Vulnerability Description
Use-after-free vulnerability in the GIFImageReader::parseData function in platform/image-decoders/gif/GIFImageReader.cpp in Blink, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted frame size in a GIF image.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Enterprise Linux Desktop Supplementary | 6.0 |
| Redhat | Enterprise Linux Server Supplementary | 6.0 |
| Redhat | Enterprise Linux Server Supplementary Eus | 6.6.z |
| Redhat | Enterprise Linux Workstation Supplementary | 6.0 |
| Canonical | Ubuntu Linux | 14.04 |
| Chrome | <= 40.0.2214.115 |
References
- http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html
- http://rhn.redhat.com/errata/RHSA-2015-0627.html
- http://www.securityfocus.com/bid/72901
- http://www.ubuntu.com/usn/USN-2521-1
- https://code.google.com/p/chromium/issues/detail?id=437651
- https://security.gentoo.org/glsa/201503-12
- https://src.chromium.org/viewvc/blink?revision=188423&view=revision
- http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html
- http://rhn.redhat.com/errata/RHSA-2015-0627.html
- http://www.securityfocus.com/bid/72901
- http://www.ubuntu.com/usn/USN-2521-1
- https://code.google.com/p/chromium/issues/detail?id=437651
- https://security.gentoo.org/glsa/201503-12
- https://src.chromium.org/viewvc/blink?revision=188423&view=revision
FAQ
What is CVE-2015-1220?
CVE-2015-1220 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Use-after-free vulnerability in the GIFImageReader::parseData function in platform/image-decoders/gif/GIFImageReader.cpp in Blink, as used in Google Chrome before 41.0.2272.76, allows remote attackers...
How severe is CVE-2015-1220?
CVE-2015-1220 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-1220?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Enterprise Linux Desktop Supplementary, Redhat Enterprise Linux Server Supplementary, Redhat Enterprise Linux Server Supplementary Eus, Redhat Enterprise Linux Workstation Supplementary, Canonical Ubuntu Linux.