Search for vulnerabilities
Vulnerability details: VCID-s9ke-9tjt-aaam
Vulnerability ID VCID-s9ke-9tjt-aaam
Aliases CVE-2015-1219
Summary Integer overflow in the SkMallocPixelRef::NewAllocate function in core/SkMallocPixelRef.cpp in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted allocation of a large amount of memory during WebGL rendering.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
generic_textual Medium http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-1219.html
rhas Important https://access.redhat.com/errata/RHSA-2015:0627
epss 0.00702 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00702 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00702 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00702 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00702 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00702 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00702 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00702 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00702 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00702 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00702 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00702 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.01010 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.01010 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.01010 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.01010 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.01010 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.01010 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.01010 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.01010 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.01010 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.01010 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.01010 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.01010 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.01010 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.01010 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.01010 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.01010 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
epss 0.01679 https://api.first.org/data/v1/epss?cve=CVE-2015-1219
rhbs high https://bugzilla.redhat.com/show_bug.cgi?id=1198526
generic_textual Medium https://code.google.com/p/chromium/issues/detail?id=446164
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1219
cvssv2 7.5 https://nvd.nist.gov/vuln/detail/CVE-2015-1219
generic_textual Medium https://skia.googlesource.com/skia/+/2ff257bd95c732b9cebc3aac03fbed72d6e6082a
generic_textual Medium https://ubuntu.com/security/notices/USN-2521-1
Reference id Reference type URL
http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html
http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-1219.html
http://rhn.redhat.com/errata/RHSA-2015-0627.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1219.json
https://api.first.org/data/v1/epss?cve=CVE-2015-1219
https://code.google.com/p/chromium/issues/detail?id=446164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1219
https://security.gentoo.org/glsa/201503-12
https://skia.googlesource.com/skia/+/2ff257bd95c732b9cebc3aac03fbed72d6e6082a
https://ubuntu.com/security/notices/USN-2521-1
http://www.securityfocus.com/bid/72901
http://www.ubuntu.com/usn/USN-2521-1
1198526 https://bugzilla.redhat.com/show_bug.cgi?id=1198526
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.6.z:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.6.z:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
CVE-2015-1219 https://nvd.nist.gov/vuln/detail/CVE-2015-1219
RHSA-2015:0627 https://access.redhat.com/errata/RHSA-2015:0627
USN-2521-1 https://usn.ubuntu.com/2521-1/
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2015-1219
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.69734
EPSS Score 0.00702
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.