CVE-2015-1299Use After Free in Google Chrome

CWE-416Use After Free10 documents7 sources
Severity
7.5HIGHNVD
OSV6.4
EPSS
1.9%
top 16.86%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 3
Latest updateMay 17

Description

Use-after-free vulnerability in the shared-timer implementation in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging erroneous timer firing, related to ThreadTimers.cpp and Timer.cpp.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages1 packages

NVDgoogle/chrome44.0.2403

🔴Vulnerability Details

3
GHSA
GHSA-cr9h-qgj5-h762: Use-after-free vulnerability in the shared-timer implementation in Blink, as used in Google Chrome before 452022-05-17
OSV
oxide-qt vulnerabilities2015-09-08
OSV
CVE-2015-1299: Use-after-free vulnerability in the shared-timer implementation in Blink, as used in Google Chrome before 452015-09-02

💥Exploits & PoCs

1
Exploit-DB
Wireshark - 'infer_pkt_encap' Heap Out-of-Bounds Read2015-12-22

📋Vendor Advisories

3
Ubuntu
Oxide vulnerabilities2015-09-08
Red Hat
chromium-browser: Use-after-free in Blink2015-09-01
Red Hat
webkitgtk: arbitrary code execution and denial of service via a crafted web site (WSA-2015-0001)2015-01-26

💬Community

2
Bugzilla
CVE-2015-1299 chromium-browser: Use-after-free in Blink2015-09-02
Bugzilla
CVE-2014-1299 webkitgtk: arbitrary code execution and denial of service via a crafted web site (WSA-2015-0001)2015-01-27