CVSS
Base: 7.5 (as of 26-08-2016 - 13:46)
Impact:
Exploitability:
CWE CWE-17
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2015-204.NASL
    description chromium was updated to version 40.0.2214.111 to fix 31 vulnerabilities. These security issues were fixed : - CVE-2015-1209: Use-after-free in DOM (bnc#916841). - CVE-2015-1210: Cross-origin-bypass in V8 bindings (bnc#916843). - CVE-2015-1211: Privilege escalation using service workers (bnc#916838). - CVE-2015-1212: Various fixes from internal audits, fuzzing and other initiatives (bnc#916840). - CVE-2014-7923: Memory corruption in ICU (bnc#914468). - CVE-2014-7924: Use-after-free in IndexedDB (bnc#914468). - CVE-2014-7925: Use-after-free in WebAudio (bnc#914468). - CVE-2014-7926: Memory corruption in ICU (bnc#914468). - CVE-2014-7927: Memory corruption in V8 (bnc#914468). - CVE-2014-7928: Memory corruption in V8 (bnc#914468). - CVE-2014-7930: Use-after-free in DOM (bnc#914468). - CVE-2014-7931: Memory corruption in V8 (bnc#914468). - CVE-2014-7929: Use-after-free in DOM (bnc#914468). - CVE-2014-7932: Use-after-free in DOM (bnc#914468). - CVE-2014-7933: Use-after-free in FFmpeg (bnc#914468). - CVE-2014-7934: Use-after-free in DOM (bnc#914468). - CVE-2014-7935: Use-after-free in Speech (bnc#914468). - CVE-2014-7936: Use-after-free in Views (bnc#914468). - CVE-2014-7937: Use-after-free in FFmpeg (bnc#914468). - CVE-2014-7938: Memory corruption in Fonts (bnc#914468). - CVE-2014-7939: Same-origin-bypass in V8 (bnc#914468). - CVE-2014-7940: Uninitialized-value in ICU (bnc#914468). - CVE-2014-7941: Out-of-bounds read in UI (bnc#914468). - CVE-2014-7942: Uninitialized-value in Fonts (bnc#914468). - CVE-2014-7943: Out-of-bounds read in Skia - CVE-2014-7944: Out-of-bounds read in PDFium - CVE-2014-7945: Out-of-bounds read in PDFium - CVE-2014-7946: Out-of-bounds read in Fonts - CVE-2014-7947: Out-of-bounds read in PDFium - CVE-2014-7948: Caching error in AppCache - CVE-2015-1205: Various fixes from internal audits, fuzzing and other initiatives These non-security issues were fixed : - Fix using 'echo' command in chromium-browser.sh script
    last seen 2019-02-21
    modified 2015-04-11
    plugin id 81692
    published 2015-03-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=81692
    title openSUSE Security Update : chromium (openSUSE-2015-204)
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_GOOGLE_CHROME_40_0_2214_91.NASL
    description The version of Google Chrome installed on the remote Mac OS X host is a version prior to 40.0.2214.91. It is, therefore, affected by vulnerabilities in the following components : - AppCache - DOM - FFmpeg - Fonts - ICU - IndexedDB - PDFium - Skia - Speech - UI - V8 - Views - WebAudio
    last seen 2019-02-21
    modified 2018-07-14
    plugin id 80950
    published 2015-01-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=80950
    title Google Chrome < 40.0.2214.91 Multiple Vulnerabilities (Mac OS X)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2015-161.NASL
    description Updated icu packages fix security vulnerabilities : The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN revision 292944 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a zero-length quantifier or look-behind expression (CVE-2014-7923, CVE-2014-7926). The collator implementation in i18n/ucol.cpp in International Components for Unicode (ICU) 52 through SVN revision 293126 does not initialize memory for a data structure, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted character sequence (CVE-2014-7940). It was discovered that ICU incorrectly handled memory operations when processing fonts. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program (CVE-2014-6585, CVE-2014-6591).
