The FileSystem API in Google Chrome before 40.0.2214.91 allows remote attackers to bypass the SafeBrowsing for Executable Files protection mechanism by creating a .exe file in a temporary filesystem and then referencing this file with a filesystem:http: URL.
{
"binaries": [
{
"binary_name": "chromium-browser",
"binary_version": "43.0.2357.81-0ubuntu0.14.04.1.1089"
},
{
"binary_name": "chromium-browser-l10n",
"binary_version": "43.0.2357.81-0ubuntu0.14.04.1.1089"
},
{
"binary_name": "chromium-chromedriver",
"binary_version": "43.0.2357.81-0ubuntu0.14.04.1.1089"
},
{
"binary_name": "chromium-codecs-ffmpeg",
"binary_version": "43.0.2357.81-0ubuntu0.14.04.1.1089"
},
{
"binary_name": "chromium-codecs-ffmpeg-extra",
"binary_version": "43.0.2357.81-0ubuntu0.14.04.1.1089"
}
],
"availability": "No subscription required"
}