← Back to CVEs
CVE-2019-13762
LOW3.3
Description
Insufficient policy enforcement in downloads in Google Chrome on Windows prior to 79.0.3945.79 allowed a local attacker to spoof downloaded files via local code.
CVE Details
CVSS v3.1 Score3.3
SeverityLOW
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published12/10/2019
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
debian:debian_linuxfedoraproject:fedoragoogle:chromemicrosoft:windowsredhat:enterprise_linux_desktopredhat:enterprise_linux_for_scientific_computingredhat:enterprise_linux_serverredhat:enterprise_linux_workstation
Weaknesses (CWE)
CWE-667
References
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html(chrome-cve-admin@google.com)
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html(chrome-cve-admin@google.com)
https://access.redhat.com/errata/RHSA-2019:4238(chrome-cve-admin@google.com)
https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html(chrome-cve-admin@google.com)
https://crbug.com/1004212(chrome-cve-admin@google.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/(chrome-cve-admin@google.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/(chrome-cve-admin@google.com)
https://seclists.org/bugtraq/2020/Jan/27(chrome-cve-admin@google.com)
https://security.gentoo.org/glsa/202003-08(chrome-cve-admin@google.com)
https://www.debian.org/security/2020/dsa-4606(chrome-cve-admin@google.com)
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:4238(af854a3a-2127-422b-91ae-364da2661108)
https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html(af854a3a-2127-422b-91ae-364da2661108)
https://crbug.com/1004212(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2020/Jan/27(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202003-08(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2020/dsa-4606(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.