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 82414
    published 2015-03-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=82414
    title Mandriva Linux Security Advisory : icu (MDVSA-2015:161-1)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201502-13.NASL
    description The remote host is affected by the vulnerability described in GLSA-201502-13 (Chromium: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Chromium. Please review the CVE identifiers referenced below for details. Impact : A remote attacker may be able to cause a Denial of Service condition, gain privileges via a filesystem: URI, or have other unspecified impact. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 81396
    published 2015-02-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=81396
    title GLSA-201502-13 : Chromium: Multiple vulnerabilities
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2015-16315.NASL
    description Security fix for CVE-2014-6585 CVE-2014-6591 CVE-2014-7923 CVE-2014-7926 CVE-2014-9654 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-01-30
    plugin id 86111
    published 2015-09-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=86111
    title Fedora 23 : icu-54.1-5.fc23 (2015-16315)
  • NASL family Windows
    NASL id GOOGLE_CHROME_40_0_2214_91.NASL
    description The version of Google Chrome installed on the remote Windows host is a version prior to 40.0.2214.91. It is, therefore, affected by vulnerabilities in the following components : - AppCache - DOM - FFmpeg - Fonts - ICU - IndexedDB - PDFium - Skia - Speech - UI - V8 - Views - WebAudio
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 80951
    published 2015-01-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=80951
    title Google Chrome < 40.0.2214.91 Multiple Vulnerabilities
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2015-0093.NASL
    description Updated chromium-browser packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Chromium is an open source web browser, powered by WebKit (Blink). Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash or, potentially, execute arbitrary code with the privileges of the user running Chromium. (CVE-2014-7923, CVE-2014-7924, CVE-2014-7925, CVE-2014-7926, CVE-2014-7927, CVE-2014-7928, CVE-2014-7929, CVE-2014-7930, CVE-2014-7931, CVE-2014-7932, CVE-2014-7933, CVE-2014-7934, CVE-2014-7935, CVE-2014-7936, CVE-2014-7937, CVE-2014-7938, CVE-2014-7939, CVE-2014-7940, CVE-2014-7941, CVE-2014-7942, CVE-2014-7943, CVE-2014-7944, CVE-2014-7945, CVE-2014-7946, CVE-2014-7947, CVE-2014-7948) All Chromium users should upgrade to these updated packages, which contain Chromium version 40.0.2214.91, which corrects these issues. After installing the update, Chromium must be restarted for the changes to take effect.
    last seen 2019-02-21
    modified 2018-12-20
    plugin id 81035
    published 2015-01-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=81035
    title RHEL 6 : chromium-browser (RHSA-2015:0093)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_E30E0C99A1B711E4B85C00262D5ED8EE.NASL
    description Google Chrome Releases reports : 62 security fixes in this release, including : - [430353] High CVE-2014-7923: Memory corruption in ICU. Credit to yangdingning. - [435880] High CVE-2014-7924: Use-after-free in IndexedDB. Credit to Collin Payne. - [434136] High CVE-2014-7925: Use-after-free in WebAudio. Credit to mark.buer. - [422824] High CVE-2014-7926: Memory corruption in ICU. Credit to yangdingning. - [444695] High CVE-2014-7927: Memory corruption in V8. Credit to Christian Holler. - [435073] High CVE-2014-7928: Memory corruption in V8. Credit to Christian Holler. - [442806] High CVE-2014-7930: Use-after-free in DOM. Credit to cloudfuzzer. - [442710] High CVE-2014-7931: Memory corruption in V8. Credit to cloudfuzzer. - [443115] High CVE-2014-7929: Use-after-free in DOM. Credit to cloudfuzzer. - [429666] High CVE-2014-7932: Use-after-free in DOM. Credit to Atte Kettunen of OUSPG. - [427266] High CVE-2014-7933: Use-after-free in FFmpeg. Credit to aohelin. - [427249] High CVE-2014-7934: Use-after-free in DOM. Credit to cloudfuzzer. - [402957] High CVE-2014-7935: Use-after-free in Speech. Credit to Khalil Zhani. - [428561] High CVE-2014-7936: Use-after-free in Views. Credit to Christoph Diehl. - [419060] High CVE-2014-7937: Use-after-free in FFmpeg. Credit to Atte Kettunen of OUSPG. - [416323] High CVE-2014-7938: Memory corruption in Fonts. Credit to Atte Kettunen of OUSPG. - [399951] High CVE-2014-7939: Same-origin-bypass in V8. Credit to Takeshi Terada. - [433866] Medium CVE-2014-7940: Uninitialized-value in ICU. Credit to miaubiz. - [428557] Medium CVE-2014-7941: Out-of-bounds read in UI. Credit to Atte Kettunen of OUSPG and Christoph Diehl. - [426762] Medium CVE-2014-7942: Uninitialized-value in Fonts. Credit to miaubiz. - [422492] Medium CVE-2014-7943: Out-of-bounds read in Skia. Credit to Atte Kettunen of OUSPG. - [418881] Medium CVE-2014-7944: Out-of-bounds read in PDFium. Credit to cloudfuzzer. - [414310] Medium CVE-2014-7945: Out-of-bounds read in PDFium. Credit to cloudfuzzer. - [414109] Medium CVE-2014-7946: Out-of-bounds read in Fonts. Credit to miaubiz. - [430566] Medium CVE-2014-7947: Out-of-bounds read in PDFium. Credit to fuzztercluck. - [414026] Medium CVE-2014-7948: Caching error in AppCache. Credit to jiayaoqijia. - [449894] CVE-2015-1205: Various fixes from internal audits, fuzzing and other initiatives. - Multiple vulnerabilities in V8 fixed at the tip of the 3.30 branch (currently 3.30.33.15).
