Vulnerability Details : CVE-2013-2875
core/rendering/svg/SVGInlineTextBox.cpp in the SVG implementation in Blink, as used in Google Chrome before 28.0.1500.71, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
Vulnerability category: OverflowDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2013-2875
Probability of exploitation activity in the next 30 days: 2.18%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 88 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-2875
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2013-2875
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-2875
- http://archives.neohapsis.com/archives/bugtraq/2014-06/0175.html
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17227
Repository / Oval Repository
-
https://support.apple.com/kb/HT6537
About the security content of iTunes 12.0.1 - Apple Support
- http://archives.neohapsis.com/archives/bugtraq/2014-06/0174.html
-
http://www.debian.org/security/2013/dsa-2724
Debian -- Security Information -- DSA-2724-1 chromium-browser
-
http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html
Chrome Releases: Stable Channel UpdateVendor Advisory
- http://archives.neohapsis.com/archives/bugtraq/2014-05/0128.html
-
http://support.apple.com/kb/HT6254
About the security content of Safari 6.1.4 and Safari 7.0.4 - Apple Support
-
http://src.chromium.org/viewvc/blink?revision=150456&view=revision
[blink] Revision 150456
-
https://code.google.com/p/chromium/issues/detail?id=233848
233848 - ASSERTION FAILED: run.charactersLength() >= run.length(), Heap-buffer-overflow in WebCore::Font::characterRangeCodePath - chromium - Monorail
Products affected by CVE-2013-2875
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.62:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.61:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.60:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.51:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.50:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.43:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.42:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.35:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.34:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.33:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.25:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.24:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.17:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.16:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.8:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.64:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.63:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.53:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.52:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.45:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.44:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.37:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.36:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.27:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.26:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.19:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.18:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.11:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.10:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.9:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.0:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.68:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.66:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.56:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.54:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.47:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.46:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.39:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.38:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.29:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.28:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.21:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.20:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.13:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.12:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.3:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.2:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.6:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.59:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.58:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.49:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.48:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.41:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.40:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.32:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.31:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.23:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.22:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.15:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.14:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.5:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:28.0.1500.4:*:*:*:*:*:*:*