CVE-2018-6139

Insufficient target checks on the chrome.debugger API in DevTools in Google Chrome prior to 67.0.3396.62 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension.
References
Link Resource
https://crbug.com/805224 Exploit Issue Tracking Vendor Advisory Patch
https://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop_58.html Release Notes Vendor Advisory
https://www.debian.org/security/2018/dsa-4237 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1815 Third Party Advisory
http://www.securitytracker.com/id/1041014 Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/104309 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

Information

Published : 2019-01-09 19:29

Updated : 2019-01-16 15:02


NVD link : CVE-2018-6139

Mitre link : CVE-2018-6139


JSON object : View

Products Affected

debian

  • debian_linux

redhat

  • enterprise_linux_server
  • enterprise_linux_desktop
  • enterprise_linux_workstation

google

  • chrome
CWE
CWE-20

Improper Input Validation