Vulnerability Name: | CVE-2015-6581 (CCN-106222) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2015-09-03 | ||||||||||||||||||||||||||||||||||||
Published: | 2015-09-03 | ||||||||||||||||||||||||||||||||||||
Updated: | 2016-12-22 | ||||||||||||||||||||||||||||||||||||
Summary: | Double free vulnerability in the opj_j2k_copy_default_tcp_and_create_tcd function in j2k.c in OpenJPEG before r3002, as used in PDFium in Google Chrome before 45.0.2454.85, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by triggering a memory-allocation failure. CWE-415: Double Free | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 6.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) 5.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2015-6581 Source: CCN Type: Google Chrome Releases Web site Stable Channel Update Source: CONFIRM Type: Patch, Vendor Advisory http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html Source: FEDORA Type: UNKNOWN FEDORA-2015-773ef285ef Source: FEDORA Type: UNKNOWN FEDORA-2015-1c9ed24c61 Source: DEBIAN Type: UNKNOWN DSA-3665 Source: SECTRACK Type: UNKNOWN 1033472 Source: CONFIRM Type: UNKNOWN https://code.google.com/p/chromium/issues/detail?id=486538 Source: CONFIRM Type: UNKNOWN https://code.google.com/p/chromium/issues/detail?id=526825 Source: CONFIRM Type: UNKNOWN https://code.google.com/p/openjpeg/issues/detail?id=492 Source: XF Type: UNKNOWN google-chrome-cve20156581-code-exec(106222) Source: CCN Type: WhiteSource Vulnerability Database CVE-2015-6581 | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |