[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Multiple use-after-free vulnerabilities in Blink in Google Chrome via vectors that trigger movement of a SCRIPT element (deb)

ID: oval:org.secpod.oval:def:23835Date: (C)2015-03-18   (M)2023-11-16
Class: VULNERABILITYFamily: unix




The host is installed with Google Chrome before 41.0.2272.76 and is prone to multiple use-after-free vulnerabilities. The flaws are present in the SkMallocPixelRef::NewAllocate function in core/SkMallocPixelRef.cpp in Skia, as used in Google Chrome, which fails to properly handle vectors that trigger movement of a SCRIPT element to different documents, related to (1) the HTMLScriptElement::didMoveToNewDocument function in core/html/HTMLScriptElement.cpp and (2) the SVGScriptElement::didMoveToNewDocument function in core/svg/SVGScriptElement.cpp. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.

Platform:
Linux
Product:
Google Chrome
Reference:
CVE-2015-1218
CVE    1
CVE-2015-1218
CPE    3
cpe:/a:google:chrome:40.0.2214.115
cpe:/a:google:chrome:::x64
cpe:/a:google:chrome:::x86

© SecPod Technologies