CVE-2015-1231

Severity

75%

Complexity

99%

Confidentiality

106%

Multiple unspecified vulnerabilities in Google Chrome before 41.0.2272.76 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.

Multiple unspecified vulnerabilities in Google Chrome before 41.0.2272.76 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.

CVSS 2.0 Base Score 7.5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P).

Overview

First reported 9 years ago

2015-03-09 00:59:00

Last updated 8 years ago

2016-12-22 02:59:00

Affected Software

Red Hat Enterprise Linux Desktop Supplementary 6.0 (v. 6)

6.0

Red Hat Enterprise Linux Server 6.0

6.0

Red Hat Enterprise Linux Workstation Supplementary 6.0 (v. 6)

6.0

Canonical Ubuntu Linux 14.04 LTS (Long-Term Support)

14.04

Canonical Ubuntu Linux 14.10

14.10

References

http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html

Vendor Advisory

RHSA-2015:0627

Third Party Advisory

USN-2521-1

Third Party Advisory

https://code.google.com/p/chromium/issues/detail?id=383777

https://code.google.com/p/chromium/issues/detail?id=404300

https://code.google.com/p/chromium/issues/detail?id=406871

https://code.google.com/p/chromium/issues/detail?id=421499

https://code.google.com/p/chromium/issues/detail?id=426762

https://code.google.com/p/chromium/issues/detail?id=429379

https://code.google.com/p/chromium/issues/detail?id=429679

https://code.google.com/p/chromium/issues/detail?id=433078

https://code.google.com/p/chromium/issues/detail?id=437636

https://code.google.com/p/chromium/issues/detail?id=438364

https://code.google.com/p/chromium/issues/detail?id=438638

https://code.google.com/p/chromium/issues/detail?id=439877

https://code.google.com/p/chromium/issues/detail?id=442756

https://code.google.com/p/chromium/issues/detail?id=445831

https://code.google.com/p/chromium/issues/detail?id=448056

https://code.google.com/p/chromium/issues/detail?id=449045

https://code.google.com/p/chromium/issues/detail?id=449049

https://code.google.com/p/chromium/issues/detail?id=449610

https://code.google.com/p/chromium/issues/detail?id=449777

https://code.google.com/p/chromium/issues/detail?id=450653

https://code.google.com/p/chromium/issues/detail?id=450654

https://code.google.com/p/chromium/issues/detail?id=451685

https://code.google.com/p/chromium/issues/detail?id=451753

https://code.google.com/p/chromium/issues/detail?id=451755

https://code.google.com/p/chromium/issues/detail?id=452324

https://code.google.com/p/chromium/issues/detail?id=452455

https://code.google.com/p/chromium/issues/detail?id=453126

https://code.google.com/p/chromium/issues/detail?id=453994

https://code.google.com/p/chromium/issues/detail?id=459115

https://code.google.com/p/chromium/issues/detail?id=460145

https://code.google.com/p/chromium/issues/detail?id=463349

GLSA-201503-12

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.