Vulnerability Details : CVE-2015-3335
The NaClSandbox::InitializeLayerTwoSandbox function in components/nacl/loader/sandbox_linux/nacl_sandbox_linux.cc in Google Chrome before 42.0.2311.90 does not have RLIMIT_AS and RLIMIT_DATA limits for Native Client (aka NaCl) processes, which might make it easier for remote attackers to conduct row-hammer attacks or have unspecified other impact by leveraging the ability to run a crafted program in the NaCl sandbox.
Products affected by CVE-2015-3335
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-3335
0.49%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 73 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-3335
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2015-3335
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-3335
-
http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html
openSUSE-SU-2015:0748-1: moderate: Security update for ChromiumThird Party Advisory
-
http://www.securityfocus.com/bid/72715
Google Chrome 'nacl_sandbox_linux.cc' Remote Security VulnerabilityThird Party Advisory;VDB Entry
-
https://code.google.com/p/chromium/issues/detail?id=455839
455839 - Security: NaCl processes should have an address space usage limit - chromium - MonorailExploit;Vendor Advisory
-
http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html
Chrome Releases: Stable Channel UpdateRelease Notes;Vendor Advisory
Jump to