7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.022 Low
EPSS
Percentile
89.5%
Multiple buffer overflows in runtime.cc in Google V8 before 3.22.24.7, as
used in Google Chrome before 31.0.1650.63, allow remote attackers to cause
a denial of service or possibly have unspecified other impact via vectors
that trigger a large typed array, related to the (1)
Runtime_TypedArrayInitialize and (2)
Runtime_TypedArrayInitializeFromArrayLike functions.
Author | Note |
---|---|
mikesalvatore | The Ubuntu Security Team does not support libv8 |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 12.04 | noarch | chromium-browser | < 31.0.1650.63-0ubuntu0.12.04.1~20131204.1 | UNKNOWN |
ubuntu | 12.10 | noarch | chromium-browser | < 31.0.1650.63-0ubuntu0.12.10.1~20131204.1 | UNKNOWN |
ubuntu | 13.04 | noarch | chromium-browser | < 31.0.1650.63-0ubuntu0.13.04.1~20131204.1 | UNKNOWN |
ubuntu | 13.10 | noarch | chromium-browser | < 31.0.1650.63-0ubuntu0.13.10.1~20131204.1 | UNKNOWN |
code.google.com/p/v8/source/detail?r=17800
googlechromereleases.blogspot.com/2013/12/stable-channel-update.html
www.mail-archive.com/[email protected]/msg79646.html
code.google.com/p/chromium/issues/detail?id=319722
launchpad.net/bugs/cve/CVE-2013-6638
nvd.nist.gov/vuln/detail/CVE-2013-6638
security-tracker.debian.org/tracker/CVE-2013-6638
www.cve.org/CVERecord?id=CVE-2013-6638