Vulnerability Details : CVE-2014-3192
Use-after-free vulnerability in the ProcessingInstruction::setXSLStyleSheet function in core/dom/ProcessingInstruction.cpp in the DOM implementation in Blink, as used in Google Chrome before 38.0.2125.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
Vulnerability category: Memory CorruptionDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2014-3192
Probability of exploitation activity in the next 30 days: 4.29%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 92 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-3192
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2014-3192
-
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-3192
-
https://support.apple.com/kb/HT204949
About the security content of iTunes 12.2 - Apple SupportThird Party Advisory
-
http://support.apple.com/HT204245
About the security content of iOS 8.1.3 - Apple SupportThird Party Advisory
-
http://www.securitytracker.com/id/1031647
Apple Safari WebKit Bugs Let Remote Users Execute Arbitrary Code - SecurityTrackerThird Party Advisory;VDB Entry
-
http://rhn.redhat.com/errata/RHSA-2014-1626.html
RHSA-2014:1626 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://lists.apple.com/archives/security-announce/2015/Jan/msg00002.html
Apple - Lists.apple.comMailing List;Third Party Advisory
-
https://crbug.com/403276
403276 - Heap-use-after-free in blink::Document::didRemoveAllPendingStylesheet - chromium - MonorailIssue Tracking;Third Party Advisory
-
http://support.apple.com/HT204246
About the security content of Apple TV 7.0.3 - Apple SupportThird Party Advisory
-
http://support.apple.com/HT204243
About the security content of Safari 8.0.3, Safari 7.1.3, and Safari 6.2.3 - Apple SupportThird Party Advisory
-
http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html
Apple - Lists.apple.comMailing List;Third Party Advisory
-
https://src.chromium.org/viewvc/blink?revision=182309&view=revision
[blink] Revision 182309Issue Tracking;Third Party Advisory
-
http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html
Apple - Lists.apple.comMailing List;Third Party Advisory
-
http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html
Chrome Releases: Stable Channel UpdateVendor Advisory
-
http://www.securityfocus.com/bid/70273
Google Chrome Prior to 38.0.2125.101 Multiple Security Vulnerabilities
-
http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html
Apple - Lists.apple.comMailing List;Third Party Advisory
Products affected by CVE-2014-3192
- cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.6.z:*:*:*:*:*:*:*
- cpe:2.3:a:apple:safari:8.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:safari:6.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:safari:7.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*