MEDIUM · 6.8

CVE-2015-1288

The Spellcheck API implementation in Google Chrome before 44.0.2403.89 does not use an HTTPS session for downloading a Hunspell dictionary, which allows man-in-the-middle attackers to deliver incorrec...

Vulnerability Description

The Spellcheck API implementation in Google Chrome before 44.0.2403.89 does not use an HTTPS session for downloading a Hunspell dictionary, which allows man-in-the-middle attackers to deliver incorrect spelling suggestions or possibly have unspecified other impact via a crafted file, a related issue to CVE-2015-1263.

CVSS Score

6.8

MEDIUM

AV:N/AC:M/Au:N/C:P/I:P/A:P
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
GoogleChrome<= 43.0.2357.134
DebianDebian Linux8.0
RedhatEnterprise Linux Desktop Supplementary6.0
RedhatEnterprise Linux Server Supplementary6.0
RedhatEnterprise Linux Server Supplementary Eus6.7z
RedhatEnterprise Linux Workstation Supplementary6.0
OpensuseOpensuse13.1

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-1288?

CVE-2015-1288 is a vulnerability with a CVSS score of 6.8 (MEDIUM). The Spellcheck API implementation in Google Chrome before 44.0.2403.89 does not use an HTTPS session for downloading a Hunspell dictionary, which allows man-in-the-middle attackers to deliver incorrec...

How severe is CVE-2015-1288?

CVE-2015-1288 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2015-1288?

Check the references section above for vendor advisories and patch information. Affected products include: Google Chrome, Debian Debian Linux, Redhat Enterprise Linux Desktop Supplementary, Redhat Enterprise Linux Server Supplementary, Redhat Enterprise Linux Server Supplementary Eus.