Vulnerability Details : CVE-2013-6668
Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Vulnerability category: Denial of service
Products affected by CVE-2013-6668
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.113:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.112:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.104:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.93:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.83:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.82:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.73:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.71:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.64:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.63:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.56:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.55:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.47:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.46:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.39:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.38:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.29:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.28:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.27:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.20:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.19:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.11:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.10:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.2:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.1:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.115:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.107:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.106:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.88:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.85:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.75:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.74:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.66:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.65:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.58:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.57:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.49:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.48:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.41:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.40:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.31:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.30:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.22:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.21:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.13:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.12:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.5:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.4:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.3:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.109:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.108:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.90:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.89:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.79:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.77:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.76:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.68:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.67:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.60:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.59:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.51:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.50:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.43:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.42:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.35:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.34:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.24:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.23:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.15:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.14:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.7:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.6:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.111:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.110:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.92:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.91:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.81:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.80:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.70:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.69:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.62:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.61:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.54:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.53:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.52:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.45:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.44:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.37:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.36:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.26:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.25:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.18:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.16:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.9:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.8:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.0:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.125:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.126:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.135:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.136:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.116:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.117:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.124:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.132:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:33.0.1750.133:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.1:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.10:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.17:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.18:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.19:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.25:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.26:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.32:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.33:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.9:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.13:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.14:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.21:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.22:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.29:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.3:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.5:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.6:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.0:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.15:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.16:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.23:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.24:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.30:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.31:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.7:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.8:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.11:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.12:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.2:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.20:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.27:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.28:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.34:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.24.4:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-6668
8.65%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-6668
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2013-6668
-
https://code.google.com/p/chromium/issues/detail?id=343964
343964 - UNKNOWN in v8::internal::FixedArray::get - chromium - MonorailIssue Tracking;Vendor Advisory
-
http://www.securityfocus.com/bid/65930
Google Chrome Prior to 33.0.1750.146 Multiple Security VulnerabilitiesThird Party Advisory;VDB Entry
-
https://code.google.com/p/v8/source/detail?r=19475
v8 - V8 JavaScript Engine - MonorailVendor Advisory
-
http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html
Chrome Releases: Stable Channel UpdateVendor Advisory
-
https://code.google.com/p/v8/source/detail?r=19553
v8 - V8 JavaScript Engine - MonorailVendor Advisory
-
http://www.debian.org/security/2014/dsa-2883
Debian -- Security Information -- DSA-2883-1 chromium-browserThird Party Advisory
-
http://advisories.mageia.org/MGASA-2014-0516.html
Mageia Advisory: MGASA-2014-0516 - Updated nodejs package fixes security vulnerabilitiesThird Party Advisory
-
http://www.mandriva.com/security/advisories?name=MDVSA-2015:142
mandriva.comThird Party Advisory
-
http://secunia.com/advisories/61184
Sign inThird Party Advisory
-
https://code.google.com/p/chromium/issues/detail?id=347909
347909 - CHECK failure in CHECK(value->IsHeapObject()) failed: ../src/objects-debug.cc(295) - chromium - MonorailIssue Tracking;Vendor Advisory
-
https://code.google.com/p/chromium/issues/detail?id=344186
344186 - OOB write due to invalid bounds check in v8 - chromium - MonorailIssue Tracking;Vendor Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=swg21683389
IBM Security Bulletin: Multiple Vulnerabilities in Current Release of IBM® SDK for Node.js™Third Party Advisory
-
https://code.google.com/p/v8/source/detail?r=19599
v8 - V8 JavaScript Engine - MonorailVendor Advisory
Jump to