Vulnerability & Exploit Database

Displaying all 6 entries

Results for: CVE-2015-1279 Back to search

SUSE: CVE-2015-1279: SUSE Linux Security Advisory Vulnerability

  • Severity: 8
  • Published: July 22, 2015

Integer overflow in the CJBig2_Image::expand function in fxcodec/jbig2/JBig2_Image.cpp in PDFium, as used in Google Chrome before 44.0.2403.89, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via large height and stride values.

RHSA-2015:1499: chromium-browser security update Vulnerability

  • Severity: 8
  • Published: July 22, 2015

Chromium is an open-source web browser, powered by WebKit (Blink).Several flaws were found in the processing of malformed web content. A webpage containing malicious content could cause Chromium to crash or,potentially, execute arbitrary code with the privileges of the user runningChromium. (CVE-2015-1271, CVE-2015-1270, CVE-2015-1272, C...

Google Chrome Vulnerability: CVE-2015-1279 Vulnerability

  • Severity: 8
  • Published: July 22, 2015

Integer overflow in the CJBig2_Image::expand function in fxcodec/jbig2/JBig2_Image.cpp in PDFium, as used in Google Chrome before 44.0.2403.89, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via large height and stride values.

Gentoo Linux: CVE-2015-1279: Chromium: Multiple vulnerabilities Vulnerability

  • Severity: 8
  • Published: July 22, 2015

Integer overflow in the CJBig2_Image::expand function in fxcodec/jbig2/JBig2_Image.cpp in PDFium, as used in Google Chrome before 44.0.2403.89, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via large height and stride values.

DSA-3315-1 chromium-browser -- security update Vulnerability

  • Severity: 8
  • Published: July 22, 2015

Multiple unspecified vulnerabilities in Google Chrome before 44.0.2403.89 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.