Vulnerability Details : CVE-2013-2919
Google V8, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
Vulnerability category: OverflowMemory CorruptionDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2013-2919
Probability of exploitation activity in the next 30 days: 1.80%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 87 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-2919
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2013-2919
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-2919
-
https://code.google.com/p/chromium/issues/detail?id=282736
282736 - Javascript execution bug introduced with Chrome 29.0.1547.57 - chromium - MonorailVendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00002.html
[security-announce] openSUSE-SU-2013:1556-1: important: chromium: 30.0.1Third Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html
openSUSE-SU-2014:0065-1: moderate: update for chromiumThird Party Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18840
Repository / Oval Repository
-
http://www.debian.org/security/2013/dsa-2785
Debian -- Security Information -- DSA-2785-1 chromium-browserThird Party Advisory
-
http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
Chrome Releases: Stable Channel UpdateVendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html
[security-announce] openSUSE-SU-2013:1861-1: important: chromium: updateThird Party Advisory
Products affected by CVE-2013-2919
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.60:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.59:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.50:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.49:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.40:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.39:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.38:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.31:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.30:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.23:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.22:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.14:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.13:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.6:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.5:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.58:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.57:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.48:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.47:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.37:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.36:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.29:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.28:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.21:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.20:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.12:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.11:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.4:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.2:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.56:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.53:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.44:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.43:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.35:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.34:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.27:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.26:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.19:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.18:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.10:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.9:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.1:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.0:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.64:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.61:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.52:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.51:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.42:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.41:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.33:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.32:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.25:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.24:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.17:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.16:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.15:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.8:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:30.0.1599.7:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*