Vulnerability Details : CVE-2013-2865
Multiple unspecified vulnerabilities in Google Chrome before 27.0.1453.110 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Vulnerability category: Denial of service
Products affected by CVE-2013-2865
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.87:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.86:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.78:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.77:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.70:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.69:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.62:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.61:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.60:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.52:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.90:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.82:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.81:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.74:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.73:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.66:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.65:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.57:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.56:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.47:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.46:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.39:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.38:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.11:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.0:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.7:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.8:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.51:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.43:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.42:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.34:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.15:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.3:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.4:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.85:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.84:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.83:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.76:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.75:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.68:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.67:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.59:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.58:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.50:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.49:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.41:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.40:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.13:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.12:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.5:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.6:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.89:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.88:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.80:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.79:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.72:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.71:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.64:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.63:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.55:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.54:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.45:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.44:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.37:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.36:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.35:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.1:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.2:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.9:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.10:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.104:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.94:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.108:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.103:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.105:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.91:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.102:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.107:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.93:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:27.0.1453.106:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-2865
0.62%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 79 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-2865
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2013-2865
-
https://code.google.com/p/chromium/issues/detail?id=232763
232763 - use-after-free on WebCore::JPEGImageReader::decode - chromium - MonorailPatch;Issue Tracking
-
https://code.google.com/p/chromium/issues/detail?id=240057
240057 - Heap-use-after-free in WebCore::accumulateDocumentEventTargetRects - chromium - MonorailPatch;Issue Tracking
-
https://code.google.com/p/chromium/issues/detail?id=237429
237429 - Heap-use-after-free in WebCore::EventTarget::dispatchEvent - chromium - MonorailPatch;Issue Tracking
-
https://code.google.com/p/chromium/issues/detail?id=242502
242502 - UNKNOWN in v8::internal::TypeFeedbackOracle::CanRetainOtherContext - chromium - MonorailPatch;Issue Tracking
-
https://code.google.com/p/chromium/issues/detail?id=246389
246389 - Tracking bug for internal security fixes for Chrome 27 release 1 - chromium - MonorailPatch;Issue Tracking
-
https://code.google.com/p/chromium/issues/detail?id=242114
242114 - Heap-use-after-free in WebCore::Range::compareBoundaryPoints - chromium - MonorailPatch;Issue Tracking
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16541
Repository / Oval Repository
-
http://googlechromereleases.blogspot.com/2013/06/stable-channel-update.html
Chrome Releases: Stable Channel UpdateVendor Advisory
-
https://code.google.com/p/chromium/issues/detail?id=164263
164263 - Heap-use-after-free in WebCore::FrameSelection::directionOfSelection - chromium - MonorailPatch;Issue Tracking
-
https://code.google.com/p/chromium/issues/detail?id=236245
236245 - Heap-use-after-free in WebCore::FrameView::updateWidget - chromium - MonorailPatch;Issue Tracking
-
http://www.debian.org/security/2013/dsa-2706
Debian -- Security Information -- DSA-2706-1 chromium-browserThird Party Advisory
Jump to