CVE-2015-1234
Google Chrome pnacl Shared Memory Time-Of-Check/Time-Of-Use Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Race condition in gpu/command_buffer/service/gles2_cmd_decoder.cc in Google Chrome before 41.0.2272.118 allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact by manipulating OpenGL ES commands.
Condición de carrera en gpu/command_buffer/service/gles2_cmd_decoder.cc en Google Chrome anterior a 41.0.2272.118 permite a atacantes remotos causar una denegación de servicio (desbordamiento de buffer) o posiblemente tener otro impacto no especificado mediante la manipulación de comandos Es OpenGL.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Google Chrome. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of communication between the GPU process and the renderer processes. The issue lies in the verification of values from the renderer without copying them out of a shared memory section. An attacker can leverage this vulnerability to execute code under the context of the current process.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-01-21 CVE Reserved
- 2015-04-01 CVE Published
- 2024-08-06 CVE Updated
- 2024-11-11 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-122: Heap-based Buffer Overflow
- CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://googlechromereleases.blogspot.com/2015/04/stable-channel-update.html | X_refsource_confirm | |
http://www.securityfocus.com/bid/73486 | Vdb Entry | |
http://www.securitytracker.com/id/1032012 | Vdb Entry | |
https://code.google.com/p/chromium/issues/detail?id=468936 | X_refsource_confirm | |
https://codereview.chromium.org/1016193003 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00004.html | 2023-11-07 | |
http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html | 2023-11-07 | |
http://rhn.redhat.com/errata/RHSA-2015-0778.html | 2023-11-07 | |
http://www.ubuntu.com/usn/USN-2556-1 | 2023-11-07 | |
https://security.gentoo.org/glsa/201506-04 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2015-1234 | 2015-04-06 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1208424 | 2015-04-06 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Google Search vendor "Google" | Chrome Search vendor "Google" for product "Chrome" | <= 41.0.2272.102 Search vendor "Google" for product "Chrome" and version " <= 41.0.2272.102" | - |
Affected
| in | Apple Search vendor "Apple" | Macos Search vendor "Apple" for product "Macos" | * | - |
Safe
|
Google Search vendor "Google" | Chrome Search vendor "Google" for product "Chrome" | <= 41.0.2272.102 Search vendor "Google" for product "Chrome" and version " <= 41.0.2272.102" | - |
Affected
| in | Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | * | - |
Safe
|
Google Search vendor "Google" | Chrome Search vendor "Google" for product "Chrome" | <= 41.0.2272.102 Search vendor "Google" for product "Chrome" and version " <= 41.0.2272.102" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | * | - |
Safe
|