Use-after-free vulnerability in the HTMLScriptElement::didMoveToNewDocument function in core/html/HTMLScriptElement.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving movement of a SCRIPT element across documents.
This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Link | Tags |
---|---|
http://secunia.com/advisories/62665 | third party advisory |
https://code.google.com/p/chromium/issues/detail?id=443115 | |
https://src.chromium.org/viewvc/blink?revision=187458&view=revision | |
http://googlechromereleases.blogspot.com/2015/01/stable-update.html | |
http://secunia.com/advisories/62575 | third party advisory |
http://www.ubuntu.com/usn/USN-2476-1 | vendor advisory |
http://www.securityfocus.com/bid/72288 | vdb entry |
http://security.gentoo.org/glsa/glsa-201502-13.xml | vendor advisory |
http://www.securitytracker.com/id/1031623 | vdb entry |
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html | vendor advisory |
http://rhn.redhat.com/errata/RHSA-2015-0093.html | vendor advisory |
http://secunia.com/advisories/62383 | third party advisory |