CVE-2015-1299
chromium-browser: Use-after-free in Blink
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Use-after-free vulnerability in the shared-timer implementation in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging erroneous timer firing, related to ThreadTimers.cpp and Timer.cpp.
Vulnerabilidad de uso después de liberación en la memoria en la implementación shared-timer en Blink, como se utiliza en Google Chrome en versiones anteriores a 45.0.2454.85, permite a atacantes remotos causar una denegación de servicio o posiblemente tener otro impacto no especificado aprovechando la activación errónea del temporizador, relacionada con ThreadTimers.cpp y Timer.cpp.
It was discovered that the DOM tree could be corrupted during parsing in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to bypass same-origin restrictions or cause a denial of service. An issue was discovered in NavigatorServiceWorker::serviceWorker in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to bypass same-origin restrictions. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-01-21 CVE Reserved
- 2015-09-03 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-416: Use After Free
CAPEC
References (13)
URL | Tag | Source |
---|---|---|
http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html | X_refsource_confirm | |
http://www.securitytracker.com/id/1033472 | Vdb Entry | |
https://code.google.com/p/chromium/issues/detail?id=416362 | X_refsource_confirm | |
https://codereview.chromium.org/1153763005 | X_refsource_confirm | |
https://codereview.chromium.org/956333002 | X_refsource_confirm | |
https://codereview.chromium.org/959263002 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2015-09/msg00029.html | 2023-11-07 | |
http://lists.opensuse.org/opensuse-updates/2015-11/msg00013.html | 2023-11-07 | |
http://rhn.redhat.com/errata/RHSA-2015-1712.html | 2023-11-07 | |
http://www.debian.org/security/2015/dsa-3351 | 2023-11-07 | |
https://security.gentoo.org/glsa/201603-09 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2015-1299 | 2015-09-03 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1259168 | 2015-09-03 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Google Search vendor "Google" | Chrome Search vendor "Google" for product "Chrome" | <= 44.0.2403 Search vendor "Google" for product "Chrome" and version " <= 44.0.2403" | - |
Affected
|