First published: Thu Jul 23 2015(Updated: )
Integer overflow in the CJBig2_Image::expand function in fxcodec/jbig2/JBig2_Image.cpp in PDFium, as used in Google Chrome before 44.0.2403.89, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via large height and stride values.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server Supplementary | =6.0 | |
Red Hat Enterprise Linux Server Supplementary EUS | =6.7z | |
Red Hat Enterprise Linux Workstation Supplementary | =6.0 | |
Debian | =8.0 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 | |
Google Chrome (Trace Event) | <=43.0.2357.134 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1279 has a severity rating that indicates it can lead to denial of service attacks due to a heap-based buffer overflow.
To fix CVE-2015-1279, users should update to the latest version of Google Chrome or apply patches provided by their Linux distribution.
CVE-2015-1279 affects Google Chrome versions prior to 44.0.2403.89 and various Red Hat and openSUSE Linux versions.
CVE-2015-1279 can allow remote attackers to execute a denial of service attack that results in a heap-based buffer overflow.
Yes, users need to ensure they have upgraded their software to versions that are not vulnerable to CVE-2015-1279.