ID CVE-2015-1250
Summary Multiple unspecified vulnerabilities in Google Chrome before 42.0.2311.135 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
Vulnerable Configurations
  • Canonical Ubuntu Linux 15.04
    cpe:2.3:o:canonical:ubuntu_linux:15.04
  • Canonical Ubuntu Linux 14.10
    cpe:2.3:o:canonical:ubuntu_linux:14.10
  • Canonical Ubuntu Linux 14.04 LTS (Long-Term Support)
    cpe:2.3:o:canonical:ubuntu_linux:14.04:-:-:-:lts
  • Google Chrome 42.0.2311.87
    cpe:2.3:a:google:chrome:42.0.2311.87
  • Red Hat Enterprise Linux Workstation Supplementary 6.0 (v. 6)
    cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0
  • Red Hat Enterprise Linux Server Supplementary EUS 6.7z
    cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z
  • Red Hat Enterprise Linux Server Supplementary 6.0 (v. 6)
    cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0
  • Red Hat Enterprise Linux Desktop Supplementary 6.0 (v. 6)
    cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0
  • Debian Linux 8.0 (Jessie)
    cpe:2.3:o:debian:debian_linux:8.0
CVSS
Base: 7.5 (as of 08-07-2016 - 16:52)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-2582-1.NASL
    description A use-after-free was discovered in the DOM implementation in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash, or execute arbitrary code with the privileges of the sandboxed render process. (CVE-2015-1243) Multiple security issues were discovered in Chromium. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to read uninitialized memory, cause a denial of service via application crash or execute arbitrary code with the privileges of the user invoking the program. (CVE-2015-1250). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 83277
    published 2015-05-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=83277
    title Ubuntu 14.04 LTS / 14.10 / 15.04 : oxide-qt vulnerabilities (USN-2582-1)
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_GOOGLE_CHROME_42_0_2311_135.NASL
    description The version of Google Chrome installed on the remote Mac OS X host is prior to 42.0.2311.135. It is, therefore, affected by multiple vulnerabilities : - An unspecified user-after-free memory error exists in DOM. (CVE-2015-1243) - Other unspecified errors exists. No other details are available. (CVE-2015-1250) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2015-05-24
    plugin id 83137
    published 2015-04-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=83137
    title Google Chrome < 42.0.2311.135 Multiple Vulnerabilities (Mac OS X)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2015-0921.NASL
    description Updated chromium-browser packages that fix multiple security issues and one bug are now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Chromium is an open source web browser, powered by WebKit (Blink). Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash or, potentially, execute arbitrary code with the privileges of the user running Chromium. (CVE-2015-1243, CVE-2015-1250) This update also fixes the following bug : * Prior to this update, Chromium did not accept GNOME's system proxy settings due to having GConf support disabled. This issue has been resolved in this update. (BZ#1217065) All Chromium users should upgrade to these updated packages, which contain Chromium version 42.0.2311.135, which corrects these issues. After installing the update, Chromium must be restarted for the changes to take effect.
    last seen 2019-02-21
    modified 2018-12-20
    plugin id 83173
    published 2015-05-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=83173
    title RHEL 6 : chromium-browser (RHSA-2015:0921)
  • NASL family Windows
    NASL id GOOGLE_CHROME_42_0_2311_135.NASL
    description The version of Google Chrome installed on the remote Windows host is prior to 42.0.2311.135. It is, therefore, affected by multiple vulnerabilities : - An unspecified user-after-free memory error exists in DOM. (CVE-2015-1243) - Other unspecified errors exists. No other details are available. (CVE-2015-1250) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2015-05-24
    plugin id 83136
    published 2015-04-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=83136
    title Google Chrome < 42.0.2311.135 Multiple Vulnerabilities
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-3242.NASL
    description Several vulnerabilities were discovered in the chromium web browser : - CVE-2015-1243 Saif El-Sherei discovered a use-after-free issue. - CVE-2015-1250 The chrome 42 team found and fixed multiple issues during internal auditing.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 83191
    published 2015-05-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=83191
    title Debian DSA-3242-1 : chromium-browser - security update
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_210F80B9EDE411E481C400262D5ED8EE.NASL
    description Google Chrome Releases reports : 5 security fixes in this release, including : - [453279] High CVE-2015-1243: Use-after-free in DOM. Credit to Saif El-Sherei. - [481777] CVE-2015-1250: Various fixes from internal audits, fuzzing and other initiatives.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 83130
    published 2015-04-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=83130
    title FreeBSD : chromium -- multiple vulnerabilities (210f80b9-ede4-11e4-81c4-00262d5ed8ee)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2015-354.NASL
    description Chromium was updated to 42.0.2311.135 to fix security issues and bugs. The following vulnerabilities were fixed : - CVE-2015-1243: Use-after-free in DOM - CVE-2015-1250: Various fixes from internal audits, fuzzing and other initiatives.
    last seen 2019-02-21
    modified 2015-05-24
    plugin id 83393
    published 2015-05-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=83393
    title openSUSE Security Update : Chromium (openSUSE-2015-354)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201506-04.NASL
    description The remote host is affected by the vulnerability described in GLSA-201506-04 (Chromium: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Chromium. Please review the CVE identifiers referenced below for details. Impact : A remote attacker can cause arbitrary remote code execution, Denial of Service or bypass of security mechanisms. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2015-06-28
    plugin id 84332
    published 2015-06-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=84332
    title GLSA-201506-04 : Chromium: Multiple vulnerabilities
redhat via4
advisories
rhsa
id RHSA-2015:0921
refmap via4
bid 74389
confirm
debian DSA-3242
gentoo GLSA-201506-04
sectrack 1032234
suse openSUSE-SU-2015:0853
ubuntu USN-2582-1
Last major update 02-01-2017 - 21:59
Published 01-05-2015 - 06:59
Back to Top