ID CVE-2015-1321
Summary Use-after-free vulnerability in the file picker implementation in Oxide before 1.6.5 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted webpage. <a href="http://cwe.mitre.org/data/definitions/416.html">CWE-416: Use After Free</a>
References
Vulnerable Configurations
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:15.1:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:15.1:*:*:*:*:*:*:*
  • cpe:2.3:a:oxide_project:oxide:-:*:*:*:*:*:*:*
    cpe:2.3:a:oxide_project:oxide:-:*:*:*:*:*:*:*
  • cpe:2.3:a:oxide_project:oxide:1.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:oxide_project:oxide:1.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oxide_project:oxide:1.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:oxide_project:oxide:1.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oxide_project:oxide:1.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:oxide_project:oxide:1.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oxide_project:oxide:1.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:oxide_project:oxide:1.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oxide_project:oxide:1.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:oxide_project:oxide:1.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oxide_project:oxide:1.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:oxide_project:oxide:1.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:oxide_project:oxide:1.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:oxide_project:oxide:1.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oxide_project:oxide:1.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:oxide_project:oxide:1.6.4:*:*:*:*:*:*:*
CVSS
Base: 6.8 (as of 30-04-2015 - 18:27)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:P
refmap via4
ubuntu USN-2570-1
Last major update 30-04-2015 - 18:27
Published 29-04-2015 - 20:59
Last modified 30-04-2015 - 18:27
Back to Top