Vulnerability Details : CVE-2014-1746
The InMemoryUrlProtocol::Read function in media/filters/in_memory_url_protocol.cc in Google Chrome before 35.0.1916.114 relies on an insufficiently large integer data type, which allows remote attackers to cause a denial of service (out-of-bounds read) via vectors that trigger use of a large buffer.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2014-1746
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.10:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.101:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.11:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.110:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.17:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.18:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.27:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.3:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.38:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.39:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.45:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.46:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.54:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.56:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.71:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.0:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.1:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.108:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.109:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.14:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.15:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.22:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.23:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.36:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.37:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.43:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.44:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.51:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.52:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.69:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.7:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.82:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.84:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.93:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.95:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.103:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.104:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.111:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.112:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.19:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.2:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.31:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.32:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.4:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.40:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.47:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.48:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.57:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.59:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.6:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.74:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.77:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.88:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.9:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.72:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.85:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.86:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.96:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.98:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.99:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.105:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.106:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.107:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.13:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.20:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.21:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.33:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.34:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.35:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.41:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.42:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.49:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.5:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.61:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.68:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.8:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.80:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.90:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.92:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-1746
0.66%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 77 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-1746
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2014-1746
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-1746
-
http://security.gentoo.org/glsa/glsa-201408-16.xml
Chromium: Multiple vulnerabilities (GLSA 201408-16) — Gentoo security
-
http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html
Chrome Releases: Stable Channel UpdateVendor Advisory
-
http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html
openSUSE-SU-2014:0783-1: moderate: chromium: Various security fixes
-
http://www.debian.org/security/2014/dsa-2939
Debian -- Security Information -- DSA-2939-1 chromium-browser
-
http://www.securitytracker.com/id/1030270
Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, And Spoof the User Interface - SecurityTracker
-
https://code.google.com/p/chromium/issues/detail?id=364065
364065 - SEGV in media::InMemoryUrlProtocol::Read - chromium - Monorail
-
https://src.chromium.org/viewvc/chrome?revision=267280&view=revision
[chrome] Revision 267280
-
http://secunia.com/advisories/60372
Sign in
Jump to