First published: Mon Mar 09 2015(Updated: )
net/http/proxy_client_socket.cc in Google Chrome before 41.0.2272.76 does not properly handle a 407 (aka Proxy Authentication Required) HTTP status code accompanied by a Set-Cookie header, which allows remote proxy servers to conduct cookie-injection attacks via a crafted response.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
Google Chrome (Trace Event) | <=40.0.2214.115 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server Supplementary EUS | =6.6.z | |
Red Hat Enterprise Linux Workstation Supplementary | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1229 has been categorized as a high-severity vulnerability due to its potential to allow cookie-injection attacks.
To mitigate CVE-2015-1229, update Google Chrome to version 41.0.2272.76 or newer.
CVE-2015-1229 affects Google Chrome versions up to 40.0.2214.115 and specific versions of Ubuntu and Red Hat Enterprise Linux.
CVE-2015-1229 is a proxy authentication vulnerability that can lead to cookie-injection attacks.
Yes, CVE-2015-1229 can be exploited remotely by malicious proxy servers to conduct attacks.