CVE-2015-1210

The V8ThrowException::createDOMException function in bindings/core/v8/V8ThrowException.cpp in the V8 bindings in Blink, as used in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android, does not properly consider frame access restrictions during the throwing of an exception, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
References
Link Resource
http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html
http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html
http://rhn.redhat.com/errata/RHSA-2015-0163.html
http://secunia.com/advisories/62670
http://secunia.com/advisories/62818
http://secunia.com/advisories/62917
http://secunia.com/advisories/62925
http://security.gentoo.org/glsa/glsa-201502-13.xml
http://www.securityfocus.com/bid/72497
http://www.securitytracker.com/id/1031709
http://www.ubuntu.com/usn/USN-2495-1
https://code.google.com/p/chromium/issues/detail?id=453979
https://exchange.xforce.ibmcloud.com/vulnerabilities/100716
https://src.chromium.org/viewvc/blink?revision=189365&view=revision
http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html
http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html
http://rhn.redhat.com/errata/RHSA-2015-0163.html
http://secunia.com/advisories/62670
http://secunia.com/advisories/62818
http://secunia.com/advisories/62917
http://secunia.com/advisories/62925
http://security.gentoo.org/glsa/glsa-201502-13.xml
http://www.securityfocus.com/bid/72497
http://www.securitytracker.com/id/1031709
http://www.ubuntu.com/usn/USN-2495-1
https://code.google.com/p/chromium/issues/detail?id=453979
https://exchange.xforce.ibmcloud.com/vulnerabilities/100716
https://src.chromium.org/viewvc/blink?revision=189365&view=revision
Configurations

Configuration 1 (hide)

cpe:2.3:a:google:chrome:*:*:*:*:*:android:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

History

21 Nov 2024, 02:24

Type Values Removed Values Added
References () http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html - () http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html -
References () http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html - () http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html -
References () http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html - () http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html -
References () http://rhn.redhat.com/errata/RHSA-2015-0163.html - () http://rhn.redhat.com/errata/RHSA-2015-0163.html -
References () http://secunia.com/advisories/62670 - () http://secunia.com/advisories/62670 -
References () http://secunia.com/advisories/62818 - () http://secunia.com/advisories/62818 -
References () http://secunia.com/advisories/62917 - () http://secunia.com/advisories/62917 -
References () http://secunia.com/advisories/62925 - () http://secunia.com/advisories/62925 -
References () http://security.gentoo.org/glsa/glsa-201502-13.xml - () http://security.gentoo.org/glsa/glsa-201502-13.xml -
References () http://www.securityfocus.com/bid/72497 - () http://www.securityfocus.com/bid/72497 -
References () http://www.securitytracker.com/id/1031709 - () http://www.securitytracker.com/id/1031709 -
References () http://www.ubuntu.com/usn/USN-2495-1 - () http://www.ubuntu.com/usn/USN-2495-1 -
References () https://code.google.com/p/chromium/issues/detail?id=453979 - () https://code.google.com/p/chromium/issues/detail?id=453979 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/100716 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/100716 -
References () https://src.chromium.org/viewvc/blink?revision=189365&view=revision - () https://src.chromium.org/viewvc/blink?revision=189365&view=revision -

07 Nov 2023, 02:24

Type Values Removed Values Added
References (CONFIRM) https://src.chromium.org/viewvc/blink?revision=189365&view=revision - Patch, Vendor Advisory () https://src.chromium.org/viewvc/blink?revision=189365&view=revision -
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2015-0163.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2015-0163.html -
References (GENTOO) http://security.gentoo.org/glsa/glsa-201502-13.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-201502-13.xml -
References (CONFIRM) http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html - Vendor Advisory () http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html -
References (CONFIRM) https://code.google.com/p/chromium/issues/detail?id=453979 - Exploit, Issue Tracking, Patch, Vendor Advisory () https://code.google.com/p/chromium/issues/detail?id=453979 -
References (SECUNIA) http://secunia.com/advisories/62670 - Third Party Advisory () http://secunia.com/advisories/62670 -
References (CONFIRM) http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html - Vendor Advisory () http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html -
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/100716 - VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/100716 -
References (BID) http://www.securityfocus.com/bid/72497 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/72497 -
References (UBUNTU) http://www.ubuntu.com/usn/USN-2495-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-2495-1 -
References (SECUNIA) http://secunia.com/advisories/62818 - Third Party Advisory () http://secunia.com/advisories/62818 -
References (SECUNIA) http://secunia.com/advisories/62917 - Third Party Advisory () http://secunia.com/advisories/62917 -
References (SECUNIA) http://secunia.com/advisories/62925 - Third Party Advisory () http://secunia.com/advisories/62925 -
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html -
References (SECTRACK) http://www.securitytracker.com/id/1031709 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1031709 -

Information

Published : 2015-02-06 11:59

Updated : 2024-11-21 02:24


NVD link : CVE-2015-1210

Mitre link : CVE-2015-1210

CVE.ORG link : CVE-2015-1210


JSON object : View

Products Affected

redhat

  • enterprise_linux_workstation
  • enterprise_linux_eus
  • enterprise_linux_server
  • enterprise_linux_desktop
  • enterprise_linux_server_aus

apple

  • macos

linux

  • linux_kernel

canonical

  • ubuntu_linux

google

  • chrome

microsoft

  • windows

opensuse

  • opensuse