Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2017-15395 : What You Need to Know

Learn about CVE-2017-15395 affecting Google Chrome prior to 62.0.3202.62. This use after free vulnerability in Blink allowed remote attackers to exploit heap corruption.

Google Chrome prior to version 62.0.3202.62 was affected by a use after free vulnerability in the Blink rendering engine, allowing remote attackers to exploit heap corruption.

Understanding CVE-2017-15395

Before version 62.0.3202.62, a vulnerability in Blink, the rendering engine in Google Chrome, allowed for a use after free exploit that could be triggered by a remote attacker.

What is CVE-2017-15395?

        A use after free vulnerability in Blink in Google Chrome prior to 62.0.3202.62
        Exploitable by a remote attacker through a specially crafted HTML page
        Could lead to heap corruption and a NULL pointer dereference in ImageCapture

The Impact of CVE-2017-15395

        Remote attackers could potentially corrupt the heap in affected systems
        Exploitation could result in a NULL pointer dereference in ImageCapture

Technical Details of CVE-2017-15395

Google Chrome prior to version 62.0.3202.62 was susceptible to a use after free vulnerability in the Blink rendering engine.

Vulnerability Description

        Use after free vulnerability in Blink in Google Chrome
        Allowed remote attackers to exploit heap corruption via a crafted HTML page
        Resulted in a NULL pointer dereference in ImageCapture

Affected Systems and Versions

        Product: Google Chrome prior to 62.0.3202.62
        Vendor: n/a
        Versions: Google Chrome prior to 62.0.3202.62

Exploitation Mechanism

        Remote attackers could trigger the vulnerability by visiting a specially crafted HTML page
        This could potentially corrupt the heap and lead to a NULL pointer dereference in ImageCapture

Mitigation and Prevention

Immediate Steps to Take:

        Update Google Chrome to version 62.0.3202.62 or later
        Avoid visiting untrusted or suspicious websites

Long-Term Security Practices:

        Regularly update software and applications to the latest versions
        Implement strong security measures to prevent remote exploitation

Patching and Updates:

        Google released a stable channel update addressing this vulnerability

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now