Vulnerability Details : CVE-2014-3152
Integer underflow in the LCodeGen::PrepareKeyedOperand function in arm/lithium-codegen-arm.cc in Google V8 before 3.25.28.16, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a negative key value.
Vulnerability category: Denial of service
Exploit prediction scoring system (EPSS) score for CVE-2014-3152
Probability of exploitation activity in the next 30 days: 1.90%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 87 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-3152
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2014-3152
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-3152
-
http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html
Chrome Releases: Stable Channel UpdateVendor Advisory
-
http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html
openSUSE-SU-2014:0783-1: moderate: chromium: Various security fixes
-
http://www.debian.org/security/2014/dsa-2939
Debian -- Security Information -- DSA-2939-1 chromium-browser
-
http://www.securitytracker.com/id/1030270
Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, And Spoof the User Interface - SecurityTracker
-
https://code.google.com/p/chromium/issues/detail?id=358057
358057 - UNKNOWN in v8::internal::Simulator::DecodeType3 - chromium - Monorail
-
https://code.google.com/p/v8/source/detail?r=20363
v8 - V8 JavaScript Engine - Monorail
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157363.html
[SECURITY] Fedora 21 Update: v8-3.14.5.10-18.fc21
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157357.html
[SECURITY] Fedora 20 Update: v8-3.14.5.10-18.fc20
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157338.html
[SECURITY] Fedora 22 Update: v8-3.14.5.10-18.fc22
-
http://secunia.com/advisories/60372
Sign in
Products affected by CVE-2014-3152
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.10:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.101:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.11:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.110:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.17:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.18:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.27:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.3:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.38:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.39:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.45:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.46:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.54:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.56:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.71:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.0:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.1:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.108:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.109:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.14:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.15:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.22:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.23:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.36:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.37:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.43:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.44:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.51:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.52:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.69:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.7:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.82:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.84:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.93:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.95:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.103:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.104:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.111:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.112:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.19:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.2:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.31:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.32:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.4:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.40:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.47:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.48:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.57:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.59:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.6:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.74:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.77:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.88:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.9:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.72:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.85:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.86:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.96:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.98:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.99:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.105:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.106:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.107:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.13:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.20:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.21:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.33:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.34:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.35:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.41:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.42:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.49:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.5:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.61:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.68:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.8:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.80:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.90:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:35.0.1916.92:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.25.4:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.25.26:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.25.25:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.25.17:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.25.16:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.25.9:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.25.8:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.25.1:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.25.0:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.25.22:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.25.21:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.25.20:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.25.13:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.25.12:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.25.5:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.25.27:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.25.19:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.25.18:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.25.11:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.25.10:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.25.3:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.25.2:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.25.24:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.25.23:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.25.15:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.25.14:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.25.7:*:*:*:*:*:*:*
- cpe:2.3:a:google:v8:3.25.6:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*