First published: Mon Mar 09 2015(Updated: )
Multiple use-after-free vulnerabilities in core/html/HTMLInputElement.cpp in the DOM implementation in Blink, as used in Google Chrome before 41.0.2272.76, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger extraneous change events, as demonstrated by events for invalid input or input to read-only fields, related to the initializeTypeInParsing and updateType functions.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome | <=40.0.2214.115 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1223 has a medium severity rating, primarily due to its potential for causing denial of service.
To fix CVE-2015-1223, update Google Chrome to version 41.0.2272.76 or later.
CVE-2015-1223 affects Google Chrome versions before 41.0.2272.76.
The potential impacts of CVE-2015-1223 include denial of service and possibly other unspecified consequences.
Yes, CVE-2015-1223 can be exploited remotely by attackers to trigger the vulnerabilities.