    last seen 2019-02-21
    modified 2018-12-19
    plugin id 80898
    published 2015-01-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=80898
    title FreeBSD : chromium -- multiple vulnerabilities (e30e0c99-a1b7-11e4-b85c-00262d5ed8ee)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2015-16314.NASL
    description Security fix for CVE-2014-6585 CVE-2014-6591 CVE-2014-7923 CVE-2014-7926 CVE-2014-9654 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-01-30
    plugin id 86376
    published 2015-10-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=86376
    title Fedora 22 : icu-54.1-4.fc22 (2015-16314)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-2476-1.NASL
    description Several memory corruption bugs were discovered in ICU. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via renderer crash or execute arbitrary code with the privileges of the sandboxed render process. (CVE-2014-7923, CVE-2014-7926) A use-after-free was discovered in the IndexedDB implementation. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash or execute arbitrary code with the privileges of the user invoking the program. (CVE-2014-7924) A use-after free was discovered in the WebAudio implementation in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash or execute arbitrary code with the privileges of the sandboxed render process. (CVE-2014-7925) Several memory corruption bugs were discovered in V8. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via renderer crash or execute arbitrary code with the privileges of the sandboxed render process. (CVE-2014-7927, CVE-2014-7928, CVE-2014-7931) Several use-after free bugs were discovered in the DOM implementation in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via renderer crash or execute arbitrary code with the privileges of the sandboxed render process. (CVE-2014-7929, CVE-2014-7930, CVE-2014-7932, CVE-2014-7934) A use-after free was discovered in FFmpeg. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash or execute arbitrary code with the privileges of the sandboxed render process. (CVE-2014-7933) Multiple off-by-one errors were discovered in FFmpeg. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash or execute arbitrary code with the privileges of the sandboxed render process. (CVE-2014-7937) A memory corruption bug was discovered in the fonts implementation. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash or execute arbitrary code with the privileges of the sandboxed render process. (CVE-2014-7938) It was discovered that ICU did not initialize memory for a data structure correctly. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash or execute arbitrary code with the privileges of the sandboxed render process. (CVE-2014-7940) It was discovered that the fonts implementation did not initialize memory for a data structure correctly. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash or execute arbitrary code with the privileges of the sandboxed render process. (CVE-2014-7942) An out-of-bounds read was discovered in Skia. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash. (CVE-2014-7943) An out-of-bounds read was discovered in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash. (CVE-2014-7946) It was discovered that the AppCache proceeded with caching for SSL sessions even if there is a certificate error. A remote attacker could potentially exploit this by conducting a MITM attack to modify HTML application content. (CVE-2014-7948) Multiple security issues were discovered in Chromium. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to read uninitialized memory, cause a denial of service via application crash or execute arbitrary code with the privileges of the user invoking the program. (CVE-2015-1205) Multiple security issues were discovered in V8. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to read uninitialized memory, cause a denial of service via renderer crash or execute arbitrary code with the privileges of the sandboxed render process. (CVE-2015-1346). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 81016
    published 2015-01-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=81016
    title Ubuntu 14.04 LTS / 14.10 : oxide-qt vulnerabilities (USN-2476-1)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2015-6084.NASL
    description Security fix for CVE-2014-9654, CVE-2014-7923, CVE-2014-7926 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-01-30
    plugin id 83122
    published 2015-04-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=83122
    title Fedora 20 : icu-50.1.2-12.fc20 (2015-6084)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201503-06.NASL
    description The remote host is affected by the vulnerability described in GLSA-201503-06 (ICU: Multiple Vulnerabilities) Multiple vulnerabilities have been discovered in ICU. Please review the CVE identifiers referenced below for details. Impact : A remote attacker can cause Denial of Service. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-01-26
    plugin id 82005
    published 2015-03-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=82005
    title GLSA-201503-06 : ICU: Multiple Vulnerabilities
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-3187.NASL
    description Several vulnerabilities were discovered in the International Components for Unicode (ICU) library. - CVE-2013-1569 Glyph table issue. - CVE-2013-2383 Glyph table issue. - CVE-2013-2384 Font layout issue. - CVE-2013-2419 Font processing issue. - CVE-2014-6585 Out-of-bounds read. - CVE-2014-6591 Additional out-of-bounds reads. - CVE-2014-7923 Memory corruption in regular expression comparison. - CVE-2014-7926 Memory corruption in regular expression comparison. - CVE-2014-7940 Uninitialized memory. - CVE-2014-9654 More regular expression flaws.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 81831
