Lucene search

K
nvd[email protected]NVD:CVE-2013-6649
HistoryJan 28, 2014 - 2:30 p.m.

CVE-2013-6649

2014-01-2814:30:33
CWE-399
web.nvd.nist.gov

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

6.9 Medium

AI Score

Confidence

High

0.009 Low

EPSS

Percentile

83.2%

Use-after-free vulnerability in the RenderSVGImage::paint function in core/rendering/svg/RenderSVGImage.cpp in Blink, as used in Google Chrome before 32.0.1700.102, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a zero-size SVG image.

Affected configurations

NVD
Node
googlechromeRange≀32.0.1700.101
OR
googlechromeMatch32.0.1700.0
OR
googlechromeMatch32.0.1700.2
OR
googlechromeMatch32.0.1700.3
OR
googlechromeMatch32.0.1700.4
OR
googlechromeMatch32.0.1700.5
OR
googlechromeMatch32.0.1700.6
OR
googlechromeMatch32.0.1700.7
OR
googlechromeMatch32.0.1700.8
OR
googlechromeMatch32.0.1700.9
OR
googlechromeMatch32.0.1700.10
OR
googlechromeMatch32.0.1700.11
OR
googlechromeMatch32.0.1700.12
OR
googlechromeMatch32.0.1700.13
OR
googlechromeMatch32.0.1700.14
OR
googlechromeMatch32.0.1700.15
OR
googlechromeMatch32.0.1700.16
OR
googlechromeMatch32.0.1700.17
OR
googlechromeMatch32.0.1700.18
OR
googlechromeMatch32.0.1700.19
OR
googlechromeMatch32.0.1700.21
OR
googlechromeMatch32.0.1700.22
OR
googlechromeMatch32.0.1700.23
OR
googlechromeMatch32.0.1700.24
OR
googlechromeMatch32.0.1700.26
OR
googlechromeMatch32.0.1700.27
OR
googlechromeMatch32.0.1700.28
OR
googlechromeMatch32.0.1700.29
OR
googlechromeMatch32.0.1700.30
OR
googlechromeMatch32.0.1700.31
OR
googlechromeMatch32.0.1700.32
OR
googlechromeMatch32.0.1700.33
OR
googlechromeMatch32.0.1700.34
OR
googlechromeMatch32.0.1700.35
OR
googlechromeMatch32.0.1700.38
OR
googlechromeMatch32.0.1700.39
OR
googlechromeMatch32.0.1700.41
OR
googlechromeMatch32.0.1700.50
OR
googlechromeMatch32.0.1700.51
OR
googlechromeMatch32.0.1700.52
OR
googlechromeMatch32.0.1700.53
OR
googlechromeMatch32.0.1700.54
OR
googlechromeMatch32.0.1700.55
OR
googlechromeMatch32.0.1700.56
OR
googlechromeMatch32.0.1700.57
OR
googlechromeMatch32.0.1700.58
OR
googlechromeMatch32.0.1700.59
OR
googlechromeMatch32.0.1700.62
OR
googlechromeMatch32.0.1700.63
OR
googlechromeMatch32.0.1700.64
OR
googlechromeMatch32.0.1700.65
OR
googlechromeMatch32.0.1700.66
OR
googlechromeMatch32.0.1700.67
OR
googlechromeMatch32.0.1700.68
OR
googlechromeMatch32.0.1700.69
OR
googlechromeMatch32.0.1700.70
OR
googlechromeMatch32.0.1700.71
OR
googlechromeMatch32.0.1700.72
OR
googlechromeMatch32.0.1700.74
OR
googlechromeMatch32.0.1700.75
OR
googlechromeMatch32.0.1700.76
OR
googlechromeMatch32.0.1700.77
OR
googlechromeMatch32.0.1700.94
OR
googlechromeMatch32.0.1700.95
OR
googlechromeMatch32.0.1700.96
OR
googlechromeMatch32.0.1700.97
OR
googlechromeMatch32.0.1700.98
OR
googlechromeMatch32.0.1700.99
OR
googlechromeMatch32.0.1700.100
Node
debiandebian_linuxMatch7.0
OR
debiandebian_linuxMatch8.0
Node
opensuseopensuseMatch12.3
OR
opensuseopensuseMatch13.1

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

6.9 Medium

AI Score

Confidence

High

0.009 Low

EPSS

Percentile

83.2%