mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
115 lines
3.7 KiB
JSON
115 lines
3.7 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2015-1221",
|
||
|
"sourceIdentifier": "cve-coordination@google.com",
|
||
|
"published": "2015-03-09T00:59:14.653",
|
||
|
"lastModified": "2016-12-22T02:59:30.067",
|
||
|
"vulnStatus": "Modified",
|
||
|
"evaluatorComment": "<a href=\"http://cwe.mitre.org/data/definitions/416.html\">CWE-416: Use After Free</a>",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "Use-after-free vulnerability in Blink, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect ordering of operations in the Web SQL Database thread relative to Blink's main thread, related to the shutdown function in web/WebKit.cpp."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "Vulnerabilidad de uso despu\u00e9s de liberaci\u00f3n en Blink, utilizado en Google Chrome anterior a 41.0.2272.76, permite a atacantes remotos causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto no especificado mediante el aprovechamiento del ordenado incorrecto de operaciones en el hilo de la base de datos SQL web relacionado con el hilo principal de Blink, relacionado con la funci\u00f3n shutdown en web/WebKit.cpp."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
|
"accessVector": "NETWORK",
|
||
|
"accessComplexity": "LOW",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "PARTIAL",
|
||
|
"integrityImpact": "PARTIAL",
|
||
|
"availabilityImpact": "PARTIAL",
|
||
|
"baseScore": 7.5
|
||
|
},
|
||
|
"baseSeverity": "HIGH",
|
||
|
"exploitabilityScore": 10.0,
|
||
|
"impactScore": 6.4,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": false
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "NVD-CWE-Other"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||
|
"versionEndIncluding": "40.0.2214.115",
|
||
|
"matchCriteriaId": "8E4473BA-37DE-4AF1-A828-99AA9D83AAE7"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html",
|
||
|
"source": "cve-coordination@google.com",
|
||
|
"tags": [
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-0627.html",
|
||
|
"source": "cve-coordination@google.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securityfocus.com/bid/72901",
|
||
|
"source": "cve-coordination@google.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.ubuntu.com/usn/USN-2521-1",
|
||
|
"source": "cve-coordination@google.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://code.google.com/p/chromium/issues/detail?id=455368",
|
||
|
"source": "cve-coordination@google.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://security.gentoo.org/glsa/201503-12",
|
||
|
"source": "cve-coordination@google.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://src.chromium.org/viewvc/blink?revision=190021&view=revision",
|
||
|
"source": "cve-coordination@google.com",
|
||
|
"tags": [
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "https://src.chromium.org/viewvc/blink?revision=190035&view=revision",
|
||
|
"source": "cve-coordination@google.com"
|
||
|
}
|
||
|
]
|
||
|
}
|