Risk | Medium |
Patch available | NO |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2015-1251 |
CWE-ID | CWE-416 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Debian Linux Operating systems & Components / Operating system |
Vendor | Debian |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU40788
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2015-1251
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing a crafted document. <a href="http://cwe.mitre.org/data/definitions/416. A remote attackers can execute arbitrary code.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsDebian Linux: 8.0
CPE2.3 External linkshttps://blog.skylined.nl/20161123001.html
https://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html
https://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html
https://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html
https://seclists.org/fulldisclosure/2016/Nov/136
https://www.debian.org/security/2015/dsa-3267
https://www.securityfocus.com/archive/1/539824/100/0/threaded
https://www.securityfocus.com/bid/74723
https://www.securitytracker.com/id/1032375
https://zerodayinitiative.com/advisories/ZDI-15-236/
https://code.google.com/p/chromium/issues/detail?id=481015
https://security.gentoo.org/glsa/201506-04
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.