[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2013-6631Date: (C)2013-11-28   (M)2023-12-28


Use-after-free vulnerability in the Channel::SendRTCPPacket function in voice_engine/channel.cc in libjingle in WebRTC, as used in Google Chrome before 31.0.1650.48 and other products, allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via vectors that trigger the absence of certain statistics initialization, leading to the skipping of a required DeRegisterExternalTransport call.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.5
Exploit Score: 10.0
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
DSA-2799
http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
https://code.google.com/p/chromium/issues/detail?id=296804
https://code.google.com/p/webrtc/source/detail?r=4827
https://webrtc-codereview.appspot.com/2275008
openSUSE-SU-2013:1776
openSUSE-SU-2013:1777
openSUSE-SU-2013:1861
openSUSE-SU-2014:0065

CPE    44
cpe:/a:google:chrome:31.0.1650.44
cpe:/a:google:chrome:31.0.1650.43
cpe:/a:google:chrome:31.0.1650.46
cpe:/a:google:chrome:31.0.1650.45
...
OVAL    11
oval:org.secpod.oval:def:16053
oval:org.secpod.oval:def:16069
oval:org.secpod.oval:def:16037
oval:org.secpod.oval:def:16085
...

© SecPod Technologies