CVE-2015-1243
chromium-browser: use-after-free in DOM
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Use-after-free vulnerability in the MutationObserver::disconnect function in core/dom/MutationObserver.cpp in the DOM implementation in Blink, as used in Google Chrome before 42.0.2311.135, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering an attempt to unregister a MutationObserver object that is not currently registered.
Vulnerabilidad de uso después de liberación en la función MutationObserver::disconnect en core/dom/MutationObserver.cpp en la implementación DOM en Blink, utilizado en Google Chrome anterior a 42.0.2311.135, permite a atacantes remotos causar una denegación de servicio o posiblemente tener otro impacto no especificado mediante la provocación de un intento a anular el registro de un objeto MutationObserver que no está registrado actualmente.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-01-21 CVE Reserved
- 2015-05-01 CVE Published
- 2024-08-06 CVE Updated
- 2024-10-25 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-416: Use After Free
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_28.html | X_refsource_confirm | |
http://www.securityfocus.com/bid/74389 | Vdb Entry | |
http://www.securitytracker.com/id/1032234 | Vdb Entry | |
https://code.google.com/p/chromium/issues/detail?id=453279 | X_refsource_confirm | |
https://src.chromium.org/viewvc/blink?revision=192655&view=revision | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2015-05/msg00009.html | 2023-11-07 | |
http://rhn.redhat.com/errata/RHSA-2015-0921.html | 2023-11-07 | |
http://www.debian.org/security/2015/dsa-3242 | 2023-11-07 | |
http://www.ubuntu.com/usn/USN-2582-1 | 2023-11-07 | |
https://security.gentoo.org/glsa/201506-04 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2015-1243 | 2015-04-30 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1216920 | 2015-04-30 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Google Search vendor "Google" | Chrome Search vendor "Google" for product "Chrome" | <= 42.0.2311.87 Search vendor "Google" for product "Chrome" and version " <= 42.0.2311.87" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 14.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 14.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "14.10" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 15.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "15.04" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Desktop Supplementary Search vendor "Redhat" for product "Enterprise Linux Desktop Supplementary" | 6.0 Search vendor "Redhat" for product "Enterprise Linux Desktop Supplementary" and version "6.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Supplementary Search vendor "Redhat" for product "Enterprise Linux Server Supplementary" | 6.0 Search vendor "Redhat" for product "Enterprise Linux Server Supplementary" and version "6.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Supplementary Eus Search vendor "Redhat" for product "Enterprise Linux Server Supplementary Eus" | 6.6.z Search vendor "Redhat" for product "Enterprise Linux Server Supplementary Eus" and version "6.6.z" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Workstation Supplementary Search vendor "Redhat" for product "Enterprise Linux Workstation Supplementary" | 6.0 Search vendor "Redhat" for product "Enterprise Linux Workstation Supplementary" and version "6.0" | - |
Affected
|