First published: Fri May 01 2015(Updated: )
Use-after-free vulnerability in the MutationObserver::disconnect function in core/dom/MutationObserver.cpp in the DOM implementation in Blink, as used in Google Chrome before 42.0.2311.135, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering an attempt to unregister a MutationObserver object that is not currently registered.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome (Trace Event) | <=42.0.2311.87 | |
Debian | =8.0 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
Ubuntu | =15.04 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server Supplementary | =6.0 | |
Red Hat Enterprise Linux Server Supplementary EUS | =6.6.z | |
Red Hat Enterprise Linux Workstation Supplementary | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1243 has a high severity rating due to its potential for remote denial of service and unspecified impacts.
To fix CVE-2015-1243, update Google Chrome to version 42.0.2311.135 or later, or apply relevant patches for affected operating systems.
CVE-2015-1243 affects Google Chrome versions earlier than 42.0.2311.135 and specific versions of Debian and Ubuntu Linux distributions.
CVE-2015-1243 is classified as a use-after-free vulnerability in the MutationObserver functionality within the Blink engine.
Yes, CVE-2015-1243 can be exploited remotely to cause denial of service conditions.