CVE-2013-6621 : Detail

CVE-2013-6621

2.31%V3
Network
2013-11-13
14h00 +00:00
2017-09-18
10h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Use-after-free vulnerability in Google Chrome before 31.0.1650.48 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the x-webkit-speech attribute in a text INPUT element.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-399 Category : Resource Management Errors
Weaknesses in this category are related to improper management of system resources.

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Opensuse>>Opensuse >> Version 12.2

Opensuse>>Opensuse >> Version 12.3

Opensuse>>Opensuse >> Version 13.1

Configuraton 0

Google>>Chrome >> Version To (including) 31.0.1650.47

Google>>Chrome >> Version 31.0.1650.0

Google>>Chrome >> Version 31.0.1650.2

Google>>Chrome >> Version 31.0.1650.3

Google>>Chrome >> Version 31.0.1650.4

Google>>Chrome >> Version 31.0.1650.5

Google>>Chrome >> Version 31.0.1650.6

Google>>Chrome >> Version 31.0.1650.7

Google>>Chrome >> Version 31.0.1650.8

Google>>Chrome >> Version 31.0.1650.9

Google>>Chrome >> Version 31.0.1650.10

Google>>Chrome >> Version 31.0.1650.11

Google>>Chrome >> Version 31.0.1650.12

Google>>Chrome >> Version 31.0.1650.13

Google>>Chrome >> Version 31.0.1650.14

Google>>Chrome >> Version 31.0.1650.15

Google>>Chrome >> Version 31.0.1650.16

Google>>Chrome >> Version 31.0.1650.17

Google>>Chrome >> Version 31.0.1650.18

Google>>Chrome >> Version 31.0.1650.19

Google>>Chrome >> Version 31.0.1650.20

Google>>Chrome >> Version 31.0.1650.22

Google>>Chrome >> Version 31.0.1650.23

Google>>Chrome >> Version 31.0.1650.25

Google>>Chrome >> Version 31.0.1650.26

Google>>Chrome >> Version 31.0.1650.27

Google>>Chrome >> Version 31.0.1650.28

Google>>Chrome >> Version 31.0.1650.29

Google>>Chrome >> Version 31.0.1650.30

Google>>Chrome >> Version 31.0.1650.31

Google>>Chrome >> Version 31.0.1650.32

Google>>Chrome >> Version 31.0.1650.33

Google>>Chrome >> Version 31.0.1650.34

Google>>Chrome >> Version 31.0.1650.35

Google>>Chrome >> Version 31.0.1650.36

Google>>Chrome >> Version 31.0.1650.37

Google>>Chrome >> Version 31.0.1650.38

Google>>Chrome >> Version 31.0.1650.39

Google>>Chrome >> Version 31.0.1650.41

Google>>Chrome >> Version 31.0.1650.42

Google>>Chrome >> Version 31.0.1650.43

Google>>Chrome >> Version 31.0.1650.44

Google>>Chrome >> Version 31.0.1650.45

Google>>Chrome >> Version 31.0.1650.46

Configuraton 0

Debian>>Debian_linux >> Version 7.0

Debian>>Debian_linux >> Version 8.0

References

http://www.debian.org/security/2013/dsa-2799
Tags : vendor-advisory, x_refsource_DEBIAN