Vulnerability Details : CVE-2013-0892
Multiple unspecified vulnerabilities in the IPC layer in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allow remote attackers to cause a denial of service or possibly have other impact via unknown vectors.
Vulnerability category: Denial of service
Products affected by CVE-2013-0892
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-0892
1.28%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 84 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-0892
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2013-0892
-
https://code.google.com/p/chromium/issues/detail?id=169295
169295 - IPC: bad pointer used in browser if renderer sends mismatched vector lengths - chromium - MonorailExploit;Issue Tracking;Mailing List;Patch;Vendor Advisory
-
https://code.google.com/p/chromium/issues/detail?id=166493
166493 - IPC: missing integer checks on Pepper UDP socket handling - chromium - MonorailIssue Tracking;Mailing List;Patch;Vendor Advisory
-
https://code.google.com/p/chromium/issues/detail?id=165747
165747 - IPC: renderer out-of-bounds crash creating 3D context from malformed PPAPI message - chromium - MonorailExploit;Issue Tracking;Mailing List;Patch;Vendor Advisory
-
https://code.google.com/p/chromium/issues/detail?id=165836
165836 - Information leak when sending messages cross process that use WriteData() on structures/objects which contain padding bytes. - chromium - MonorailIssue Tracking;Mailing List;Patch;Vendor Advisory
-
http://googlechromereleases.blogspot.com/2013/02/stable-channel-update_21.html
Chrome Releases: Stable Channel UpdateRelease Notes;Vendor Advisory
-
https://code.google.com/p/chromium/issues/detail?id=164946
164946 - IPC: GPU messages have integer truncation (bad use of size_t) and integer sign extension (bad use of signed type) issues - chromium - MonorailIssue Tracking;Mailing List;Patch;Vendor Advisory
-
https://code.google.com/p/chromium/issues/detail?id=168710
168710 - IPC: avoid operator-new based integer overflow in Flash menu deserialization - chromium - MonorailExploit;Issue Tracking;Mailing List;Patch;Vendor Advisory
-
https://code.google.com/p/chromium/issues/detail?id=164958
164958 - IPC: PPAPI messages have problems with use of signed integers for lengths - chromium - MonorailIssue Tracking;Mailing List;Patch;Vendor Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15586
Repository / Oval RepositoryThird Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2013-03/msg00045.html
openSUSE-SU-2013:0454-1: moderate: chromium: updated to 27.0.1425Broken Link;Third Party Advisory
Jump to