8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.002 Low
EPSS
Percentile
59.3%
Severity: High
Date : 2019-10-11
CVE-ID : CVE-2019-13693 CVE-2019-13694 CVE-2019-13695 CVE-2019-13696
CVE-2019-13697
Package : chromium
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-1043
The package chromium before version 77.0.3865.120-1 is vulnerable to
multiple issues including arbitrary code execution and information
disclosure.
Upgrade to 77.0.3865.120-1.
The problems have been fixed upstream in version 77.0.3865.120.
None.
A use-after-free vulnerability has been found in the IndexedDB
component of the chromium browser before 77.0.3865.120.
A use-after-free vulnerability has been found in the WebRTC component
of the chromium browser before 77.0.3865.120.
A use-after-free vulnerability has been found in the audio component of
the chromium browser before 77.0.3865.120.
A use-after-free vulnerability has been found in the V8 component of
the chromium browser before 77.0.3865.120.
A cross-origin size leak vulnerability has been found in the chromium
browser before 77.0.3865.120.
A remote attacker can access sensitive information or execute arbitrary
code on the affected host.
https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop.html
https://crbug.com/1005753
https://crbug.com/1005251
https://crbug.com/1004730
https://crbug.com/1000635
https://crbug.com/990849
https://security.archlinux.org/CVE-2019-13693
https://security.archlinux.org/CVE-2019-13694
https://security.archlinux.org/CVE-2019-13695
https://security.archlinux.org/CVE-2019-13696
https://security.archlinux.org/CVE-2019-13697
chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop.html
crbug.com/1000635
crbug.com/1004730
crbug.com/1005251
crbug.com/1005753
crbug.com/990849
security.archlinux.org/AVG-1043
security.archlinux.org/CVE-2019-13693
security.archlinux.org/CVE-2019-13694
security.archlinux.org/CVE-2019-13695
security.archlinux.org/CVE-2019-13696
security.archlinux.org/CVE-2019-13697
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.002 Low
EPSS
Percentile
59.3%