First published: Thu Jul 23 2015(Updated: )
The Spellcheck API implementation in Google Chrome before 44.0.2403.89 does not use an HTTPS session for downloading a Hunspell dictionary, which allows man-in-the-middle attackers to deliver incorrect spelling suggestions or possibly have unspecified other impact via a crafted file, a related issue to CVE-2015-1263.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome | <=43.0.2357.134 | |
Debian GNU/Linux | =8.0 | |
redhat enterprise linux desktop supplementary | =6.0 | |
Red Hat Enterprise Linux Server Supplementary | =6.0 | |
Red Hat Enterprise Linux Server Supplementary EUS | =6.7z | |
Red Hat Enterprise Linux Workstation Supplementary | =6.0 | |
openSUSE | =13.1 | |
openSUSE | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1288 is classified as a high severity vulnerability due to its potential for man-in-the-middle attacks.
To fix CVE-2015-1288, ensure you update Google Chrome to version 44.0.2403.89 or later.
CVE-2015-1288 affects various versions of Google Chrome and several distributions of Linux, including Debian and Red Hat.
CVE-2015-1288 enables man-in-the-middle attackers to deliver incorrect spelling suggestions or possibly inject malicious content.
There are no known workarounds for CVE-2015-1288 other than applying the necessary updates to the affected software.