Vulnerability Description
Double free vulnerability in the opj_j2k_copy_default_tcp_and_create_tcd function in j2k.c in OpenJPEG before r3002, as used in PDFium in Google Chrome before 45.0.2454.85, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by triggering a memory-allocation failure.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Chrome | <= 44.0.2403 |
References
- http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168736.ht
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169258.ht
- http://www.debian.org/security/2016/dsa-3665
- http://www.securitytracker.com/id/1033472
- https://code.google.com/p/chromium/issues/detail?id=486538
- https://code.google.com/p/chromium/issues/detail?id=526825
- https://code.google.com/p/openjpeg/issues/detail?id=492
- http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168736.ht
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169258.ht
- http://www.debian.org/security/2016/dsa-3665
- http://www.securitytracker.com/id/1033472
- https://code.google.com/p/chromium/issues/detail?id=486538
- https://code.google.com/p/chromium/issues/detail?id=526825
FAQ
What is CVE-2015-6581?
CVE-2015-6581 is a vulnerability with a CVSS score of 7.5 (HIGH). Double free vulnerability in the opj_j2k_copy_default_tcp_and_create_tcd function in j2k.c in OpenJPEG before r3002, as used in PDFium in Google Chrome before 45.0.2454.85, allows remote attackers to ...
How severe is CVE-2015-6581?
CVE-2015-6581 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-6581?
Check the references section above for vendor advisories and patch information. Affected products include: Google Chrome.