    published 2015-03-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=81831
    title Debian DSA-3187-1 : icu - security update
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-2522-2.NASL
    description USN-2522-1 fixed vulnerabilities in ICU. On Ubuntu 12.04 LTS, the font patches caused a regression when using LibreOffice Calc. The patches have been temporarily backed out until the regression is investigated. We apologize for the inconvenience. It was discovered that ICU incorrectly handled memory operations when processing fonts. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program. This issue only affected Ubuntu 12.04 LTS. (CVE-2013-1569, CVE-2013-2383, CVE-2013-2384, CVE-2013-2419) It was discovered that ICU incorrectly handled memory operations when processing fonts. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program. (CVE-2014-6585, CVE-2014-6591) It was discovered that ICU incorrectly handled memory operations when processing regular expressions. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program. (CVE-2014-7923, CVE-2014-7926, CVE-2014-9654) It was discovered that ICU collator implementation incorrectly handled memory operations. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program. (CVE-2014-7940). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 81698
    published 2015-03-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=81698
    title Ubuntu 12.04 LTS : icu regression (USN-2522-2)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-2522-3.NASL
    description USN-2522-1 fixed vulnerabilities in ICU. On Ubuntu 12.04 LTS, the font patches caused a regression when using LibreOffice Calc. The patches have now been updated to fix the regression. We apologize for the inconvenience. It was discovered that ICU incorrectly handled memory operations when processing fonts. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program. This issue only affected Ubuntu 12.04 LTS. (CVE-2013-1569, CVE-2013-2383, CVE-2013-2384, CVE-2013-2419) It was discovered that ICU incorrectly handled memory operations when processing fonts. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program. (CVE-2014-6585, CVE-2014-6591) It was discovered that ICU incorrectly handled memory operations when processing regular expressions. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program. (CVE-2014-7923, CVE-2014-7926, CVE-2014-9654) It was discovered that ICU collator implementation incorrectly handled memory operations. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program. (CVE-2014-7940). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 81754
    published 2015-03-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=81754
    title Ubuntu 12.04 LTS : icu vulnerabilities (USN-2522-3)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-2522-1.NASL
    description It was discovered that ICU incorrectly handled memory operations when processing fonts. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program. This issue only affected Ubuntu 12.04 LTS. (CVE-2013-1569, CVE-2013-2383, CVE-2013-2384, CVE-2013-2419) It was discovered that ICU incorrectly handled memory operations when processing fonts. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program. (CVE-2014-6585, CVE-2014-6591) It was discovered that ICU incorrectly handled memory operations when processing regular expressions. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program. (CVE-2014-7923, CVE-2014-7926, CVE-2014-9654) It was discovered that ICU collator implementation incorrectly handled memory operations. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program. (CVE-2014-7940). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 81668
    published 2015-03-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=81668
    title Ubuntu 12.04 LTS / 14.04 LTS / 14.10 : icu vulnerabilities (USN-2522-1)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DLA-219.NASL
    description Several vulnerabilities were discovered in the International Components for Unicode (ICU) library : CVE-2013-1569 Glyph table issue. CVE-2013-2383 Glyph table issue. CVE-2013-2384 Font layout issue. CVE-2013-2419 Font processing issue. CVE-2014-6585 Out-of-bounds read. CVE-2014-6591 Additional out-of-bounds reads. CVE-2014-7923 Memory corruption in regular expression comparison. CVE-2014-7926 Memory corruption in regular expression comparison. CVE-2014-7940 Uninitialized memory. CVE-2014-9654 More regular expression flaws. For Debian 6 'Squeeze', these issues have been fixed in icu version 4.4.1-8+squeeze3. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-06
    plugin id 83476
    published 2015-05-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=83476
    title Debian DLA-219-1 : icu security update
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2015-6087.NASL
    description Security fix for CVE-2014-9654, CVE-2014-7923, CVE-2014-7926 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-01-30
    plugin id 83123
    published 2015-04-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=83123
    title Fedora 21 : icu-52.1-6.fc21 (2015-6087)
redhat via4
advisories
rhsa
id RHSA-2015:0093
refmap via4
bid 72288
confirm
gentoo
  • GLSA-201502-13
  • GLSA-201503-06
misc https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
sectrack 1031623
secunia
  • 62383
  • 62575
  • 62665
suse openSUSE-SU-2015:0441
ubuntu USN-2476-1
Last major update 23-04-2017 - 21:59
Published 22-01-2015 - 17:59
Last modified 23-04-2019 - 15:29
Back to Top