Vulnerability Name: | CVE-2015-1295 (CCN-106003) | ||||||||||||||||||||||||||||||||
Assigned: | 2015-09-01 | ||||||||||||||||||||||||||||||||
Published: | 2015-09-01 | ||||||||||||||||||||||||||||||||
Updated: | 2016-12-22 | ||||||||||||||||||||||||||||||||
Summary: | Multiple use-after-free vulnerabilities in the PrintWebViewHelper class in components/printing/renderer/print_web_view_helper.cc in Google Chrome before 45.0.2454.85 allow user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact by triggering nested IPC messages during preparation for printing, as demonstrated by messages associated with PDF documents in conjunction with messages about printer capabilities. CWE-416: Use After Free | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 6.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) 5.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2015-1295 Source: CCN Type: Google Chrome Releases Web site Stable Channel Update Source: CONFIRM Type: Patch, Vendor Advisory http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html Source: SUSE Type: UNKNOWN openSUSE-SU-2015:1586 Source: SUSE Type: UNKNOWN openSUSE-SU-2015:1873 Source: REDHAT Type: UNKNOWN RHSA-2015:1712 Source: DEBIAN Type: UNKNOWN DSA-3351 Source: SECTRACK Type: UNKNOWN 1033472 Source: CONFIRM Type: UNKNOWN https://code.google.com/p/chromium/issues/detail?id=502562 Source: CONFIRM Type: UNKNOWN https://codereview.chromium.org/1228693002/ Source: XF Type: UNKNOWN google-chrome-cve20151295-code-exec(106003) Source: GENTOO Type: UNKNOWN GLSA-201603-09 Source: CCN Type: WhiteSource Vulnerability Database CVE-2015-1295 | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |