Vulnerability Details : CVE-2015-1212
Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Vulnerability category: Denial of service
Products affected by CVE-2015-1212
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:*:*:*:*:*:android:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-1212
0.48%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 76 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-1212
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2015-1212
-
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html
[security-announce] openSUSE-SU-2015:0441-1: important: Security updateMailing List;Third Party Advisory
-
https://code.google.com/p/chromium/issues/detail?id=445679
445679 - Memory error when importing bogus EC private key from PKCS8 into BoringSSL - chromium - MonorailIssue Tracking;Patch;Vendor Advisory
-
https://code.google.com/p/chromium/issues/detail?id=438365
438365 - Heap-use-after-free in views::X11WholeScreenMoveLoop::RunMoveLoop - chromium - MonorailIssue Tracking;Patch;Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/100718
Google Chrome internal audits unspecified CVE-2015-1212 Vulnerability ReportThird Party Advisory;VDB Entry
-
https://code.google.com/p/chromium/issues/detail?id=451684
451684 - ASSERTION FAILED: node->isMediaControlElement() - chromium - MonorailIssue Tracking;Patch;Vendor Advisory
-
https://code.google.com/p/chromium/issues/detail?id=446459
446459 - Security: Proxy credential leak: WebSockets send proxy headers to destination server - chromium - MonorailExploit;Issue Tracking;Patch;Vendor Advisory
-
http://rhn.redhat.com/errata/RHSA-2015-0163.html
RHSA-2015:0163 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.ubuntu.com/usn/USN-2495-1
USN-2495-1: Oxide vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html
Chrome Releases: Stable Channel UpdateVendor Advisory
-
https://code.google.com/p/chromium/issues/detail?id=451918
451918 - ASSERTION FAILED: it != m_customElementBindings.end() - chromium - MonorailIssue Tracking;Patch;Vendor Advisory
-
http://www.securityfocus.com/bid/72497
Google Chrome Prior to 40.0.2214.109 Multiple Security VulnerabilitiesThird Party Advisory;VDB Entry
-
https://code.google.com/p/chromium/issues/detail?id=455225
455225 - Tracking bug for Release 1 M40. - chromium - MonorailIssue Tracking;Vendor Advisory
-
https://code.google.com/p/chromium/issues/detail?id=427303
427303 - UNKNOWN in blink::HRTFDatabaseLoader::load - chromium - MonorailIssue Tracking;Patch;Vendor Advisory
-
http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html
Chrome Releases: Chrome for Android UpdateVendor Advisory
-
http://www.securitytracker.com/id/1031709
Google Chrome Multiple Bugs Let Remote Users Execute Arbitrary Code and Bypass Same-Origin Restrictions - SecurityTrackerThird Party Advisory;VDB Entry
-
http://security.gentoo.org/glsa/glsa-201502-13.xml
Chromium: Multiple vulnerabilities (GLSA 201502-13) — Gentoo securityThird Party Advisory
Jump to