Vulnerability Details : CVE-2015-6760
The Image11::map function in renderer/d3d/d3d11/Image11.cpp in libANGLE, as used in Google Chrome before 46.0.2490.71, mishandles mapping failures after device-lost events, which allows remote attackers to cause a denial of service (invalid read or write) or possibly have unspecified other impact via vectors involving a removed device.
Vulnerability category: Denial of service
Products affected by CVE-2015-6760
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-6760
1.17%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 83 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-6760
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2015-6760
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-6760
-
https://code.google.com/p/chromium/issues/detail?id=519642
519642 - Security: Memory-safety bug in Image11::map - chromium - Monorail
-
http://www.securityfocus.com/bid/77071
Google Chrome 46.0.2490.71 Multiple Security Vulnerabilities
-
https://chromium.googlesource.com/angle/angle.git/+/39939686b3731eaaf6c0b639ab64db0277c72475
39939686b3731eaaf6c0b639ab64db0277c72475 - angle/angle.git - Git at Google
-
https://security.gentoo.org/glsa/201603-09
Chromium: Multiple vulnerabilities (GLSA 201603-09) — Gentoo security
-
http://www.debian.org/security/2015/dsa-3376
Debian -- Security Information -- DSA-3376-1 chromium-browser
-
http://www.securitytracker.com/id/1033816
Google Chrome Multiple Bugs Let Remote Users Execute Arbitrary Code, Bypass Security Restrictions, and Obtain Potentially Sensitive Information - SecurityTracker
-
http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html
Chrome Releases: Stable Channel UpdatePatch;Vendor Advisory
-
http://rhn.redhat.com/errata/RHSA-2015-1912.html
RHSA-2015:1912 - Security Advisory - Red Hat Customer Portal
Jump to